78
INTRODUCTION TO INTERNET

Introduction to Internet

Embed Size (px)

Citation preview

INTRODUCTION TO INTERNET

Compilation by Lordevin CabatlaoDate June 19 2010Time 323 PM

I LESSON 1 The INRODUCTION

HistoryObjectives

Define and describe the Internet To know the resources of internet Define the Internet backbone

A What is InternetB The History

B1 History PreviewB2 Overview of Internet

I What people do when surfingI1 Surfing is build for a network and made up of organization

I2 What are the uses of the Internet Communication Information Retrieval Presentation of Information

II LESSON 2 Terms and Web PoliciesObjectives

To know what internet services we have To know what is the risk when your online Define the World Wide Web Explain the work of the Domain Name Service Explain the difference between IP address and domain name How to protect and stay safe online

A Internet AddressesA1 Computer AddressesA2 Domain Names

A3 Personal Addresses

B Internet ServicesB1 Internet Services

B11 EmailB12 Mail ListsB13 FTPB14 GopherB15 Instant Messaging (IM)B16 IRCB17 Newsgroups

B18 Voice over IPB19 World Wide Web (WWW)

C Types of Internet Connection C1 Types of Internet connections

1 Terminal DialupModem (Shell connection)2 SLIP (Serial Line Internet Protocol)3 PPP (Point-to-Point Protocol)4 ISDN (Integrated Services Digital Network)5 DIAS6 Cable Modem7 Digital Subscriber Line (DSL) connection8 Direct Connection (Leased circuit)9 Satellite connections10 Wireless connections

D Computer VirusDifferent Types of Computer Viruses

Resident Viruses Direct Action Viruses Overwrite Viruses Boot Virus Macro Virus Directory Virus Polymorphic Virus File Infectors Companion Viruses FAT Virus Worms Trojans or Trojan Horses Logic Bombs

E How Do You Stay Safe On The Internet

1 Viruses and WormsWhat Is A VirusWhat Is A WormHow Do We Get InfectedHow Does A Virus Or Worm Infection Affect Us

2 Trojan Horses 3 Rootkits 4 Crackers and Hackers 5 Spam 6 Web Bugs 7 Child Security 8 Pop-UpUnder Ads 9 Tracking Cookies

10 Spyware

F Firewall and Protection FIREWALL ANTI-VIRUS

i Different Kind of Anti-Virus

III LESSON 3 Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

The Environments ndash Browser menu1 Different Types of Web Browser Explorer2 The Browser

21 How Does The Internet Work22 What Can I Do On The Internet

a E-mail (electronic-mail)b Informationc Group Discussiond Entertainmente Newsf Online Shoppingg Free Program (Software)h Chati Cookiesj Cyberspace

3 How To Accessing Internet Connection and Open How to open IE Accessing The Internet Connection Dial-up or direct connection

o Before you can even begin to surf the net you have to be connectedo Steps Getting Connected to the internet

Opening The IE

4 The Environment

Parts of Internet Explorer 7

5 Activities that can do while or after surfinga) How to Copy or Save Image Using Internet Browserb) Print Web Pagesc) Save Book Mark Favorite Websited) Define Search Engine and a subject Guidee) Save Favorite Website on a storage disk

IV LESSON 4 Using Web Browser Manage User

a Using Web Browser1 Website

a Internet Addressesi World Wide Web

ii Domain Name and Extension Name Domain Extension Name

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

3 Uploading and Downloadingi Upload a File

Instructions and Rules uploading a fileii Downloading a File

Procedure and Rules before Downloadiii Buffering

Buffering Over the Internet

5 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this layer Understand the types of signaling

Define multiplexing

OSI Physical layer Services and Functions OSI Model

V TERMS and TERMINOLOGIES

I LESSON 1 The INRODUCTION

Objectives Define and describe the Internet To know the resources of internet Define the Internet backbone

History

A What is Internet

A world wide network of computer network Internet Connected VIA Telecommunication Links The information ldquoSuper Highwayrdquo Mother of all Network

Introduction of InternetThe internet is a global of interconnected government academic public and

private computer networks which is based upon the networking technologies of the Internet Protocol Suite It is the successor of the Advanced Research Project Agency Network (ARPANET) developed by DARPA of the US Department of Defense

The Internet is also a communications backbone underlying the World Wide Web (WWW)

The Internet changes so quickly and the technology advances so rapidly that it can seem almost impossible to keep up with all of it If youre like just about everyone else involved in the Internet your questions are similar to those of my friend Youll find your answers here

C The History

Objectives To know Origin of Internet History To Create a digital archive or source materials about the creation and

evolution of the Internet

Generate new historical material through the collection of commentaries that include participants stories observations perspectives and memories

B1 History Preview

1957 (Potential Origin and Beginning -- The History of the Internet)The USSR launches Sputnik the first artificial earth satellite In response the United States forms the Advanced Research Projects Agency (ARPA) within the Department of Defense (DoD) to establish US lead in science and technology applicable to the militaryBackbones None - Hosts None

1962 RAND Paul Baran of the RAND Corporation (a government agency) was commissioned by the US Air Force to do a study on how it could maintain its command and control over its missiles and bombers after a nuclear attack This was to be a military research network that could survive a nuclear strike decentralized so that if any locations (cities) in the US were attacked the military could still have control of nuclear arms for a counter-attack

Barans finished document described several ways to accomplish this His final proposal was a packet switched network

Packet switching is the breaking down of data into datagrams or packets that are labeled to indicate the origin and the destination of the information and the forwarding of these packets from one computer to another computer until the information arrives at its final destination computer This was crucial to the realization of a computer network If packets are lost at any given point the message can be resent by the originatorBackbones None - Hosts None

1968 ARPA awarded the ARPANET contract to BBN BBN had selected a Honeywell minicomputer as the base on which they would build the switch The physical network was constructed in 1969 linking four nodes University of California at Los Angeles SRI (in Stanford) University of California at Santa Barbara and University of Utah The network was wired together via 50 Kbps circuitsBackbones 50Kbps ARPANET - Hosts 4

1972 The first e-mail program was created by Ray Tomlinson of BBNThe Advanced Research Projects Agency (ARPA) was renamed The Defense Advanced Research Projects Agency (or DARPA)

ARPANET was currently using the Network Control Protocol or NCP to transfer data This allowed communications between hosts running on the same networkBackbones 50Kbps ARPANET - Hosts 23

1973 Development began on the protocol later to be called TCPIP

It was developed by a group headed by Vinton Cerf from Stanford and Bob Kahn from DARPA This new protocol was to allow diverse computer networks to interconnect and communicate with each otherBackbones 50Kbps ARPANET - Hosts 23+

1974 First Use of term Internet by Vint Cerf and Bob Kahn in paper on Transmission Control ProtocolBackbones 50Kbps ARPANET - Hosts 23+

1976 Dr Robert M Metcalfe develops Ethernet which allowed coaxial cable to move data extremely fast This was a crucial component to the development of LANsThe packet satellite project went into practical use SATNET Atlantic packet Satellite network was born This network linked the United States with Europe Surprisingly it used INTELSAT satellites that were owned by a consortium of countries and not exclusively the United States government

UUCP (Unix-to-Unix CoPy) developed at ATampT Bell Labs and distributed with UNIX one year later

The Department of Defense began to experiment with the TCPIP protocol and soon decided to require it for use on ARPANETBackbones 50Kbps ARPANET plus satellite and radio connections - Hosts 111+

1979 USENET (the decentralized news group network) was created by Steve Bellovin a graduate student at University of North Carolina and programmers Tom Truscott and Jim Ellis It was based on UUCP

The Creation of BITNET by IBM Because its Time Network introduced the store and forward network It was used for email and listservsBackbones 50Kbps ARPANET plus satellite and radio connections - Hosts 111+

1981 National Science Foundation Created backbone called CSNET 56 Kbps network for institutions without access to ARPANET Vinton Cerf proposed a plan for an inter-network connection between CSNET and the ARPANETBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 213

1983 Internet Activities Board (IAB) was created in 1983On January 1st every machine connected to ARPANET had to use TCPIP TCPIP became the core Internet protocol and replaced NCP entirely

The University of Wisconsin created Domain Name System (DNS) This allowed packets to be directed to a domain name which would be translated by the server database into the

corresponding IP number This made it much easier for people to access other servers because they no longer had to remember numbersBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 562

1984 The ARPANET was divided into two networks MILNET and ARPANET MILNET was to serve the needs of the military and ARPANET to support the advanced research component Department of Defense continued to support both networks

Upgrade to CSNET was contracted to MCI New circuits would be T1 lines15 Mbps which is twenty-five times faster than the old 56 Kbps lines IBM would provide advanced routers and Merit would manage the network New network was to be called NSFNET (National Science Foundation Network) and old lines were to remain called CSNETBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 1024

1985 The National Science Foundation began deploying its new T1 lines which would be finished by 1988Backbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 1961

1986 The Internet Engineering Task Force or IETF was created to serve as a forum for technical coordination by contractors for DARPA working on ARPANET US Defense Data Network (DDN) and the Internet core gateway systemBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 2308

1987 BITNET and CSNET merged to form the Corporation for Research and Educational Networking (CREN) another work of the National Science FoundationBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 28174

1988 Soon after the completion of the T1 NSFNET backbone traffic increased so quickly that plans immediately began on upgrading the network againBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 56000

1990 (Updated 82001) Merit IBM and MCI formed a not for profit corporation called ANS Advanced Network amp Services which was to conduct research into high speed networking It soon came up with the concept of the T3 a 45 Mbps line NSF quickly adopted the new network and by the end of 1991 all of its sites were connected by this new backbone

While the T3 lines were being constructed the Department of Defense disbanded the ARPANET and it was replaced by the NSFNET backbone The original 50Kbs lines of ARPANET were taken out of service

Tim Berners-Lee and CERN in Geneva implements a hypertext system to provide efficient information access to the members of the international high-energy physics communityBackbones 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 313000

1991CSNET (which consisted of 56Kbps lines) was discontinued having fulfilled its important early role in the provision of academic networking service A key feature of CREN is that its operational costs are fully met through dues paid by its member organizations

The NSF established a new network named NREN the National Research and Education Network The purpose of this network is to conduct high speed networking research It was not to be used as a commercial network nor was it to be used to send a lot of the data that the Internet now transfersBackbones Partial 45Mbps (T3) NSFNET a few private backbones plus satellite and radio connections - Hosts 617000

1992 Internet Society is chartered

World-Wide Web released by CERNNSFNET backbone upgraded to T3 (44736Mbps)Backbones 45Mbps (T3) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps plus satellite and radio connections - Hosts 1136000

1993 InterNIC created by NSF to provide specific Internet services directory and database services (by ATampT) registration services (by Network Solutions Inc) and information services (by General AtomicsCERFnet)

Marc Andreessen and NCSA and the University of Illinois develops a graphical user interface to the WWW called Mosaic for XBackbones 45Mbps (T3) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps and 45Mpbs lines plus satellite and radio connections - Hosts 2056000

1994 No major changes were made to the physical network The most significant thing that happened was the growth Many new networks were added to the NSF backbone Hundreds of thousands of new hosts were added to the INTERNET during this time period

Pizza Hut offers pizza ordering on its Web page

First Virtual the first cyberbank opens

ATM (Asynchronous Transmission Mode 145Mbps) backbone is installed on NSFNETBackbones 145Mbps (ATM) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps and 45Mpbs lines plus satellite and radio connections - Hosts 3864000

1995 The National Science Foundation announced that as of April 30 1995 it would no longer allow direct access to the NSF backbone The National Science Foundation contracted with four companies that would be providers of access to the NSF backbone (Merit) These companies would then sell connections to groups organizations and companies

$50 annual fee is imposed on domains excluding edu and gov domains which are still funded by the National Science FoundationBackbones 145Mbps (ATM) NSFNET (now private) private interconnected backbones consisting mainly of 56Kbps 1544Mbps 45Mpbs 155Mpbs lines in construction plus satellite and radio connections - Hosts 6642000

1996 Most Internet traffic is carried by backbones of independent ISPs including MCI ATampT Sprint UUnet BBN planet ANS and more

The Internet Society the group that controls the INTERNET researches new TCPIP technology that will be able to have more than the approximately 43 billion addresses currently available The problem that has arisen is that it is not known how both the old and the new addressing systems will be able to work at the same time during a transition period

Internet2 is established

(Backbone data below was valid in 1996 please seek other references for current backbone and host data as it is constantly expanded)Backbones 145Mbps (ATM) NSFNET (now private) private interconnected backbones consisting mainly of 56Kbps 1544Mbps 45Mpbsand 155Mpbs lines plus satellite and radio connections - Hosts over 15000000 and growing rapidly

The Present and The Future

A new technology recommendation called IPv6 is suggested to replace the current IPv4 technology IPv4 allows for fewer than 43 billion directly connected Internet devices problematic because the world population (as of 2009) is well over 65 billion (theoretically if ever human had a computer and mobile phone wed need 13 billion addresses which is something IPv6 can easily accomplish)

In 1999 a wireless technology called 80211b more commonly referred to as Wi-Fi is standardized Over the years that follow this technology begins appearing as a built-in feature of portable computers and many handheld devices

In 2005 the One Laptop Per Child project begins In an attempt to provide low cost education-designed laptops to children around the world for a low cost (US$100 per unit) this project helps spark the netbook industry Netbooks are small portable computers with extended battery life and built-in Wi-Fi connectivity

Multi-touch technology begins to appear in handheld devices tablet computers and netbooks This technology supplements traditional touch-screen technology by allowing advanced gesturing (several fingers moving on a screen instead of just one) Multi-touch technology is seen as a possible alternative to traditional keyboard and mouse (touchpad) systems

Read Bill Buxtons Overview and History of Multi-Touch Systems entitled Multi-Touch Systems that I Have Known and Loved

In December 2009 the first multi-touch website is reported

B2 Overview of InternetThe Internet is a global computer network made up of smaller computer networks

it hasbeen called a Network of NetworksThese smaller networks include1048707 Local Area Networks (like networked offices or computer labs and campus-wide

networks)1048707 Wide Area Networks (like city-wide networks)1048707 State and Regional Networks (including regional service providers and others)1048707 National and International Networks

There is no one inventor of the Internet The Internet was created in the 1960s as a huge network linking big university and government computers The science behind the Internet was invented during the Cold War when the United States was in competition against Russia for weapons and technology So the Internet is actually pretty oldmdasharound forty years Much of Internetrsquos initial development was supported by American governmental research and network development (beginning with the American militarys ARPANET in 1969)In fact email has been around since 1972 In 1989 that Tim Berners-Lee a scientist at the European Laboratory for Particle Physics in Geneva proposed the World Wide Web Now Internet Service Providers (ISPs) offer Internet access to their clients at costs ranging from Rs 150- per 6 months to hundreds of rupees per year depending on the types of service they offer

II What people do when surfing People usually get to surfing to internet to do things that are complicated

for them They do a short time for them while surfing depends from the user surfing is the very easiest thing to search for what you want to know

Surfing is one where you can get information access to an educational learning where you can also communicate for an entertainment or an Personal Information

Surfing is one of the easiest way of sharing files and document or any personal data

I1 Surfing is build for a network and made up of organization

i Communication ii Education

iii Business managements Commercial Company iv Government v Private Organization

vi Entertainment

I2 What are the uses of the Internet

There are three fundamental uses of the Internet Communication Information Retrieval Presentation of Information

Communication The Internet is used both for one-to-one communications (email and real-time chat

programs) and one-to-many

Information Retrieval The Internet allows access to public domain information bibliographic databases

libraries and entertainment services as well as to proprietary information services

Presentation of Information Any organization connected to the Internet can provide access to its own in-house

information (library catalogs faculty information etc) to millions of people world-wide Individuals can also develop and provide their own information packages via their own

home pages

II Terms and Web PoliciesObjectives

To know the resources of internet Navigate around the web using Internet Explorer To know what internet services we have To know what is the risk when your online Define the World Wide Web Explain the work of the Domain Name Service Explain the difference between IP address and domain name How to protect and stay safe online

A Internet Addresses

Every computer file of information and person on the Internet is identified by a unique address

A1 Computer AddressesComputer addresses are made up of three parts (or in some cases two parts) separated

by dots like this computer-nameinstitutiondomain

The computer name is a name given locally to identify a particular computer it is in some cases omitted from the address The institution name is the name (or an abbreviation) of the name of the school company or other institution housing the computer The domain name specifies either the type or the geographic location of the computer

A2 Domain NamesThere are several possible domain names including some that identify the type of institution and some that identify a geographical location They include

edu Educational institutioncom Commercial and profitable organizationsorg Non-profitable organizations

net Internet infrastructure and service providersgov Governmental agencydepartmentmil American military agencyint International organizationsus United Statesin Indiamy Malaysiaca Canadajp Japanbiz Businessaero Aeronautics

A3 Personal Addresses

A persons address (or their email address) places the users username (or login) and the symbol before the computer address For example a user whose username is creator who is accessing email from the yahoo server of United State Yahoo Website would have the following address creatoryahoocom

B Internet Services

B1 Internet Services

rdquoInternet servicesrdquo serve more sophisticated and multi-purpose purposes and increasingly make the Internet a truly useful information resource

B11 EmailIt is the Internets version of the postal service Using the Internet it provides the ability to send a message reply to a message send a file created in another program andor even send the same message to a group of people Some benefits of Email arebull Speed A message can be sent from Chennai to Australia in a matter of secondsbull Cost Emails are cheap You are usually only charged for the telephone call time (local call rate) for sending the message into the Internet and not the cost associated with transferring the message across the Internetbull Flexibility It is easy to send duplicates of your messages to other people or groups for the cost of a single messagebull Record keeping Messages sent and received can be easily stored for future referenceIn order to use Email you will need Internet access arranged through an InternetService Provider (ISP) who will allocate you one or a number of Email accounts To be able to retrieve and send mail from these addresses a user will need what is known as Email client software and your ISP usually provides this although nowadays most computers come with it pre-installed

B12 Mail Lists

These use email to support discussion groups on a wide range of specific subjectsOnce you are becoming a subscriber of a mailing list you will receive lot of emails related to the subject covered by the mailing list

B13 FTPFTP was the original Internet mechanism for the storage and retrieval of information There are still many FTP Sites around the Internet although many of them have been melded into the World Wide Web In computer science FTP stands for File Transfer Protocol which is a way of transferring files between computers A file can be anything -- a spreadsheet a word document a song or a picture When someone says Please FTP me that file for instance that means Please transfer that file from your computer to mine To FTP you usually need to download a special program or application You also usually need a password to be able to access or send information to someone elses computer

B14 GopherGopher was developed at the University of Minnesota primarily to support its own Campus Wide Information Server (CWIS) It provides access to information available either locally or elsewhere on the Internet by means of a simple series of uniformly designed menus

B15 Instant Messaging (IM)There are lots of other fun and useful IM features you can explore like group chats file transfers voice calls video conferencing and emoticons that reflect your mood

B16 IRCIRC stands for Internet Relay Chat It has been used in many countries around the world IRC is a multi-user chat system where people meet on channels (rooms virtual places usually with a certain topic of conversation) to talk in groups or privately There is no restriction to the number of people that can participate in a given discussion or the number of channels that can be formed on IRC

B17 NewsgroupsThe Internet has a place where we can gather question and discuss our experiences within a wide variety of topics Its called Usenet News Some users also call it Net NewsThink of Usenet News as a giant worldwide bulletin board Anyone can freely post something on this bulletin board Everyone else can read the posted items and add their own items These voluntary contributions and free exchange of information are the foundation of the Internet

B18 Voice over IPVoice over IP (Voice over Internet Protocol or VoIP) technology converts voice calls from analog to digital to be sent over digital data networks In Voice over IP or VoIP voice data and video all travel along the network

B19 World Wide Web (WWW)The newest information application on the Internet the WWW provides standardized access to Gopher FTP Telnet and more by means of home pages designed either by institutions or

b individuals By means of the HyperText Markup Language (HTML) it allows users to point at highlighted terms following links to whatever information interests them It is a multimedia environment allowing Internet users access to audio and video materials There are a number of client software packages (or browsers) including Lynx (a textonly browser) Netscape and Microsofts Internet Explorer (which are multimedia browsers)

C Types of Internet Connection

C1 Types of Internet connections

The options for providing user connectivity to the Internet are given below

1 Terminal DialupModem (Shell connection)1048707 Most common option1048707 User requirements limited to modem and communications software1048707 Text-only access1048707 Shell accounts were more popular before the advent of the Web A shell account lets

you use your computer much as if it were a virtual console associated with a remote computer You can type commands which are interpreted by the remote computer and view the resulting output on your computer Although a few web browsers such as Lynx can operate via a shell account they donrsquot generally support the highly graphical multimedia pages which web surfers have come to expect

2 SLIP (Serial Line Internet Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software SLIP software amp software for Internet

applications1048707 Multimedia access

3 PPP (Point-to-Point Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software PPP software amp software for Internet

applications1048707 Multimedia access1048707 While your computer is connected to the Internet you can use it to surf the Web with

your favorite browser If your ISP allows you can even run a web server providing pages that can be viewed by others around the world

4 ISDN (Integrated Services Digital Network)1048707 Most often used to connect remote telecommuters to office LANs1048707 Requires ISDN phone line access1048707 Faster than analog terminal dialupmodem service

1048707 User must have ISDN phone line ISDN card communications software TCP software amp SLIP or PPP software multimedia connectivity

5 DIAS1048707 The DIAS offers a wire-line solution for high speed symmetrical Internet access on the

existing telephone lines It provides an always on internet access that is permanently available at customers premises DIAS combines voice and internet data packets on a single twisted pair wire at subscriber premises that means you can use telephone and surf internet at the same time

6 Cable Modem1048707 The term ldquoCable Modemrdquo is quite new and refers to a modem that operates over the

ordinary cable TV network cables Basically you just connect the Cable Modem to the TV outlet for your cable TV and the cable TV operator connects a Cable Modem Termination System (CMTS) in his end (the Head-End)

1048707 Actually the term ldquoCable Modemrdquo is a bit misleading as a Cable Modem works more like a Local Area Network (LAN) interface than as a modem

1048707 In a cable TV system signals from the various channels are each given a 6-MHz slice of the cablersquos available bandwidth and then sent down the cable to your house When a cable company offers Internet access over the cable Internet information can use the same cables because the cable modem system puts downstream data ndash data sent from the Internet to an individual computer ndash into a 6-MHz channel On the cable the data looks just like a TV channel So Internet downstream data takes up the same amount of cable space as any single channel of programming Upstream data ndash information sent from an individual back to the Internet ndash requires even less of the cablersquos bandwidth just 2 MHz since the assumption is that most people download far more information than they upload

1048707 Putting both upstream and downstream data on the cable television system requires two types of equipment a cable modem on the customer end and a cable modem termination system (CMTS) at the cable providerrsquos end Between these two types of equipment all the computer networking security and management of Internet access over cable television is put into place

7 Digital Subscriber Line (DSL) connection1048707 DSL is a very high-speed connection that uses the same wires as a regular telephone

line1048707 Here are some advantages of DSL

1 You can leave your Internet connection open and still use the phone line for voice calls

2 The speed is much higher than a regular modem3 DSL doesnrsquot necessarily require new wiring it can use the phone line you

already have4 The company that offers DSL (eg BSNL) will usually provide the modem as

part of the installation1048707 But there are disadvantages

1 A DSL connection works better when you are closer to the providerrsquos central office

2 The service is not available everywhere1048707 Other types of DSL include

1 Asymmetric DSL (ADSL) line ndash The connection is faster for receiving data than it is for sending data over the Internet

2 Very high bit-rate DSL (VDSL) ndash This is a fast connection but works only over a short distance

3 Symmetric DSL (SDSL) ndash This connection used mainly by small businesses doesnrsquot allow you to use the phone at the same time but the speed of receiving and sending data is the same

4 Rate-adaptive DSL (RADSL) ndash This is a variation of ADSL but the modem can adjust the speed of the connection depending on the length and quality of the line

8 Direct Connection (Leased circuit)1048707 Most often used to connect sites within a specific organization such as a university or

business requires owning or leasing of cable (from 64 kbps to T-3) users typically connected via Ethernet LANs multimedia connectivity at its fastest

9 Satellite connections1048707 This connection allows you to download Internet files via a satellite connection This is

an efficient method for receiving large Web graphics and other items but you still need a modem connection for other features You must purchase the connection hardware as well as subscribe to the service

10 Wireless connections1048707 Pagers cellular phones and personal digital assistants (PDAs) now allow varying levels

of Internet access from notification of E-mail to limited Web connections Many of these services remain in the experimental stage The PPP connection is called as TCPIP connection or PSTN dial-up connection ISDN connection is called as ISDN dial-up connection Cable Modem DSL and Direct Connection are always-on connection The words ldquoconnectionrdquo and ldquoaccountrdquo related to Internet are interchangeable

D Computer Virus

The Internet just like the rest of the world is not a perfectly safe place to visit If you download files from the Internet there is a chance a very small chance but nonetheless a chance that your computer could become infected with a virus

Viruses are malicious programs that invade your computer They can cause many different kinds of damage such as deleting data files erasing programs or destroying

everything they find on your hard disk Not every virus causes damage some simply flash annoying messages

Different Types of Computer VirusesThere are Different Types of Computer Viruses could be classified in

(origin techniques types of files they infect where they hide the kind of damage they cause the type of operating system or platform they attack) etc Let us have a look at themhellip

Computer Virus is a kind of malicious software written intentionally to enter a computer without the userrsquos permission or knowledge with an ability to replicate itself thus continuing to spread Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system A virus should never be assumed harmless and left on a system Most common types of viruses are mentioned below

Resident VirusesThis type of virus is a permanent which dwells in the RAM memory From

there it can overcome and interrupt all of the operations executed by the system corrupting files and programs that are opened closed copied renamed etc

Examples include Randex CMJ Meve and MrKlunky

Direct Action VirusesThe main purpose of this virus is to replicate and take action when it is

executed When a specific condition is met the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXECBAT file PATH This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted

Overwrite VirusesVirus of this kind is characterized by the fact that it deletes the information

contained in the files that it infects rendering them partially or totally useless once they have been infected

The only way to clean a file infected by an overwrite virus is to delete the file completely thus losing the original content

Examples of this virus include Way TrjReboot Trivial88D

Boot Virus

This type of virus affects the boot sector of a floppy or hard disk This is a crucial part of a disk in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive

Examples of boot viruses include PolybootB AntiEXE

Macro VirusMacro viruses infect files that are created using certain applications or

programs that contain macros These mini-programs make it possible to automate series of operations so that they are performed as a single action thereby saving the user from having to carry them out one by one

Examples of macro viruses Relax MelissaA Bablas O97MY2K

Directory VirusDirectory viruses change the paths that indicate the location of a file By

executing a program (file with the extension EXE or COM) which has been infected by a virus you are unknowingly running the virus program while the original file and program have been previously moved by the virus

Once infected it becomes impossible to locate the original files

Polymorphic VirusPolymorphic viruses encrypt or encode themselves in a different way

(using different algorithms and encryption keys) every time they infect a system

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves

Examples include Elkern Marburg Satan Bug and Tuareg

File InfectorsThis type of virus infects programs or executable files (files with an EXE

or COM extension) When one of these programs is run directly or indirectly the virus is activated producing the damaging effects it is programmed to carry out The majority of existing viruses belong to this category and can be classified depending on the actions that they carry out

Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types They are known as companion viruses because once they get into the system they accompany the other files that already exist In other words in order to carry out their infection routines companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses)

Some examples include Stator Asimov1539 and Terrax1069

FAT VirusThe file allocation table or FAT is the part of a disk used to connect

information and is a vital part of the normal functioning of the computerThis type of virus attack can be especially dangerous by preventing access to certain sections of the disk where important files are stored Damage caused can result in information losses from individual files or even entire directories

WormsA worm is a program very similar to a virus it has the ability to self-

replicate and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses

Examples of worms include PSWBugbearB LovgateF TrileC SobigD Mapson

Trojans or Trojan HorsesAnother unsavory breed of malicious code are Trojans or Trojan horses

which unlike viruses do not reproduce by infecting other files nor do they self-replicate like worms

Logic BombsThey are not considered viruses because they do not replicate They are not

even programs in their own right but rather camouflaged segments of other programs

Their objective is to destroy data on the computer once certain conditions have been met Logic bombs go undetected until launched and the results can be destructive

E How Do You Stay Safe On The Internet

The first part of the answer to the question How do you stay safe on the Internet is know what the threats are that you and your computer are up against

Without this knowledge how are you going to know youve got everything covered off Do you just rely on what the security software vendors tell you to spend your money on

By being aware of what the risks are I suggest you will save yourself money and have more effective protection when it comes to the second part of the answer to the question How do you stay safe on the Internet selecting effective prevention and protection to guard privacy and online security

To help you decide what is necessary for your particular protection in The Three Levels Of Internet Risk Protection I talk about the safe practices that help protect your computer and the types of software to use -- from those that are absolutely essential for security to others which you may want to install to guard privacy to the level you desire

But back to this article How Do You Stay Safe On The Internet here Ill provide you with an introduction to each type of threat At the end of it youll have a good feel for the dangers on the Internet and how those threats can affect you your PC and your information be it personal financial family or business

There are ten of the most prevalent threats covered here Either go through them all or click on the links below for those you are particularly interested in

1 Viruses and Worms 2 Trojan Horses 3 Rootkits 4 Crackers and Hackers 5 Spam 6 Web Bugs 7 Child Security 8 Pop-UpUnder Ads 9 Tracking Cookies 10 Spyware

By the way Ive tried to keep the technical language simple but if you dont understand some of the terms check them out at Netlingo which provides definitions and explanations for all Net terminology

1 Viruses And Worms

What Is A VirusA virus is a man-made computer program that infects a file or program on our computers Each time the infected program is run the virus is also triggered It spreads itself by infecting other programs on the same computer

What Is A WormA worm is also a man-made program that replicates itself However unlike a virus it does not infect other program files on the computer Instead a worm spreads itself automatically to other computers through email over a network and via Internet Relay Chat (IRC)

How Do We Get InfectedViruses and worms can infect desktop computers laptops and network servers and reach our PCs from email web sites downloaded files and loadable media (eg floppy disks CD-ROMs and DVDs)

How Does A Virus Or Worm Infection Affect UsUnfortunately the effects of an infection are pretty unpleasant The virus or worm can

Disable the computer

Add modify or delete files or reformat the hard disk

Steal addresses held in our computer to send on virus-infected emails to our friends colleagues clients or customers

Send unsolicited bulk email (spam) to those in our mail address books and other users

2 Trojan Horses

What Is A Trojan HorseAlthough Trojan horse programs are categorized as viruses they are not true viruses since they do not replicate But like viruses they are one of the most destructive of the Internet risks covered in How Do You Stay Safe On The Internet and are favored by crackers and spyware writers

How Do We Get InfectedTrojans are one of the sneakiest of the online risks They are often downloaded on the back of a free program (freeware) that has some value to the user -- a free game software program or music for instance

How Does A Trojan Infection Affect Us

A Trojan installed on a computer allows that PC to be entered via a backdoor by any remote user that has the access code to the Trojan

The remote attacker can enter the computer undetected when the user is online to access or destroy any information stored Alternatively the Trojan can be programmed to automatically send any information on our PCs back to the attacker This could include

Client or customer information or other business data

Credit card details

Passwords for access to your online bank ISP or web services

Information you would rather remain hidden

Email addresses which may be used for spamming

Childrens names photographs ages or other personal details held on the computer

Distributed Denial of Service (DDOS) attack on other computers via the victims computer

No wonder we ask how do you stay safe on the Internet

3 How Do You Stay Safe On The InternetRootkitsWhat Is A RootkitRootkits are not destructive in their own right but they are designed to conceal the presence of malicious programs on a computer

How Do We Get InfectedAs with any malware such as viruses worms Trojans and spyware rootkits get onto our computers by various means such as through spam attachments being opened on the back of free downloads or planted by crackers who have breached computer defenses

How Does A Rootkit Affect UsRootkits are there for one reason only to ensure that an intruder can access our system and take control without detection by defenses to guard privacy and security

One of the most common and worrying uses of rootkits which causes us to ask How Do You Stay Safe On The Internet is to launch spam and denial of service (DOS) attacks against other computers or networks Another use of

rootkits is to hide Trojans so an intruder can easily use it to extract data from your computer as mentioned above

4 Crackers And Hackers

What Is A HackerCrackerThe term hacker is a misused term We should really be referring to a cracker to describe those who break security on a computer system

The original term hacker refers to computer enthusiasts who enjoy learning everything about a computer system

How Do We Get AttackedCrackers run programs that scan computer ports over the Internet to work out which ports are accessible If our computer shows up in one of these scans the cracker may decide to enter our PC

Crackers favorite targets are the home and home office computers connected by broadband to the Internet because the connection is always open there is more opportunity to locate these computers with their scanners

Alternatively crackers may just exploit weaknesses that have not been patched in the computers operating system in order to gain entry As discussed above Trojans are another way crackers use to gain access to our PCs

How Does A Cracker Affect UsBesides the potentially valuable information they can obtain from our PCs such as that listed under Trojans these intruders also want our hard disk space and Internet connection With these resources they can use our computers to send out spam or attack other computers on the Internet and all this can be done without our knowledge Another reason why we should know how do you stay safe on the Internet

5 Spam -- Unsolicited Email

What Is SpamSpam is defined in Dictionarycom as Unsolicited e-mail often of a commercial nature sent indiscriminately to multiple mailing lists individuals or newsgroups junk e-mail

Spammers peddle pornography sexual aids diet pills and get-rich-quick schemes in fact anything that has a perceived value

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

I LESSON 1 The INRODUCTION

HistoryObjectives

Define and describe the Internet To know the resources of internet Define the Internet backbone

A What is InternetB The History

B1 History PreviewB2 Overview of Internet

I What people do when surfingI1 Surfing is build for a network and made up of organization

I2 What are the uses of the Internet Communication Information Retrieval Presentation of Information

II LESSON 2 Terms and Web PoliciesObjectives

To know what internet services we have To know what is the risk when your online Define the World Wide Web Explain the work of the Domain Name Service Explain the difference between IP address and domain name How to protect and stay safe online

A Internet AddressesA1 Computer AddressesA2 Domain Names

A3 Personal Addresses

B Internet ServicesB1 Internet Services

B11 EmailB12 Mail ListsB13 FTPB14 GopherB15 Instant Messaging (IM)B16 IRCB17 Newsgroups

B18 Voice over IPB19 World Wide Web (WWW)

C Types of Internet Connection C1 Types of Internet connections

1 Terminal DialupModem (Shell connection)2 SLIP (Serial Line Internet Protocol)3 PPP (Point-to-Point Protocol)4 ISDN (Integrated Services Digital Network)5 DIAS6 Cable Modem7 Digital Subscriber Line (DSL) connection8 Direct Connection (Leased circuit)9 Satellite connections10 Wireless connections

D Computer VirusDifferent Types of Computer Viruses

Resident Viruses Direct Action Viruses Overwrite Viruses Boot Virus Macro Virus Directory Virus Polymorphic Virus File Infectors Companion Viruses FAT Virus Worms Trojans or Trojan Horses Logic Bombs

E How Do You Stay Safe On The Internet

1 Viruses and WormsWhat Is A VirusWhat Is A WormHow Do We Get InfectedHow Does A Virus Or Worm Infection Affect Us

2 Trojan Horses 3 Rootkits 4 Crackers and Hackers 5 Spam 6 Web Bugs 7 Child Security 8 Pop-UpUnder Ads 9 Tracking Cookies

10 Spyware

F Firewall and Protection FIREWALL ANTI-VIRUS

i Different Kind of Anti-Virus

III LESSON 3 Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

The Environments ndash Browser menu1 Different Types of Web Browser Explorer2 The Browser

21 How Does The Internet Work22 What Can I Do On The Internet

a E-mail (electronic-mail)b Informationc Group Discussiond Entertainmente Newsf Online Shoppingg Free Program (Software)h Chati Cookiesj Cyberspace

3 How To Accessing Internet Connection and Open How to open IE Accessing The Internet Connection Dial-up or direct connection

o Before you can even begin to surf the net you have to be connectedo Steps Getting Connected to the internet

Opening The IE

4 The Environment

Parts of Internet Explorer 7

5 Activities that can do while or after surfinga) How to Copy or Save Image Using Internet Browserb) Print Web Pagesc) Save Book Mark Favorite Websited) Define Search Engine and a subject Guidee) Save Favorite Website on a storage disk

IV LESSON 4 Using Web Browser Manage User

a Using Web Browser1 Website

a Internet Addressesi World Wide Web

ii Domain Name and Extension Name Domain Extension Name

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

3 Uploading and Downloadingi Upload a File

Instructions and Rules uploading a fileii Downloading a File

Procedure and Rules before Downloadiii Buffering

Buffering Over the Internet

5 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this layer Understand the types of signaling

Define multiplexing

OSI Physical layer Services and Functions OSI Model

V TERMS and TERMINOLOGIES

I LESSON 1 The INRODUCTION

Objectives Define and describe the Internet To know the resources of internet Define the Internet backbone

History

A What is Internet

A world wide network of computer network Internet Connected VIA Telecommunication Links The information ldquoSuper Highwayrdquo Mother of all Network

Introduction of InternetThe internet is a global of interconnected government academic public and

private computer networks which is based upon the networking technologies of the Internet Protocol Suite It is the successor of the Advanced Research Project Agency Network (ARPANET) developed by DARPA of the US Department of Defense

The Internet is also a communications backbone underlying the World Wide Web (WWW)

The Internet changes so quickly and the technology advances so rapidly that it can seem almost impossible to keep up with all of it If youre like just about everyone else involved in the Internet your questions are similar to those of my friend Youll find your answers here

C The History

Objectives To know Origin of Internet History To Create a digital archive or source materials about the creation and

evolution of the Internet

Generate new historical material through the collection of commentaries that include participants stories observations perspectives and memories

B1 History Preview

1957 (Potential Origin and Beginning -- The History of the Internet)The USSR launches Sputnik the first artificial earth satellite In response the United States forms the Advanced Research Projects Agency (ARPA) within the Department of Defense (DoD) to establish US lead in science and technology applicable to the militaryBackbones None - Hosts None

1962 RAND Paul Baran of the RAND Corporation (a government agency) was commissioned by the US Air Force to do a study on how it could maintain its command and control over its missiles and bombers after a nuclear attack This was to be a military research network that could survive a nuclear strike decentralized so that if any locations (cities) in the US were attacked the military could still have control of nuclear arms for a counter-attack

Barans finished document described several ways to accomplish this His final proposal was a packet switched network

Packet switching is the breaking down of data into datagrams or packets that are labeled to indicate the origin and the destination of the information and the forwarding of these packets from one computer to another computer until the information arrives at its final destination computer This was crucial to the realization of a computer network If packets are lost at any given point the message can be resent by the originatorBackbones None - Hosts None

1968 ARPA awarded the ARPANET contract to BBN BBN had selected a Honeywell minicomputer as the base on which they would build the switch The physical network was constructed in 1969 linking four nodes University of California at Los Angeles SRI (in Stanford) University of California at Santa Barbara and University of Utah The network was wired together via 50 Kbps circuitsBackbones 50Kbps ARPANET - Hosts 4

1972 The first e-mail program was created by Ray Tomlinson of BBNThe Advanced Research Projects Agency (ARPA) was renamed The Defense Advanced Research Projects Agency (or DARPA)

ARPANET was currently using the Network Control Protocol or NCP to transfer data This allowed communications between hosts running on the same networkBackbones 50Kbps ARPANET - Hosts 23

1973 Development began on the protocol later to be called TCPIP

It was developed by a group headed by Vinton Cerf from Stanford and Bob Kahn from DARPA This new protocol was to allow diverse computer networks to interconnect and communicate with each otherBackbones 50Kbps ARPANET - Hosts 23+

1974 First Use of term Internet by Vint Cerf and Bob Kahn in paper on Transmission Control ProtocolBackbones 50Kbps ARPANET - Hosts 23+

1976 Dr Robert M Metcalfe develops Ethernet which allowed coaxial cable to move data extremely fast This was a crucial component to the development of LANsThe packet satellite project went into practical use SATNET Atlantic packet Satellite network was born This network linked the United States with Europe Surprisingly it used INTELSAT satellites that were owned by a consortium of countries and not exclusively the United States government

UUCP (Unix-to-Unix CoPy) developed at ATampT Bell Labs and distributed with UNIX one year later

The Department of Defense began to experiment with the TCPIP protocol and soon decided to require it for use on ARPANETBackbones 50Kbps ARPANET plus satellite and radio connections - Hosts 111+

1979 USENET (the decentralized news group network) was created by Steve Bellovin a graduate student at University of North Carolina and programmers Tom Truscott and Jim Ellis It was based on UUCP

The Creation of BITNET by IBM Because its Time Network introduced the store and forward network It was used for email and listservsBackbones 50Kbps ARPANET plus satellite and radio connections - Hosts 111+

1981 National Science Foundation Created backbone called CSNET 56 Kbps network for institutions without access to ARPANET Vinton Cerf proposed a plan for an inter-network connection between CSNET and the ARPANETBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 213

1983 Internet Activities Board (IAB) was created in 1983On January 1st every machine connected to ARPANET had to use TCPIP TCPIP became the core Internet protocol and replaced NCP entirely

The University of Wisconsin created Domain Name System (DNS) This allowed packets to be directed to a domain name which would be translated by the server database into the

corresponding IP number This made it much easier for people to access other servers because they no longer had to remember numbersBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 562

1984 The ARPANET was divided into two networks MILNET and ARPANET MILNET was to serve the needs of the military and ARPANET to support the advanced research component Department of Defense continued to support both networks

Upgrade to CSNET was contracted to MCI New circuits would be T1 lines15 Mbps which is twenty-five times faster than the old 56 Kbps lines IBM would provide advanced routers and Merit would manage the network New network was to be called NSFNET (National Science Foundation Network) and old lines were to remain called CSNETBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 1024

1985 The National Science Foundation began deploying its new T1 lines which would be finished by 1988Backbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 1961

1986 The Internet Engineering Task Force or IETF was created to serve as a forum for technical coordination by contractors for DARPA working on ARPANET US Defense Data Network (DDN) and the Internet core gateway systemBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 2308

1987 BITNET and CSNET merged to form the Corporation for Research and Educational Networking (CREN) another work of the National Science FoundationBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 28174

1988 Soon after the completion of the T1 NSFNET backbone traffic increased so quickly that plans immediately began on upgrading the network againBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 56000

1990 (Updated 82001) Merit IBM and MCI formed a not for profit corporation called ANS Advanced Network amp Services which was to conduct research into high speed networking It soon came up with the concept of the T3 a 45 Mbps line NSF quickly adopted the new network and by the end of 1991 all of its sites were connected by this new backbone

While the T3 lines were being constructed the Department of Defense disbanded the ARPANET and it was replaced by the NSFNET backbone The original 50Kbs lines of ARPANET were taken out of service

Tim Berners-Lee and CERN in Geneva implements a hypertext system to provide efficient information access to the members of the international high-energy physics communityBackbones 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 313000

1991CSNET (which consisted of 56Kbps lines) was discontinued having fulfilled its important early role in the provision of academic networking service A key feature of CREN is that its operational costs are fully met through dues paid by its member organizations

The NSF established a new network named NREN the National Research and Education Network The purpose of this network is to conduct high speed networking research It was not to be used as a commercial network nor was it to be used to send a lot of the data that the Internet now transfersBackbones Partial 45Mbps (T3) NSFNET a few private backbones plus satellite and radio connections - Hosts 617000

1992 Internet Society is chartered

World-Wide Web released by CERNNSFNET backbone upgraded to T3 (44736Mbps)Backbones 45Mbps (T3) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps plus satellite and radio connections - Hosts 1136000

1993 InterNIC created by NSF to provide specific Internet services directory and database services (by ATampT) registration services (by Network Solutions Inc) and information services (by General AtomicsCERFnet)

Marc Andreessen and NCSA and the University of Illinois develops a graphical user interface to the WWW called Mosaic for XBackbones 45Mbps (T3) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps and 45Mpbs lines plus satellite and radio connections - Hosts 2056000

1994 No major changes were made to the physical network The most significant thing that happened was the growth Many new networks were added to the NSF backbone Hundreds of thousands of new hosts were added to the INTERNET during this time period

Pizza Hut offers pizza ordering on its Web page

First Virtual the first cyberbank opens

ATM (Asynchronous Transmission Mode 145Mbps) backbone is installed on NSFNETBackbones 145Mbps (ATM) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps and 45Mpbs lines plus satellite and radio connections - Hosts 3864000

1995 The National Science Foundation announced that as of April 30 1995 it would no longer allow direct access to the NSF backbone The National Science Foundation contracted with four companies that would be providers of access to the NSF backbone (Merit) These companies would then sell connections to groups organizations and companies

$50 annual fee is imposed on domains excluding edu and gov domains which are still funded by the National Science FoundationBackbones 145Mbps (ATM) NSFNET (now private) private interconnected backbones consisting mainly of 56Kbps 1544Mbps 45Mpbs 155Mpbs lines in construction plus satellite and radio connections - Hosts 6642000

1996 Most Internet traffic is carried by backbones of independent ISPs including MCI ATampT Sprint UUnet BBN planet ANS and more

The Internet Society the group that controls the INTERNET researches new TCPIP technology that will be able to have more than the approximately 43 billion addresses currently available The problem that has arisen is that it is not known how both the old and the new addressing systems will be able to work at the same time during a transition period

Internet2 is established

(Backbone data below was valid in 1996 please seek other references for current backbone and host data as it is constantly expanded)Backbones 145Mbps (ATM) NSFNET (now private) private interconnected backbones consisting mainly of 56Kbps 1544Mbps 45Mpbsand 155Mpbs lines plus satellite and radio connections - Hosts over 15000000 and growing rapidly

The Present and The Future

A new technology recommendation called IPv6 is suggested to replace the current IPv4 technology IPv4 allows for fewer than 43 billion directly connected Internet devices problematic because the world population (as of 2009) is well over 65 billion (theoretically if ever human had a computer and mobile phone wed need 13 billion addresses which is something IPv6 can easily accomplish)

In 1999 a wireless technology called 80211b more commonly referred to as Wi-Fi is standardized Over the years that follow this technology begins appearing as a built-in feature of portable computers and many handheld devices

In 2005 the One Laptop Per Child project begins In an attempt to provide low cost education-designed laptops to children around the world for a low cost (US$100 per unit) this project helps spark the netbook industry Netbooks are small portable computers with extended battery life and built-in Wi-Fi connectivity

Multi-touch technology begins to appear in handheld devices tablet computers and netbooks This technology supplements traditional touch-screen technology by allowing advanced gesturing (several fingers moving on a screen instead of just one) Multi-touch technology is seen as a possible alternative to traditional keyboard and mouse (touchpad) systems

Read Bill Buxtons Overview and History of Multi-Touch Systems entitled Multi-Touch Systems that I Have Known and Loved

In December 2009 the first multi-touch website is reported

B2 Overview of InternetThe Internet is a global computer network made up of smaller computer networks

it hasbeen called a Network of NetworksThese smaller networks include1048707 Local Area Networks (like networked offices or computer labs and campus-wide

networks)1048707 Wide Area Networks (like city-wide networks)1048707 State and Regional Networks (including regional service providers and others)1048707 National and International Networks

There is no one inventor of the Internet The Internet was created in the 1960s as a huge network linking big university and government computers The science behind the Internet was invented during the Cold War when the United States was in competition against Russia for weapons and technology So the Internet is actually pretty oldmdasharound forty years Much of Internetrsquos initial development was supported by American governmental research and network development (beginning with the American militarys ARPANET in 1969)In fact email has been around since 1972 In 1989 that Tim Berners-Lee a scientist at the European Laboratory for Particle Physics in Geneva proposed the World Wide Web Now Internet Service Providers (ISPs) offer Internet access to their clients at costs ranging from Rs 150- per 6 months to hundreds of rupees per year depending on the types of service they offer

II What people do when surfing People usually get to surfing to internet to do things that are complicated

for them They do a short time for them while surfing depends from the user surfing is the very easiest thing to search for what you want to know

Surfing is one where you can get information access to an educational learning where you can also communicate for an entertainment or an Personal Information

Surfing is one of the easiest way of sharing files and document or any personal data

I1 Surfing is build for a network and made up of organization

i Communication ii Education

iii Business managements Commercial Company iv Government v Private Organization

vi Entertainment

I2 What are the uses of the Internet

There are three fundamental uses of the Internet Communication Information Retrieval Presentation of Information

Communication The Internet is used both for one-to-one communications (email and real-time chat

programs) and one-to-many

Information Retrieval The Internet allows access to public domain information bibliographic databases

libraries and entertainment services as well as to proprietary information services

Presentation of Information Any organization connected to the Internet can provide access to its own in-house

information (library catalogs faculty information etc) to millions of people world-wide Individuals can also develop and provide their own information packages via their own

home pages

II Terms and Web PoliciesObjectives

To know the resources of internet Navigate around the web using Internet Explorer To know what internet services we have To know what is the risk when your online Define the World Wide Web Explain the work of the Domain Name Service Explain the difference between IP address and domain name How to protect and stay safe online

A Internet Addresses

Every computer file of information and person on the Internet is identified by a unique address

A1 Computer AddressesComputer addresses are made up of three parts (or in some cases two parts) separated

by dots like this computer-nameinstitutiondomain

The computer name is a name given locally to identify a particular computer it is in some cases omitted from the address The institution name is the name (or an abbreviation) of the name of the school company or other institution housing the computer The domain name specifies either the type or the geographic location of the computer

A2 Domain NamesThere are several possible domain names including some that identify the type of institution and some that identify a geographical location They include

edu Educational institutioncom Commercial and profitable organizationsorg Non-profitable organizations

net Internet infrastructure and service providersgov Governmental agencydepartmentmil American military agencyint International organizationsus United Statesin Indiamy Malaysiaca Canadajp Japanbiz Businessaero Aeronautics

A3 Personal Addresses

A persons address (or their email address) places the users username (or login) and the symbol before the computer address For example a user whose username is creator who is accessing email from the yahoo server of United State Yahoo Website would have the following address creatoryahoocom

B Internet Services

B1 Internet Services

rdquoInternet servicesrdquo serve more sophisticated and multi-purpose purposes and increasingly make the Internet a truly useful information resource

B11 EmailIt is the Internets version of the postal service Using the Internet it provides the ability to send a message reply to a message send a file created in another program andor even send the same message to a group of people Some benefits of Email arebull Speed A message can be sent from Chennai to Australia in a matter of secondsbull Cost Emails are cheap You are usually only charged for the telephone call time (local call rate) for sending the message into the Internet and not the cost associated with transferring the message across the Internetbull Flexibility It is easy to send duplicates of your messages to other people or groups for the cost of a single messagebull Record keeping Messages sent and received can be easily stored for future referenceIn order to use Email you will need Internet access arranged through an InternetService Provider (ISP) who will allocate you one or a number of Email accounts To be able to retrieve and send mail from these addresses a user will need what is known as Email client software and your ISP usually provides this although nowadays most computers come with it pre-installed

B12 Mail Lists

These use email to support discussion groups on a wide range of specific subjectsOnce you are becoming a subscriber of a mailing list you will receive lot of emails related to the subject covered by the mailing list

B13 FTPFTP was the original Internet mechanism for the storage and retrieval of information There are still many FTP Sites around the Internet although many of them have been melded into the World Wide Web In computer science FTP stands for File Transfer Protocol which is a way of transferring files between computers A file can be anything -- a spreadsheet a word document a song or a picture When someone says Please FTP me that file for instance that means Please transfer that file from your computer to mine To FTP you usually need to download a special program or application You also usually need a password to be able to access or send information to someone elses computer

B14 GopherGopher was developed at the University of Minnesota primarily to support its own Campus Wide Information Server (CWIS) It provides access to information available either locally or elsewhere on the Internet by means of a simple series of uniformly designed menus

B15 Instant Messaging (IM)There are lots of other fun and useful IM features you can explore like group chats file transfers voice calls video conferencing and emoticons that reflect your mood

B16 IRCIRC stands for Internet Relay Chat It has been used in many countries around the world IRC is a multi-user chat system where people meet on channels (rooms virtual places usually with a certain topic of conversation) to talk in groups or privately There is no restriction to the number of people that can participate in a given discussion or the number of channels that can be formed on IRC

B17 NewsgroupsThe Internet has a place where we can gather question and discuss our experiences within a wide variety of topics Its called Usenet News Some users also call it Net NewsThink of Usenet News as a giant worldwide bulletin board Anyone can freely post something on this bulletin board Everyone else can read the posted items and add their own items These voluntary contributions and free exchange of information are the foundation of the Internet

B18 Voice over IPVoice over IP (Voice over Internet Protocol or VoIP) technology converts voice calls from analog to digital to be sent over digital data networks In Voice over IP or VoIP voice data and video all travel along the network

B19 World Wide Web (WWW)The newest information application on the Internet the WWW provides standardized access to Gopher FTP Telnet and more by means of home pages designed either by institutions or

b individuals By means of the HyperText Markup Language (HTML) it allows users to point at highlighted terms following links to whatever information interests them It is a multimedia environment allowing Internet users access to audio and video materials There are a number of client software packages (or browsers) including Lynx (a textonly browser) Netscape and Microsofts Internet Explorer (which are multimedia browsers)

C Types of Internet Connection

C1 Types of Internet connections

The options for providing user connectivity to the Internet are given below

1 Terminal DialupModem (Shell connection)1048707 Most common option1048707 User requirements limited to modem and communications software1048707 Text-only access1048707 Shell accounts were more popular before the advent of the Web A shell account lets

you use your computer much as if it were a virtual console associated with a remote computer You can type commands which are interpreted by the remote computer and view the resulting output on your computer Although a few web browsers such as Lynx can operate via a shell account they donrsquot generally support the highly graphical multimedia pages which web surfers have come to expect

2 SLIP (Serial Line Internet Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software SLIP software amp software for Internet

applications1048707 Multimedia access

3 PPP (Point-to-Point Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software PPP software amp software for Internet

applications1048707 Multimedia access1048707 While your computer is connected to the Internet you can use it to surf the Web with

your favorite browser If your ISP allows you can even run a web server providing pages that can be viewed by others around the world

4 ISDN (Integrated Services Digital Network)1048707 Most often used to connect remote telecommuters to office LANs1048707 Requires ISDN phone line access1048707 Faster than analog terminal dialupmodem service

1048707 User must have ISDN phone line ISDN card communications software TCP software amp SLIP or PPP software multimedia connectivity

5 DIAS1048707 The DIAS offers a wire-line solution for high speed symmetrical Internet access on the

existing telephone lines It provides an always on internet access that is permanently available at customers premises DIAS combines voice and internet data packets on a single twisted pair wire at subscriber premises that means you can use telephone and surf internet at the same time

6 Cable Modem1048707 The term ldquoCable Modemrdquo is quite new and refers to a modem that operates over the

ordinary cable TV network cables Basically you just connect the Cable Modem to the TV outlet for your cable TV and the cable TV operator connects a Cable Modem Termination System (CMTS) in his end (the Head-End)

1048707 Actually the term ldquoCable Modemrdquo is a bit misleading as a Cable Modem works more like a Local Area Network (LAN) interface than as a modem

1048707 In a cable TV system signals from the various channels are each given a 6-MHz slice of the cablersquos available bandwidth and then sent down the cable to your house When a cable company offers Internet access over the cable Internet information can use the same cables because the cable modem system puts downstream data ndash data sent from the Internet to an individual computer ndash into a 6-MHz channel On the cable the data looks just like a TV channel So Internet downstream data takes up the same amount of cable space as any single channel of programming Upstream data ndash information sent from an individual back to the Internet ndash requires even less of the cablersquos bandwidth just 2 MHz since the assumption is that most people download far more information than they upload

1048707 Putting both upstream and downstream data on the cable television system requires two types of equipment a cable modem on the customer end and a cable modem termination system (CMTS) at the cable providerrsquos end Between these two types of equipment all the computer networking security and management of Internet access over cable television is put into place

7 Digital Subscriber Line (DSL) connection1048707 DSL is a very high-speed connection that uses the same wires as a regular telephone

line1048707 Here are some advantages of DSL

1 You can leave your Internet connection open and still use the phone line for voice calls

2 The speed is much higher than a regular modem3 DSL doesnrsquot necessarily require new wiring it can use the phone line you

already have4 The company that offers DSL (eg BSNL) will usually provide the modem as

part of the installation1048707 But there are disadvantages

1 A DSL connection works better when you are closer to the providerrsquos central office

2 The service is not available everywhere1048707 Other types of DSL include

1 Asymmetric DSL (ADSL) line ndash The connection is faster for receiving data than it is for sending data over the Internet

2 Very high bit-rate DSL (VDSL) ndash This is a fast connection but works only over a short distance

3 Symmetric DSL (SDSL) ndash This connection used mainly by small businesses doesnrsquot allow you to use the phone at the same time but the speed of receiving and sending data is the same

4 Rate-adaptive DSL (RADSL) ndash This is a variation of ADSL but the modem can adjust the speed of the connection depending on the length and quality of the line

8 Direct Connection (Leased circuit)1048707 Most often used to connect sites within a specific organization such as a university or

business requires owning or leasing of cable (from 64 kbps to T-3) users typically connected via Ethernet LANs multimedia connectivity at its fastest

9 Satellite connections1048707 This connection allows you to download Internet files via a satellite connection This is

an efficient method for receiving large Web graphics and other items but you still need a modem connection for other features You must purchase the connection hardware as well as subscribe to the service

10 Wireless connections1048707 Pagers cellular phones and personal digital assistants (PDAs) now allow varying levels

of Internet access from notification of E-mail to limited Web connections Many of these services remain in the experimental stage The PPP connection is called as TCPIP connection or PSTN dial-up connection ISDN connection is called as ISDN dial-up connection Cable Modem DSL and Direct Connection are always-on connection The words ldquoconnectionrdquo and ldquoaccountrdquo related to Internet are interchangeable

D Computer Virus

The Internet just like the rest of the world is not a perfectly safe place to visit If you download files from the Internet there is a chance a very small chance but nonetheless a chance that your computer could become infected with a virus

Viruses are malicious programs that invade your computer They can cause many different kinds of damage such as deleting data files erasing programs or destroying

everything they find on your hard disk Not every virus causes damage some simply flash annoying messages

Different Types of Computer VirusesThere are Different Types of Computer Viruses could be classified in

(origin techniques types of files they infect where they hide the kind of damage they cause the type of operating system or platform they attack) etc Let us have a look at themhellip

Computer Virus is a kind of malicious software written intentionally to enter a computer without the userrsquos permission or knowledge with an ability to replicate itself thus continuing to spread Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system A virus should never be assumed harmless and left on a system Most common types of viruses are mentioned below

Resident VirusesThis type of virus is a permanent which dwells in the RAM memory From

there it can overcome and interrupt all of the operations executed by the system corrupting files and programs that are opened closed copied renamed etc

Examples include Randex CMJ Meve and MrKlunky

Direct Action VirusesThe main purpose of this virus is to replicate and take action when it is

executed When a specific condition is met the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXECBAT file PATH This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted

Overwrite VirusesVirus of this kind is characterized by the fact that it deletes the information

contained in the files that it infects rendering them partially or totally useless once they have been infected

The only way to clean a file infected by an overwrite virus is to delete the file completely thus losing the original content

Examples of this virus include Way TrjReboot Trivial88D

Boot Virus

This type of virus affects the boot sector of a floppy or hard disk This is a crucial part of a disk in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive

Examples of boot viruses include PolybootB AntiEXE

Macro VirusMacro viruses infect files that are created using certain applications or

programs that contain macros These mini-programs make it possible to automate series of operations so that they are performed as a single action thereby saving the user from having to carry them out one by one

Examples of macro viruses Relax MelissaA Bablas O97MY2K

Directory VirusDirectory viruses change the paths that indicate the location of a file By

executing a program (file with the extension EXE or COM) which has been infected by a virus you are unknowingly running the virus program while the original file and program have been previously moved by the virus

Once infected it becomes impossible to locate the original files

Polymorphic VirusPolymorphic viruses encrypt or encode themselves in a different way

(using different algorithms and encryption keys) every time they infect a system

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves

Examples include Elkern Marburg Satan Bug and Tuareg

File InfectorsThis type of virus infects programs or executable files (files with an EXE

or COM extension) When one of these programs is run directly or indirectly the virus is activated producing the damaging effects it is programmed to carry out The majority of existing viruses belong to this category and can be classified depending on the actions that they carry out

Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types They are known as companion viruses because once they get into the system they accompany the other files that already exist In other words in order to carry out their infection routines companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses)

Some examples include Stator Asimov1539 and Terrax1069

FAT VirusThe file allocation table or FAT is the part of a disk used to connect

information and is a vital part of the normal functioning of the computerThis type of virus attack can be especially dangerous by preventing access to certain sections of the disk where important files are stored Damage caused can result in information losses from individual files or even entire directories

WormsA worm is a program very similar to a virus it has the ability to self-

replicate and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses

Examples of worms include PSWBugbearB LovgateF TrileC SobigD Mapson

Trojans or Trojan HorsesAnother unsavory breed of malicious code are Trojans or Trojan horses

which unlike viruses do not reproduce by infecting other files nor do they self-replicate like worms

Logic BombsThey are not considered viruses because they do not replicate They are not

even programs in their own right but rather camouflaged segments of other programs

Their objective is to destroy data on the computer once certain conditions have been met Logic bombs go undetected until launched and the results can be destructive

E How Do You Stay Safe On The Internet

The first part of the answer to the question How do you stay safe on the Internet is know what the threats are that you and your computer are up against

Without this knowledge how are you going to know youve got everything covered off Do you just rely on what the security software vendors tell you to spend your money on

By being aware of what the risks are I suggest you will save yourself money and have more effective protection when it comes to the second part of the answer to the question How do you stay safe on the Internet selecting effective prevention and protection to guard privacy and online security

To help you decide what is necessary for your particular protection in The Three Levels Of Internet Risk Protection I talk about the safe practices that help protect your computer and the types of software to use -- from those that are absolutely essential for security to others which you may want to install to guard privacy to the level you desire

But back to this article How Do You Stay Safe On The Internet here Ill provide you with an introduction to each type of threat At the end of it youll have a good feel for the dangers on the Internet and how those threats can affect you your PC and your information be it personal financial family or business

There are ten of the most prevalent threats covered here Either go through them all or click on the links below for those you are particularly interested in

1 Viruses and Worms 2 Trojan Horses 3 Rootkits 4 Crackers and Hackers 5 Spam 6 Web Bugs 7 Child Security 8 Pop-UpUnder Ads 9 Tracking Cookies 10 Spyware

By the way Ive tried to keep the technical language simple but if you dont understand some of the terms check them out at Netlingo which provides definitions and explanations for all Net terminology

1 Viruses And Worms

What Is A VirusA virus is a man-made computer program that infects a file or program on our computers Each time the infected program is run the virus is also triggered It spreads itself by infecting other programs on the same computer

What Is A WormA worm is also a man-made program that replicates itself However unlike a virus it does not infect other program files on the computer Instead a worm spreads itself automatically to other computers through email over a network and via Internet Relay Chat (IRC)

How Do We Get InfectedViruses and worms can infect desktop computers laptops and network servers and reach our PCs from email web sites downloaded files and loadable media (eg floppy disks CD-ROMs and DVDs)

How Does A Virus Or Worm Infection Affect UsUnfortunately the effects of an infection are pretty unpleasant The virus or worm can

Disable the computer

Add modify or delete files or reformat the hard disk

Steal addresses held in our computer to send on virus-infected emails to our friends colleagues clients or customers

Send unsolicited bulk email (spam) to those in our mail address books and other users

2 Trojan Horses

What Is A Trojan HorseAlthough Trojan horse programs are categorized as viruses they are not true viruses since they do not replicate But like viruses they are one of the most destructive of the Internet risks covered in How Do You Stay Safe On The Internet and are favored by crackers and spyware writers

How Do We Get InfectedTrojans are one of the sneakiest of the online risks They are often downloaded on the back of a free program (freeware) that has some value to the user -- a free game software program or music for instance

How Does A Trojan Infection Affect Us

A Trojan installed on a computer allows that PC to be entered via a backdoor by any remote user that has the access code to the Trojan

The remote attacker can enter the computer undetected when the user is online to access or destroy any information stored Alternatively the Trojan can be programmed to automatically send any information on our PCs back to the attacker This could include

Client or customer information or other business data

Credit card details

Passwords for access to your online bank ISP or web services

Information you would rather remain hidden

Email addresses which may be used for spamming

Childrens names photographs ages or other personal details held on the computer

Distributed Denial of Service (DDOS) attack on other computers via the victims computer

No wonder we ask how do you stay safe on the Internet

3 How Do You Stay Safe On The InternetRootkitsWhat Is A RootkitRootkits are not destructive in their own right but they are designed to conceal the presence of malicious programs on a computer

How Do We Get InfectedAs with any malware such as viruses worms Trojans and spyware rootkits get onto our computers by various means such as through spam attachments being opened on the back of free downloads or planted by crackers who have breached computer defenses

How Does A Rootkit Affect UsRootkits are there for one reason only to ensure that an intruder can access our system and take control without detection by defenses to guard privacy and security

One of the most common and worrying uses of rootkits which causes us to ask How Do You Stay Safe On The Internet is to launch spam and denial of service (DOS) attacks against other computers or networks Another use of

rootkits is to hide Trojans so an intruder can easily use it to extract data from your computer as mentioned above

4 Crackers And Hackers

What Is A HackerCrackerThe term hacker is a misused term We should really be referring to a cracker to describe those who break security on a computer system

The original term hacker refers to computer enthusiasts who enjoy learning everything about a computer system

How Do We Get AttackedCrackers run programs that scan computer ports over the Internet to work out which ports are accessible If our computer shows up in one of these scans the cracker may decide to enter our PC

Crackers favorite targets are the home and home office computers connected by broadband to the Internet because the connection is always open there is more opportunity to locate these computers with their scanners

Alternatively crackers may just exploit weaknesses that have not been patched in the computers operating system in order to gain entry As discussed above Trojans are another way crackers use to gain access to our PCs

How Does A Cracker Affect UsBesides the potentially valuable information they can obtain from our PCs such as that listed under Trojans these intruders also want our hard disk space and Internet connection With these resources they can use our computers to send out spam or attack other computers on the Internet and all this can be done without our knowledge Another reason why we should know how do you stay safe on the Internet

5 Spam -- Unsolicited Email

What Is SpamSpam is defined in Dictionarycom as Unsolicited e-mail often of a commercial nature sent indiscriminately to multiple mailing lists individuals or newsgroups junk e-mail

Spammers peddle pornography sexual aids diet pills and get-rich-quick schemes in fact anything that has a perceived value

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

B18 Voice over IPB19 World Wide Web (WWW)

C Types of Internet Connection C1 Types of Internet connections

1 Terminal DialupModem (Shell connection)2 SLIP (Serial Line Internet Protocol)3 PPP (Point-to-Point Protocol)4 ISDN (Integrated Services Digital Network)5 DIAS6 Cable Modem7 Digital Subscriber Line (DSL) connection8 Direct Connection (Leased circuit)9 Satellite connections10 Wireless connections

D Computer VirusDifferent Types of Computer Viruses

Resident Viruses Direct Action Viruses Overwrite Viruses Boot Virus Macro Virus Directory Virus Polymorphic Virus File Infectors Companion Viruses FAT Virus Worms Trojans or Trojan Horses Logic Bombs

E How Do You Stay Safe On The Internet

1 Viruses and WormsWhat Is A VirusWhat Is A WormHow Do We Get InfectedHow Does A Virus Or Worm Infection Affect Us

2 Trojan Horses 3 Rootkits 4 Crackers and Hackers 5 Spam 6 Web Bugs 7 Child Security 8 Pop-UpUnder Ads 9 Tracking Cookies

10 Spyware

F Firewall and Protection FIREWALL ANTI-VIRUS

i Different Kind of Anti-Virus

III LESSON 3 Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

The Environments ndash Browser menu1 Different Types of Web Browser Explorer2 The Browser

21 How Does The Internet Work22 What Can I Do On The Internet

a E-mail (electronic-mail)b Informationc Group Discussiond Entertainmente Newsf Online Shoppingg Free Program (Software)h Chati Cookiesj Cyberspace

3 How To Accessing Internet Connection and Open How to open IE Accessing The Internet Connection Dial-up or direct connection

o Before you can even begin to surf the net you have to be connectedo Steps Getting Connected to the internet

Opening The IE

4 The Environment

Parts of Internet Explorer 7

5 Activities that can do while or after surfinga) How to Copy or Save Image Using Internet Browserb) Print Web Pagesc) Save Book Mark Favorite Websited) Define Search Engine and a subject Guidee) Save Favorite Website on a storage disk

IV LESSON 4 Using Web Browser Manage User

a Using Web Browser1 Website

a Internet Addressesi World Wide Web

ii Domain Name and Extension Name Domain Extension Name

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

3 Uploading and Downloadingi Upload a File

Instructions and Rules uploading a fileii Downloading a File

Procedure and Rules before Downloadiii Buffering

Buffering Over the Internet

5 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this layer Understand the types of signaling

Define multiplexing

OSI Physical layer Services and Functions OSI Model

V TERMS and TERMINOLOGIES

I LESSON 1 The INRODUCTION

Objectives Define and describe the Internet To know the resources of internet Define the Internet backbone

History

A What is Internet

A world wide network of computer network Internet Connected VIA Telecommunication Links The information ldquoSuper Highwayrdquo Mother of all Network

Introduction of InternetThe internet is a global of interconnected government academic public and

private computer networks which is based upon the networking technologies of the Internet Protocol Suite It is the successor of the Advanced Research Project Agency Network (ARPANET) developed by DARPA of the US Department of Defense

The Internet is also a communications backbone underlying the World Wide Web (WWW)

The Internet changes so quickly and the technology advances so rapidly that it can seem almost impossible to keep up with all of it If youre like just about everyone else involved in the Internet your questions are similar to those of my friend Youll find your answers here

C The History

Objectives To know Origin of Internet History To Create a digital archive or source materials about the creation and

evolution of the Internet

Generate new historical material through the collection of commentaries that include participants stories observations perspectives and memories

B1 History Preview

1957 (Potential Origin and Beginning -- The History of the Internet)The USSR launches Sputnik the first artificial earth satellite In response the United States forms the Advanced Research Projects Agency (ARPA) within the Department of Defense (DoD) to establish US lead in science and technology applicable to the militaryBackbones None - Hosts None

1962 RAND Paul Baran of the RAND Corporation (a government agency) was commissioned by the US Air Force to do a study on how it could maintain its command and control over its missiles and bombers after a nuclear attack This was to be a military research network that could survive a nuclear strike decentralized so that if any locations (cities) in the US were attacked the military could still have control of nuclear arms for a counter-attack

Barans finished document described several ways to accomplish this His final proposal was a packet switched network

Packet switching is the breaking down of data into datagrams or packets that are labeled to indicate the origin and the destination of the information and the forwarding of these packets from one computer to another computer until the information arrives at its final destination computer This was crucial to the realization of a computer network If packets are lost at any given point the message can be resent by the originatorBackbones None - Hosts None

1968 ARPA awarded the ARPANET contract to BBN BBN had selected a Honeywell minicomputer as the base on which they would build the switch The physical network was constructed in 1969 linking four nodes University of California at Los Angeles SRI (in Stanford) University of California at Santa Barbara and University of Utah The network was wired together via 50 Kbps circuitsBackbones 50Kbps ARPANET - Hosts 4

1972 The first e-mail program was created by Ray Tomlinson of BBNThe Advanced Research Projects Agency (ARPA) was renamed The Defense Advanced Research Projects Agency (or DARPA)

ARPANET was currently using the Network Control Protocol or NCP to transfer data This allowed communications between hosts running on the same networkBackbones 50Kbps ARPANET - Hosts 23

1973 Development began on the protocol later to be called TCPIP

It was developed by a group headed by Vinton Cerf from Stanford and Bob Kahn from DARPA This new protocol was to allow diverse computer networks to interconnect and communicate with each otherBackbones 50Kbps ARPANET - Hosts 23+

1974 First Use of term Internet by Vint Cerf and Bob Kahn in paper on Transmission Control ProtocolBackbones 50Kbps ARPANET - Hosts 23+

1976 Dr Robert M Metcalfe develops Ethernet which allowed coaxial cable to move data extremely fast This was a crucial component to the development of LANsThe packet satellite project went into practical use SATNET Atlantic packet Satellite network was born This network linked the United States with Europe Surprisingly it used INTELSAT satellites that were owned by a consortium of countries and not exclusively the United States government

UUCP (Unix-to-Unix CoPy) developed at ATampT Bell Labs and distributed with UNIX one year later

The Department of Defense began to experiment with the TCPIP protocol and soon decided to require it for use on ARPANETBackbones 50Kbps ARPANET plus satellite and radio connections - Hosts 111+

1979 USENET (the decentralized news group network) was created by Steve Bellovin a graduate student at University of North Carolina and programmers Tom Truscott and Jim Ellis It was based on UUCP

The Creation of BITNET by IBM Because its Time Network introduced the store and forward network It was used for email and listservsBackbones 50Kbps ARPANET plus satellite and radio connections - Hosts 111+

1981 National Science Foundation Created backbone called CSNET 56 Kbps network for institutions without access to ARPANET Vinton Cerf proposed a plan for an inter-network connection between CSNET and the ARPANETBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 213

1983 Internet Activities Board (IAB) was created in 1983On January 1st every machine connected to ARPANET had to use TCPIP TCPIP became the core Internet protocol and replaced NCP entirely

The University of Wisconsin created Domain Name System (DNS) This allowed packets to be directed to a domain name which would be translated by the server database into the

corresponding IP number This made it much easier for people to access other servers because they no longer had to remember numbersBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 562

1984 The ARPANET was divided into two networks MILNET and ARPANET MILNET was to serve the needs of the military and ARPANET to support the advanced research component Department of Defense continued to support both networks

Upgrade to CSNET was contracted to MCI New circuits would be T1 lines15 Mbps which is twenty-five times faster than the old 56 Kbps lines IBM would provide advanced routers and Merit would manage the network New network was to be called NSFNET (National Science Foundation Network) and old lines were to remain called CSNETBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 1024

1985 The National Science Foundation began deploying its new T1 lines which would be finished by 1988Backbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 1961

1986 The Internet Engineering Task Force or IETF was created to serve as a forum for technical coordination by contractors for DARPA working on ARPANET US Defense Data Network (DDN) and the Internet core gateway systemBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 2308

1987 BITNET and CSNET merged to form the Corporation for Research and Educational Networking (CREN) another work of the National Science FoundationBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 28174

1988 Soon after the completion of the T1 NSFNET backbone traffic increased so quickly that plans immediately began on upgrading the network againBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 56000

1990 (Updated 82001) Merit IBM and MCI formed a not for profit corporation called ANS Advanced Network amp Services which was to conduct research into high speed networking It soon came up with the concept of the T3 a 45 Mbps line NSF quickly adopted the new network and by the end of 1991 all of its sites were connected by this new backbone

While the T3 lines were being constructed the Department of Defense disbanded the ARPANET and it was replaced by the NSFNET backbone The original 50Kbs lines of ARPANET were taken out of service

Tim Berners-Lee and CERN in Geneva implements a hypertext system to provide efficient information access to the members of the international high-energy physics communityBackbones 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 313000

1991CSNET (which consisted of 56Kbps lines) was discontinued having fulfilled its important early role in the provision of academic networking service A key feature of CREN is that its operational costs are fully met through dues paid by its member organizations

The NSF established a new network named NREN the National Research and Education Network The purpose of this network is to conduct high speed networking research It was not to be used as a commercial network nor was it to be used to send a lot of the data that the Internet now transfersBackbones Partial 45Mbps (T3) NSFNET a few private backbones plus satellite and radio connections - Hosts 617000

1992 Internet Society is chartered

World-Wide Web released by CERNNSFNET backbone upgraded to T3 (44736Mbps)Backbones 45Mbps (T3) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps plus satellite and radio connections - Hosts 1136000

1993 InterNIC created by NSF to provide specific Internet services directory and database services (by ATampT) registration services (by Network Solutions Inc) and information services (by General AtomicsCERFnet)

Marc Andreessen and NCSA and the University of Illinois develops a graphical user interface to the WWW called Mosaic for XBackbones 45Mbps (T3) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps and 45Mpbs lines plus satellite and radio connections - Hosts 2056000

1994 No major changes were made to the physical network The most significant thing that happened was the growth Many new networks were added to the NSF backbone Hundreds of thousands of new hosts were added to the INTERNET during this time period

Pizza Hut offers pizza ordering on its Web page

First Virtual the first cyberbank opens

ATM (Asynchronous Transmission Mode 145Mbps) backbone is installed on NSFNETBackbones 145Mbps (ATM) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps and 45Mpbs lines plus satellite and radio connections - Hosts 3864000

1995 The National Science Foundation announced that as of April 30 1995 it would no longer allow direct access to the NSF backbone The National Science Foundation contracted with four companies that would be providers of access to the NSF backbone (Merit) These companies would then sell connections to groups organizations and companies

$50 annual fee is imposed on domains excluding edu and gov domains which are still funded by the National Science FoundationBackbones 145Mbps (ATM) NSFNET (now private) private interconnected backbones consisting mainly of 56Kbps 1544Mbps 45Mpbs 155Mpbs lines in construction plus satellite and radio connections - Hosts 6642000

1996 Most Internet traffic is carried by backbones of independent ISPs including MCI ATampT Sprint UUnet BBN planet ANS and more

The Internet Society the group that controls the INTERNET researches new TCPIP technology that will be able to have more than the approximately 43 billion addresses currently available The problem that has arisen is that it is not known how both the old and the new addressing systems will be able to work at the same time during a transition period

Internet2 is established

(Backbone data below was valid in 1996 please seek other references for current backbone and host data as it is constantly expanded)Backbones 145Mbps (ATM) NSFNET (now private) private interconnected backbones consisting mainly of 56Kbps 1544Mbps 45Mpbsand 155Mpbs lines plus satellite and radio connections - Hosts over 15000000 and growing rapidly

The Present and The Future

A new technology recommendation called IPv6 is suggested to replace the current IPv4 technology IPv4 allows for fewer than 43 billion directly connected Internet devices problematic because the world population (as of 2009) is well over 65 billion (theoretically if ever human had a computer and mobile phone wed need 13 billion addresses which is something IPv6 can easily accomplish)

In 1999 a wireless technology called 80211b more commonly referred to as Wi-Fi is standardized Over the years that follow this technology begins appearing as a built-in feature of portable computers and many handheld devices

In 2005 the One Laptop Per Child project begins In an attempt to provide low cost education-designed laptops to children around the world for a low cost (US$100 per unit) this project helps spark the netbook industry Netbooks are small portable computers with extended battery life and built-in Wi-Fi connectivity

Multi-touch technology begins to appear in handheld devices tablet computers and netbooks This technology supplements traditional touch-screen technology by allowing advanced gesturing (several fingers moving on a screen instead of just one) Multi-touch technology is seen as a possible alternative to traditional keyboard and mouse (touchpad) systems

Read Bill Buxtons Overview and History of Multi-Touch Systems entitled Multi-Touch Systems that I Have Known and Loved

In December 2009 the first multi-touch website is reported

B2 Overview of InternetThe Internet is a global computer network made up of smaller computer networks

it hasbeen called a Network of NetworksThese smaller networks include1048707 Local Area Networks (like networked offices or computer labs and campus-wide

networks)1048707 Wide Area Networks (like city-wide networks)1048707 State and Regional Networks (including regional service providers and others)1048707 National and International Networks

There is no one inventor of the Internet The Internet was created in the 1960s as a huge network linking big university and government computers The science behind the Internet was invented during the Cold War when the United States was in competition against Russia for weapons and technology So the Internet is actually pretty oldmdasharound forty years Much of Internetrsquos initial development was supported by American governmental research and network development (beginning with the American militarys ARPANET in 1969)In fact email has been around since 1972 In 1989 that Tim Berners-Lee a scientist at the European Laboratory for Particle Physics in Geneva proposed the World Wide Web Now Internet Service Providers (ISPs) offer Internet access to their clients at costs ranging from Rs 150- per 6 months to hundreds of rupees per year depending on the types of service they offer

II What people do when surfing People usually get to surfing to internet to do things that are complicated

for them They do a short time for them while surfing depends from the user surfing is the very easiest thing to search for what you want to know

Surfing is one where you can get information access to an educational learning where you can also communicate for an entertainment or an Personal Information

Surfing is one of the easiest way of sharing files and document or any personal data

I1 Surfing is build for a network and made up of organization

i Communication ii Education

iii Business managements Commercial Company iv Government v Private Organization

vi Entertainment

I2 What are the uses of the Internet

There are three fundamental uses of the Internet Communication Information Retrieval Presentation of Information

Communication The Internet is used both for one-to-one communications (email and real-time chat

programs) and one-to-many

Information Retrieval The Internet allows access to public domain information bibliographic databases

libraries and entertainment services as well as to proprietary information services

Presentation of Information Any organization connected to the Internet can provide access to its own in-house

information (library catalogs faculty information etc) to millions of people world-wide Individuals can also develop and provide their own information packages via their own

home pages

II Terms and Web PoliciesObjectives

To know the resources of internet Navigate around the web using Internet Explorer To know what internet services we have To know what is the risk when your online Define the World Wide Web Explain the work of the Domain Name Service Explain the difference between IP address and domain name How to protect and stay safe online

A Internet Addresses

Every computer file of information and person on the Internet is identified by a unique address

A1 Computer AddressesComputer addresses are made up of three parts (or in some cases two parts) separated

by dots like this computer-nameinstitutiondomain

The computer name is a name given locally to identify a particular computer it is in some cases omitted from the address The institution name is the name (or an abbreviation) of the name of the school company or other institution housing the computer The domain name specifies either the type or the geographic location of the computer

A2 Domain NamesThere are several possible domain names including some that identify the type of institution and some that identify a geographical location They include

edu Educational institutioncom Commercial and profitable organizationsorg Non-profitable organizations

net Internet infrastructure and service providersgov Governmental agencydepartmentmil American military agencyint International organizationsus United Statesin Indiamy Malaysiaca Canadajp Japanbiz Businessaero Aeronautics

A3 Personal Addresses

A persons address (or their email address) places the users username (or login) and the symbol before the computer address For example a user whose username is creator who is accessing email from the yahoo server of United State Yahoo Website would have the following address creatoryahoocom

B Internet Services

B1 Internet Services

rdquoInternet servicesrdquo serve more sophisticated and multi-purpose purposes and increasingly make the Internet a truly useful information resource

B11 EmailIt is the Internets version of the postal service Using the Internet it provides the ability to send a message reply to a message send a file created in another program andor even send the same message to a group of people Some benefits of Email arebull Speed A message can be sent from Chennai to Australia in a matter of secondsbull Cost Emails are cheap You are usually only charged for the telephone call time (local call rate) for sending the message into the Internet and not the cost associated with transferring the message across the Internetbull Flexibility It is easy to send duplicates of your messages to other people or groups for the cost of a single messagebull Record keeping Messages sent and received can be easily stored for future referenceIn order to use Email you will need Internet access arranged through an InternetService Provider (ISP) who will allocate you one or a number of Email accounts To be able to retrieve and send mail from these addresses a user will need what is known as Email client software and your ISP usually provides this although nowadays most computers come with it pre-installed

B12 Mail Lists

These use email to support discussion groups on a wide range of specific subjectsOnce you are becoming a subscriber of a mailing list you will receive lot of emails related to the subject covered by the mailing list

B13 FTPFTP was the original Internet mechanism for the storage and retrieval of information There are still many FTP Sites around the Internet although many of them have been melded into the World Wide Web In computer science FTP stands for File Transfer Protocol which is a way of transferring files between computers A file can be anything -- a spreadsheet a word document a song or a picture When someone says Please FTP me that file for instance that means Please transfer that file from your computer to mine To FTP you usually need to download a special program or application You also usually need a password to be able to access or send information to someone elses computer

B14 GopherGopher was developed at the University of Minnesota primarily to support its own Campus Wide Information Server (CWIS) It provides access to information available either locally or elsewhere on the Internet by means of a simple series of uniformly designed menus

B15 Instant Messaging (IM)There are lots of other fun and useful IM features you can explore like group chats file transfers voice calls video conferencing and emoticons that reflect your mood

B16 IRCIRC stands for Internet Relay Chat It has been used in many countries around the world IRC is a multi-user chat system where people meet on channels (rooms virtual places usually with a certain topic of conversation) to talk in groups or privately There is no restriction to the number of people that can participate in a given discussion or the number of channels that can be formed on IRC

B17 NewsgroupsThe Internet has a place where we can gather question and discuss our experiences within a wide variety of topics Its called Usenet News Some users also call it Net NewsThink of Usenet News as a giant worldwide bulletin board Anyone can freely post something on this bulletin board Everyone else can read the posted items and add their own items These voluntary contributions and free exchange of information are the foundation of the Internet

B18 Voice over IPVoice over IP (Voice over Internet Protocol or VoIP) technology converts voice calls from analog to digital to be sent over digital data networks In Voice over IP or VoIP voice data and video all travel along the network

B19 World Wide Web (WWW)The newest information application on the Internet the WWW provides standardized access to Gopher FTP Telnet and more by means of home pages designed either by institutions or

b individuals By means of the HyperText Markup Language (HTML) it allows users to point at highlighted terms following links to whatever information interests them It is a multimedia environment allowing Internet users access to audio and video materials There are a number of client software packages (or browsers) including Lynx (a textonly browser) Netscape and Microsofts Internet Explorer (which are multimedia browsers)

C Types of Internet Connection

C1 Types of Internet connections

The options for providing user connectivity to the Internet are given below

1 Terminal DialupModem (Shell connection)1048707 Most common option1048707 User requirements limited to modem and communications software1048707 Text-only access1048707 Shell accounts were more popular before the advent of the Web A shell account lets

you use your computer much as if it were a virtual console associated with a remote computer You can type commands which are interpreted by the remote computer and view the resulting output on your computer Although a few web browsers such as Lynx can operate via a shell account they donrsquot generally support the highly graphical multimedia pages which web surfers have come to expect

2 SLIP (Serial Line Internet Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software SLIP software amp software for Internet

applications1048707 Multimedia access

3 PPP (Point-to-Point Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software PPP software amp software for Internet

applications1048707 Multimedia access1048707 While your computer is connected to the Internet you can use it to surf the Web with

your favorite browser If your ISP allows you can even run a web server providing pages that can be viewed by others around the world

4 ISDN (Integrated Services Digital Network)1048707 Most often used to connect remote telecommuters to office LANs1048707 Requires ISDN phone line access1048707 Faster than analog terminal dialupmodem service

1048707 User must have ISDN phone line ISDN card communications software TCP software amp SLIP or PPP software multimedia connectivity

5 DIAS1048707 The DIAS offers a wire-line solution for high speed symmetrical Internet access on the

existing telephone lines It provides an always on internet access that is permanently available at customers premises DIAS combines voice and internet data packets on a single twisted pair wire at subscriber premises that means you can use telephone and surf internet at the same time

6 Cable Modem1048707 The term ldquoCable Modemrdquo is quite new and refers to a modem that operates over the

ordinary cable TV network cables Basically you just connect the Cable Modem to the TV outlet for your cable TV and the cable TV operator connects a Cable Modem Termination System (CMTS) in his end (the Head-End)

1048707 Actually the term ldquoCable Modemrdquo is a bit misleading as a Cable Modem works more like a Local Area Network (LAN) interface than as a modem

1048707 In a cable TV system signals from the various channels are each given a 6-MHz slice of the cablersquos available bandwidth and then sent down the cable to your house When a cable company offers Internet access over the cable Internet information can use the same cables because the cable modem system puts downstream data ndash data sent from the Internet to an individual computer ndash into a 6-MHz channel On the cable the data looks just like a TV channel So Internet downstream data takes up the same amount of cable space as any single channel of programming Upstream data ndash information sent from an individual back to the Internet ndash requires even less of the cablersquos bandwidth just 2 MHz since the assumption is that most people download far more information than they upload

1048707 Putting both upstream and downstream data on the cable television system requires two types of equipment a cable modem on the customer end and a cable modem termination system (CMTS) at the cable providerrsquos end Between these two types of equipment all the computer networking security and management of Internet access over cable television is put into place

7 Digital Subscriber Line (DSL) connection1048707 DSL is a very high-speed connection that uses the same wires as a regular telephone

line1048707 Here are some advantages of DSL

1 You can leave your Internet connection open and still use the phone line for voice calls

2 The speed is much higher than a regular modem3 DSL doesnrsquot necessarily require new wiring it can use the phone line you

already have4 The company that offers DSL (eg BSNL) will usually provide the modem as

part of the installation1048707 But there are disadvantages

1 A DSL connection works better when you are closer to the providerrsquos central office

2 The service is not available everywhere1048707 Other types of DSL include

1 Asymmetric DSL (ADSL) line ndash The connection is faster for receiving data than it is for sending data over the Internet

2 Very high bit-rate DSL (VDSL) ndash This is a fast connection but works only over a short distance

3 Symmetric DSL (SDSL) ndash This connection used mainly by small businesses doesnrsquot allow you to use the phone at the same time but the speed of receiving and sending data is the same

4 Rate-adaptive DSL (RADSL) ndash This is a variation of ADSL but the modem can adjust the speed of the connection depending on the length and quality of the line

8 Direct Connection (Leased circuit)1048707 Most often used to connect sites within a specific organization such as a university or

business requires owning or leasing of cable (from 64 kbps to T-3) users typically connected via Ethernet LANs multimedia connectivity at its fastest

9 Satellite connections1048707 This connection allows you to download Internet files via a satellite connection This is

an efficient method for receiving large Web graphics and other items but you still need a modem connection for other features You must purchase the connection hardware as well as subscribe to the service

10 Wireless connections1048707 Pagers cellular phones and personal digital assistants (PDAs) now allow varying levels

of Internet access from notification of E-mail to limited Web connections Many of these services remain in the experimental stage The PPP connection is called as TCPIP connection or PSTN dial-up connection ISDN connection is called as ISDN dial-up connection Cable Modem DSL and Direct Connection are always-on connection The words ldquoconnectionrdquo and ldquoaccountrdquo related to Internet are interchangeable

D Computer Virus

The Internet just like the rest of the world is not a perfectly safe place to visit If you download files from the Internet there is a chance a very small chance but nonetheless a chance that your computer could become infected with a virus

Viruses are malicious programs that invade your computer They can cause many different kinds of damage such as deleting data files erasing programs or destroying

everything they find on your hard disk Not every virus causes damage some simply flash annoying messages

Different Types of Computer VirusesThere are Different Types of Computer Viruses could be classified in

(origin techniques types of files they infect where they hide the kind of damage they cause the type of operating system or platform they attack) etc Let us have a look at themhellip

Computer Virus is a kind of malicious software written intentionally to enter a computer without the userrsquos permission or knowledge with an ability to replicate itself thus continuing to spread Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system A virus should never be assumed harmless and left on a system Most common types of viruses are mentioned below

Resident VirusesThis type of virus is a permanent which dwells in the RAM memory From

there it can overcome and interrupt all of the operations executed by the system corrupting files and programs that are opened closed copied renamed etc

Examples include Randex CMJ Meve and MrKlunky

Direct Action VirusesThe main purpose of this virus is to replicate and take action when it is

executed When a specific condition is met the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXECBAT file PATH This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted

Overwrite VirusesVirus of this kind is characterized by the fact that it deletes the information

contained in the files that it infects rendering them partially or totally useless once they have been infected

The only way to clean a file infected by an overwrite virus is to delete the file completely thus losing the original content

Examples of this virus include Way TrjReboot Trivial88D

Boot Virus

This type of virus affects the boot sector of a floppy or hard disk This is a crucial part of a disk in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive

Examples of boot viruses include PolybootB AntiEXE

Macro VirusMacro viruses infect files that are created using certain applications or

programs that contain macros These mini-programs make it possible to automate series of operations so that they are performed as a single action thereby saving the user from having to carry them out one by one

Examples of macro viruses Relax MelissaA Bablas O97MY2K

Directory VirusDirectory viruses change the paths that indicate the location of a file By

executing a program (file with the extension EXE or COM) which has been infected by a virus you are unknowingly running the virus program while the original file and program have been previously moved by the virus

Once infected it becomes impossible to locate the original files

Polymorphic VirusPolymorphic viruses encrypt or encode themselves in a different way

(using different algorithms and encryption keys) every time they infect a system

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves

Examples include Elkern Marburg Satan Bug and Tuareg

File InfectorsThis type of virus infects programs or executable files (files with an EXE

or COM extension) When one of these programs is run directly or indirectly the virus is activated producing the damaging effects it is programmed to carry out The majority of existing viruses belong to this category and can be classified depending on the actions that they carry out

Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types They are known as companion viruses because once they get into the system they accompany the other files that already exist In other words in order to carry out their infection routines companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses)

Some examples include Stator Asimov1539 and Terrax1069

FAT VirusThe file allocation table or FAT is the part of a disk used to connect

information and is a vital part of the normal functioning of the computerThis type of virus attack can be especially dangerous by preventing access to certain sections of the disk where important files are stored Damage caused can result in information losses from individual files or even entire directories

WormsA worm is a program very similar to a virus it has the ability to self-

replicate and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses

Examples of worms include PSWBugbearB LovgateF TrileC SobigD Mapson

Trojans or Trojan HorsesAnother unsavory breed of malicious code are Trojans or Trojan horses

which unlike viruses do not reproduce by infecting other files nor do they self-replicate like worms

Logic BombsThey are not considered viruses because they do not replicate They are not

even programs in their own right but rather camouflaged segments of other programs

Their objective is to destroy data on the computer once certain conditions have been met Logic bombs go undetected until launched and the results can be destructive

E How Do You Stay Safe On The Internet

The first part of the answer to the question How do you stay safe on the Internet is know what the threats are that you and your computer are up against

Without this knowledge how are you going to know youve got everything covered off Do you just rely on what the security software vendors tell you to spend your money on

By being aware of what the risks are I suggest you will save yourself money and have more effective protection when it comes to the second part of the answer to the question How do you stay safe on the Internet selecting effective prevention and protection to guard privacy and online security

To help you decide what is necessary for your particular protection in The Three Levels Of Internet Risk Protection I talk about the safe practices that help protect your computer and the types of software to use -- from those that are absolutely essential for security to others which you may want to install to guard privacy to the level you desire

But back to this article How Do You Stay Safe On The Internet here Ill provide you with an introduction to each type of threat At the end of it youll have a good feel for the dangers on the Internet and how those threats can affect you your PC and your information be it personal financial family or business

There are ten of the most prevalent threats covered here Either go through them all or click on the links below for those you are particularly interested in

1 Viruses and Worms 2 Trojan Horses 3 Rootkits 4 Crackers and Hackers 5 Spam 6 Web Bugs 7 Child Security 8 Pop-UpUnder Ads 9 Tracking Cookies 10 Spyware

By the way Ive tried to keep the technical language simple but if you dont understand some of the terms check them out at Netlingo which provides definitions and explanations for all Net terminology

1 Viruses And Worms

What Is A VirusA virus is a man-made computer program that infects a file or program on our computers Each time the infected program is run the virus is also triggered It spreads itself by infecting other programs on the same computer

What Is A WormA worm is also a man-made program that replicates itself However unlike a virus it does not infect other program files on the computer Instead a worm spreads itself automatically to other computers through email over a network and via Internet Relay Chat (IRC)

How Do We Get InfectedViruses and worms can infect desktop computers laptops and network servers and reach our PCs from email web sites downloaded files and loadable media (eg floppy disks CD-ROMs and DVDs)

How Does A Virus Or Worm Infection Affect UsUnfortunately the effects of an infection are pretty unpleasant The virus or worm can

Disable the computer

Add modify or delete files or reformat the hard disk

Steal addresses held in our computer to send on virus-infected emails to our friends colleagues clients or customers

Send unsolicited bulk email (spam) to those in our mail address books and other users

2 Trojan Horses

What Is A Trojan HorseAlthough Trojan horse programs are categorized as viruses they are not true viruses since they do not replicate But like viruses they are one of the most destructive of the Internet risks covered in How Do You Stay Safe On The Internet and are favored by crackers and spyware writers

How Do We Get InfectedTrojans are one of the sneakiest of the online risks They are often downloaded on the back of a free program (freeware) that has some value to the user -- a free game software program or music for instance

How Does A Trojan Infection Affect Us

A Trojan installed on a computer allows that PC to be entered via a backdoor by any remote user that has the access code to the Trojan

The remote attacker can enter the computer undetected when the user is online to access or destroy any information stored Alternatively the Trojan can be programmed to automatically send any information on our PCs back to the attacker This could include

Client or customer information or other business data

Credit card details

Passwords for access to your online bank ISP or web services

Information you would rather remain hidden

Email addresses which may be used for spamming

Childrens names photographs ages or other personal details held on the computer

Distributed Denial of Service (DDOS) attack on other computers via the victims computer

No wonder we ask how do you stay safe on the Internet

3 How Do You Stay Safe On The InternetRootkitsWhat Is A RootkitRootkits are not destructive in their own right but they are designed to conceal the presence of malicious programs on a computer

How Do We Get InfectedAs with any malware such as viruses worms Trojans and spyware rootkits get onto our computers by various means such as through spam attachments being opened on the back of free downloads or planted by crackers who have breached computer defenses

How Does A Rootkit Affect UsRootkits are there for one reason only to ensure that an intruder can access our system and take control without detection by defenses to guard privacy and security

One of the most common and worrying uses of rootkits which causes us to ask How Do You Stay Safe On The Internet is to launch spam and denial of service (DOS) attacks against other computers or networks Another use of

rootkits is to hide Trojans so an intruder can easily use it to extract data from your computer as mentioned above

4 Crackers And Hackers

What Is A HackerCrackerThe term hacker is a misused term We should really be referring to a cracker to describe those who break security on a computer system

The original term hacker refers to computer enthusiasts who enjoy learning everything about a computer system

How Do We Get AttackedCrackers run programs that scan computer ports over the Internet to work out which ports are accessible If our computer shows up in one of these scans the cracker may decide to enter our PC

Crackers favorite targets are the home and home office computers connected by broadband to the Internet because the connection is always open there is more opportunity to locate these computers with their scanners

Alternatively crackers may just exploit weaknesses that have not been patched in the computers operating system in order to gain entry As discussed above Trojans are another way crackers use to gain access to our PCs

How Does A Cracker Affect UsBesides the potentially valuable information they can obtain from our PCs such as that listed under Trojans these intruders also want our hard disk space and Internet connection With these resources they can use our computers to send out spam or attack other computers on the Internet and all this can be done without our knowledge Another reason why we should know how do you stay safe on the Internet

5 Spam -- Unsolicited Email

What Is SpamSpam is defined in Dictionarycom as Unsolicited e-mail often of a commercial nature sent indiscriminately to multiple mailing lists individuals or newsgroups junk e-mail

Spammers peddle pornography sexual aids diet pills and get-rich-quick schemes in fact anything that has a perceived value

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

10 Spyware

F Firewall and Protection FIREWALL ANTI-VIRUS

i Different Kind of Anti-Virus

III LESSON 3 Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

The Environments ndash Browser menu1 Different Types of Web Browser Explorer2 The Browser

21 How Does The Internet Work22 What Can I Do On The Internet

a E-mail (electronic-mail)b Informationc Group Discussiond Entertainmente Newsf Online Shoppingg Free Program (Software)h Chati Cookiesj Cyberspace

3 How To Accessing Internet Connection and Open How to open IE Accessing The Internet Connection Dial-up or direct connection

o Before you can even begin to surf the net you have to be connectedo Steps Getting Connected to the internet

Opening The IE

4 The Environment

Parts of Internet Explorer 7

5 Activities that can do while or after surfinga) How to Copy or Save Image Using Internet Browserb) Print Web Pagesc) Save Book Mark Favorite Websited) Define Search Engine and a subject Guidee) Save Favorite Website on a storage disk

IV LESSON 4 Using Web Browser Manage User

a Using Web Browser1 Website

a Internet Addressesi World Wide Web

ii Domain Name and Extension Name Domain Extension Name

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

3 Uploading and Downloadingi Upload a File

Instructions and Rules uploading a fileii Downloading a File

Procedure and Rules before Downloadiii Buffering

Buffering Over the Internet

5 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this layer Understand the types of signaling

Define multiplexing

OSI Physical layer Services and Functions OSI Model

V TERMS and TERMINOLOGIES

I LESSON 1 The INRODUCTION

Objectives Define and describe the Internet To know the resources of internet Define the Internet backbone

History

A What is Internet

A world wide network of computer network Internet Connected VIA Telecommunication Links The information ldquoSuper Highwayrdquo Mother of all Network

Introduction of InternetThe internet is a global of interconnected government academic public and

private computer networks which is based upon the networking technologies of the Internet Protocol Suite It is the successor of the Advanced Research Project Agency Network (ARPANET) developed by DARPA of the US Department of Defense

The Internet is also a communications backbone underlying the World Wide Web (WWW)

The Internet changes so quickly and the technology advances so rapidly that it can seem almost impossible to keep up with all of it If youre like just about everyone else involved in the Internet your questions are similar to those of my friend Youll find your answers here

C The History

Objectives To know Origin of Internet History To Create a digital archive or source materials about the creation and

evolution of the Internet

Generate new historical material through the collection of commentaries that include participants stories observations perspectives and memories

B1 History Preview

1957 (Potential Origin and Beginning -- The History of the Internet)The USSR launches Sputnik the first artificial earth satellite In response the United States forms the Advanced Research Projects Agency (ARPA) within the Department of Defense (DoD) to establish US lead in science and technology applicable to the militaryBackbones None - Hosts None

1962 RAND Paul Baran of the RAND Corporation (a government agency) was commissioned by the US Air Force to do a study on how it could maintain its command and control over its missiles and bombers after a nuclear attack This was to be a military research network that could survive a nuclear strike decentralized so that if any locations (cities) in the US were attacked the military could still have control of nuclear arms for a counter-attack

Barans finished document described several ways to accomplish this His final proposal was a packet switched network

Packet switching is the breaking down of data into datagrams or packets that are labeled to indicate the origin and the destination of the information and the forwarding of these packets from one computer to another computer until the information arrives at its final destination computer This was crucial to the realization of a computer network If packets are lost at any given point the message can be resent by the originatorBackbones None - Hosts None

1968 ARPA awarded the ARPANET contract to BBN BBN had selected a Honeywell minicomputer as the base on which they would build the switch The physical network was constructed in 1969 linking four nodes University of California at Los Angeles SRI (in Stanford) University of California at Santa Barbara and University of Utah The network was wired together via 50 Kbps circuitsBackbones 50Kbps ARPANET - Hosts 4

1972 The first e-mail program was created by Ray Tomlinson of BBNThe Advanced Research Projects Agency (ARPA) was renamed The Defense Advanced Research Projects Agency (or DARPA)

ARPANET was currently using the Network Control Protocol or NCP to transfer data This allowed communications between hosts running on the same networkBackbones 50Kbps ARPANET - Hosts 23

1973 Development began on the protocol later to be called TCPIP

It was developed by a group headed by Vinton Cerf from Stanford and Bob Kahn from DARPA This new protocol was to allow diverse computer networks to interconnect and communicate with each otherBackbones 50Kbps ARPANET - Hosts 23+

1974 First Use of term Internet by Vint Cerf and Bob Kahn in paper on Transmission Control ProtocolBackbones 50Kbps ARPANET - Hosts 23+

1976 Dr Robert M Metcalfe develops Ethernet which allowed coaxial cable to move data extremely fast This was a crucial component to the development of LANsThe packet satellite project went into practical use SATNET Atlantic packet Satellite network was born This network linked the United States with Europe Surprisingly it used INTELSAT satellites that were owned by a consortium of countries and not exclusively the United States government

UUCP (Unix-to-Unix CoPy) developed at ATampT Bell Labs and distributed with UNIX one year later

The Department of Defense began to experiment with the TCPIP protocol and soon decided to require it for use on ARPANETBackbones 50Kbps ARPANET plus satellite and radio connections - Hosts 111+

1979 USENET (the decentralized news group network) was created by Steve Bellovin a graduate student at University of North Carolina and programmers Tom Truscott and Jim Ellis It was based on UUCP

The Creation of BITNET by IBM Because its Time Network introduced the store and forward network It was used for email and listservsBackbones 50Kbps ARPANET plus satellite and radio connections - Hosts 111+

1981 National Science Foundation Created backbone called CSNET 56 Kbps network for institutions without access to ARPANET Vinton Cerf proposed a plan for an inter-network connection between CSNET and the ARPANETBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 213

1983 Internet Activities Board (IAB) was created in 1983On January 1st every machine connected to ARPANET had to use TCPIP TCPIP became the core Internet protocol and replaced NCP entirely

The University of Wisconsin created Domain Name System (DNS) This allowed packets to be directed to a domain name which would be translated by the server database into the

corresponding IP number This made it much easier for people to access other servers because they no longer had to remember numbersBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 562

1984 The ARPANET was divided into two networks MILNET and ARPANET MILNET was to serve the needs of the military and ARPANET to support the advanced research component Department of Defense continued to support both networks

Upgrade to CSNET was contracted to MCI New circuits would be T1 lines15 Mbps which is twenty-five times faster than the old 56 Kbps lines IBM would provide advanced routers and Merit would manage the network New network was to be called NSFNET (National Science Foundation Network) and old lines were to remain called CSNETBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 1024

1985 The National Science Foundation began deploying its new T1 lines which would be finished by 1988Backbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 1961

1986 The Internet Engineering Task Force or IETF was created to serve as a forum for technical coordination by contractors for DARPA working on ARPANET US Defense Data Network (DDN) and the Internet core gateway systemBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 2308

1987 BITNET and CSNET merged to form the Corporation for Research and Educational Networking (CREN) another work of the National Science FoundationBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 28174

1988 Soon after the completion of the T1 NSFNET backbone traffic increased so quickly that plans immediately began on upgrading the network againBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 56000

1990 (Updated 82001) Merit IBM and MCI formed a not for profit corporation called ANS Advanced Network amp Services which was to conduct research into high speed networking It soon came up with the concept of the T3 a 45 Mbps line NSF quickly adopted the new network and by the end of 1991 all of its sites were connected by this new backbone

While the T3 lines were being constructed the Department of Defense disbanded the ARPANET and it was replaced by the NSFNET backbone The original 50Kbs lines of ARPANET were taken out of service

Tim Berners-Lee and CERN in Geneva implements a hypertext system to provide efficient information access to the members of the international high-energy physics communityBackbones 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 313000

1991CSNET (which consisted of 56Kbps lines) was discontinued having fulfilled its important early role in the provision of academic networking service A key feature of CREN is that its operational costs are fully met through dues paid by its member organizations

The NSF established a new network named NREN the National Research and Education Network The purpose of this network is to conduct high speed networking research It was not to be used as a commercial network nor was it to be used to send a lot of the data that the Internet now transfersBackbones Partial 45Mbps (T3) NSFNET a few private backbones plus satellite and radio connections - Hosts 617000

1992 Internet Society is chartered

World-Wide Web released by CERNNSFNET backbone upgraded to T3 (44736Mbps)Backbones 45Mbps (T3) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps plus satellite and radio connections - Hosts 1136000

1993 InterNIC created by NSF to provide specific Internet services directory and database services (by ATampT) registration services (by Network Solutions Inc) and information services (by General AtomicsCERFnet)

Marc Andreessen and NCSA and the University of Illinois develops a graphical user interface to the WWW called Mosaic for XBackbones 45Mbps (T3) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps and 45Mpbs lines plus satellite and radio connections - Hosts 2056000

1994 No major changes were made to the physical network The most significant thing that happened was the growth Many new networks were added to the NSF backbone Hundreds of thousands of new hosts were added to the INTERNET during this time period

Pizza Hut offers pizza ordering on its Web page

First Virtual the first cyberbank opens

ATM (Asynchronous Transmission Mode 145Mbps) backbone is installed on NSFNETBackbones 145Mbps (ATM) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps and 45Mpbs lines plus satellite and radio connections - Hosts 3864000

1995 The National Science Foundation announced that as of April 30 1995 it would no longer allow direct access to the NSF backbone The National Science Foundation contracted with four companies that would be providers of access to the NSF backbone (Merit) These companies would then sell connections to groups organizations and companies

$50 annual fee is imposed on domains excluding edu and gov domains which are still funded by the National Science FoundationBackbones 145Mbps (ATM) NSFNET (now private) private interconnected backbones consisting mainly of 56Kbps 1544Mbps 45Mpbs 155Mpbs lines in construction plus satellite and radio connections - Hosts 6642000

1996 Most Internet traffic is carried by backbones of independent ISPs including MCI ATampT Sprint UUnet BBN planet ANS and more

The Internet Society the group that controls the INTERNET researches new TCPIP technology that will be able to have more than the approximately 43 billion addresses currently available The problem that has arisen is that it is not known how both the old and the new addressing systems will be able to work at the same time during a transition period

Internet2 is established

(Backbone data below was valid in 1996 please seek other references for current backbone and host data as it is constantly expanded)Backbones 145Mbps (ATM) NSFNET (now private) private interconnected backbones consisting mainly of 56Kbps 1544Mbps 45Mpbsand 155Mpbs lines plus satellite and radio connections - Hosts over 15000000 and growing rapidly

The Present and The Future

A new technology recommendation called IPv6 is suggested to replace the current IPv4 technology IPv4 allows for fewer than 43 billion directly connected Internet devices problematic because the world population (as of 2009) is well over 65 billion (theoretically if ever human had a computer and mobile phone wed need 13 billion addresses which is something IPv6 can easily accomplish)

In 1999 a wireless technology called 80211b more commonly referred to as Wi-Fi is standardized Over the years that follow this technology begins appearing as a built-in feature of portable computers and many handheld devices

In 2005 the One Laptop Per Child project begins In an attempt to provide low cost education-designed laptops to children around the world for a low cost (US$100 per unit) this project helps spark the netbook industry Netbooks are small portable computers with extended battery life and built-in Wi-Fi connectivity

Multi-touch technology begins to appear in handheld devices tablet computers and netbooks This technology supplements traditional touch-screen technology by allowing advanced gesturing (several fingers moving on a screen instead of just one) Multi-touch technology is seen as a possible alternative to traditional keyboard and mouse (touchpad) systems

Read Bill Buxtons Overview and History of Multi-Touch Systems entitled Multi-Touch Systems that I Have Known and Loved

In December 2009 the first multi-touch website is reported

B2 Overview of InternetThe Internet is a global computer network made up of smaller computer networks

it hasbeen called a Network of NetworksThese smaller networks include1048707 Local Area Networks (like networked offices or computer labs and campus-wide

networks)1048707 Wide Area Networks (like city-wide networks)1048707 State and Regional Networks (including regional service providers and others)1048707 National and International Networks

There is no one inventor of the Internet The Internet was created in the 1960s as a huge network linking big university and government computers The science behind the Internet was invented during the Cold War when the United States was in competition against Russia for weapons and technology So the Internet is actually pretty oldmdasharound forty years Much of Internetrsquos initial development was supported by American governmental research and network development (beginning with the American militarys ARPANET in 1969)In fact email has been around since 1972 In 1989 that Tim Berners-Lee a scientist at the European Laboratory for Particle Physics in Geneva proposed the World Wide Web Now Internet Service Providers (ISPs) offer Internet access to their clients at costs ranging from Rs 150- per 6 months to hundreds of rupees per year depending on the types of service they offer

II What people do when surfing People usually get to surfing to internet to do things that are complicated

for them They do a short time for them while surfing depends from the user surfing is the very easiest thing to search for what you want to know

Surfing is one where you can get information access to an educational learning where you can also communicate for an entertainment or an Personal Information

Surfing is one of the easiest way of sharing files and document or any personal data

I1 Surfing is build for a network and made up of organization

i Communication ii Education

iii Business managements Commercial Company iv Government v Private Organization

vi Entertainment

I2 What are the uses of the Internet

There are three fundamental uses of the Internet Communication Information Retrieval Presentation of Information

Communication The Internet is used both for one-to-one communications (email and real-time chat

programs) and one-to-many

Information Retrieval The Internet allows access to public domain information bibliographic databases

libraries and entertainment services as well as to proprietary information services

Presentation of Information Any organization connected to the Internet can provide access to its own in-house

information (library catalogs faculty information etc) to millions of people world-wide Individuals can also develop and provide their own information packages via their own

home pages

II Terms and Web PoliciesObjectives

To know the resources of internet Navigate around the web using Internet Explorer To know what internet services we have To know what is the risk when your online Define the World Wide Web Explain the work of the Domain Name Service Explain the difference between IP address and domain name How to protect and stay safe online

A Internet Addresses

Every computer file of information and person on the Internet is identified by a unique address

A1 Computer AddressesComputer addresses are made up of three parts (or in some cases two parts) separated

by dots like this computer-nameinstitutiondomain

The computer name is a name given locally to identify a particular computer it is in some cases omitted from the address The institution name is the name (or an abbreviation) of the name of the school company or other institution housing the computer The domain name specifies either the type or the geographic location of the computer

A2 Domain NamesThere are several possible domain names including some that identify the type of institution and some that identify a geographical location They include

edu Educational institutioncom Commercial and profitable organizationsorg Non-profitable organizations

net Internet infrastructure and service providersgov Governmental agencydepartmentmil American military agencyint International organizationsus United Statesin Indiamy Malaysiaca Canadajp Japanbiz Businessaero Aeronautics

A3 Personal Addresses

A persons address (or their email address) places the users username (or login) and the symbol before the computer address For example a user whose username is creator who is accessing email from the yahoo server of United State Yahoo Website would have the following address creatoryahoocom

B Internet Services

B1 Internet Services

rdquoInternet servicesrdquo serve more sophisticated and multi-purpose purposes and increasingly make the Internet a truly useful information resource

B11 EmailIt is the Internets version of the postal service Using the Internet it provides the ability to send a message reply to a message send a file created in another program andor even send the same message to a group of people Some benefits of Email arebull Speed A message can be sent from Chennai to Australia in a matter of secondsbull Cost Emails are cheap You are usually only charged for the telephone call time (local call rate) for sending the message into the Internet and not the cost associated with transferring the message across the Internetbull Flexibility It is easy to send duplicates of your messages to other people or groups for the cost of a single messagebull Record keeping Messages sent and received can be easily stored for future referenceIn order to use Email you will need Internet access arranged through an InternetService Provider (ISP) who will allocate you one or a number of Email accounts To be able to retrieve and send mail from these addresses a user will need what is known as Email client software and your ISP usually provides this although nowadays most computers come with it pre-installed

B12 Mail Lists

These use email to support discussion groups on a wide range of specific subjectsOnce you are becoming a subscriber of a mailing list you will receive lot of emails related to the subject covered by the mailing list

B13 FTPFTP was the original Internet mechanism for the storage and retrieval of information There are still many FTP Sites around the Internet although many of them have been melded into the World Wide Web In computer science FTP stands for File Transfer Protocol which is a way of transferring files between computers A file can be anything -- a spreadsheet a word document a song or a picture When someone says Please FTP me that file for instance that means Please transfer that file from your computer to mine To FTP you usually need to download a special program or application You also usually need a password to be able to access or send information to someone elses computer

B14 GopherGopher was developed at the University of Minnesota primarily to support its own Campus Wide Information Server (CWIS) It provides access to information available either locally or elsewhere on the Internet by means of a simple series of uniformly designed menus

B15 Instant Messaging (IM)There are lots of other fun and useful IM features you can explore like group chats file transfers voice calls video conferencing and emoticons that reflect your mood

B16 IRCIRC stands for Internet Relay Chat It has been used in many countries around the world IRC is a multi-user chat system where people meet on channels (rooms virtual places usually with a certain topic of conversation) to talk in groups or privately There is no restriction to the number of people that can participate in a given discussion or the number of channels that can be formed on IRC

B17 NewsgroupsThe Internet has a place where we can gather question and discuss our experiences within a wide variety of topics Its called Usenet News Some users also call it Net NewsThink of Usenet News as a giant worldwide bulletin board Anyone can freely post something on this bulletin board Everyone else can read the posted items and add their own items These voluntary contributions and free exchange of information are the foundation of the Internet

B18 Voice over IPVoice over IP (Voice over Internet Protocol or VoIP) technology converts voice calls from analog to digital to be sent over digital data networks In Voice over IP or VoIP voice data and video all travel along the network

B19 World Wide Web (WWW)The newest information application on the Internet the WWW provides standardized access to Gopher FTP Telnet and more by means of home pages designed either by institutions or

b individuals By means of the HyperText Markup Language (HTML) it allows users to point at highlighted terms following links to whatever information interests them It is a multimedia environment allowing Internet users access to audio and video materials There are a number of client software packages (or browsers) including Lynx (a textonly browser) Netscape and Microsofts Internet Explorer (which are multimedia browsers)

C Types of Internet Connection

C1 Types of Internet connections

The options for providing user connectivity to the Internet are given below

1 Terminal DialupModem (Shell connection)1048707 Most common option1048707 User requirements limited to modem and communications software1048707 Text-only access1048707 Shell accounts were more popular before the advent of the Web A shell account lets

you use your computer much as if it were a virtual console associated with a remote computer You can type commands which are interpreted by the remote computer and view the resulting output on your computer Although a few web browsers such as Lynx can operate via a shell account they donrsquot generally support the highly graphical multimedia pages which web surfers have come to expect

2 SLIP (Serial Line Internet Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software SLIP software amp software for Internet

applications1048707 Multimedia access

3 PPP (Point-to-Point Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software PPP software amp software for Internet

applications1048707 Multimedia access1048707 While your computer is connected to the Internet you can use it to surf the Web with

your favorite browser If your ISP allows you can even run a web server providing pages that can be viewed by others around the world

4 ISDN (Integrated Services Digital Network)1048707 Most often used to connect remote telecommuters to office LANs1048707 Requires ISDN phone line access1048707 Faster than analog terminal dialupmodem service

1048707 User must have ISDN phone line ISDN card communications software TCP software amp SLIP or PPP software multimedia connectivity

5 DIAS1048707 The DIAS offers a wire-line solution for high speed symmetrical Internet access on the

existing telephone lines It provides an always on internet access that is permanently available at customers premises DIAS combines voice and internet data packets on a single twisted pair wire at subscriber premises that means you can use telephone and surf internet at the same time

6 Cable Modem1048707 The term ldquoCable Modemrdquo is quite new and refers to a modem that operates over the

ordinary cable TV network cables Basically you just connect the Cable Modem to the TV outlet for your cable TV and the cable TV operator connects a Cable Modem Termination System (CMTS) in his end (the Head-End)

1048707 Actually the term ldquoCable Modemrdquo is a bit misleading as a Cable Modem works more like a Local Area Network (LAN) interface than as a modem

1048707 In a cable TV system signals from the various channels are each given a 6-MHz slice of the cablersquos available bandwidth and then sent down the cable to your house When a cable company offers Internet access over the cable Internet information can use the same cables because the cable modem system puts downstream data ndash data sent from the Internet to an individual computer ndash into a 6-MHz channel On the cable the data looks just like a TV channel So Internet downstream data takes up the same amount of cable space as any single channel of programming Upstream data ndash information sent from an individual back to the Internet ndash requires even less of the cablersquos bandwidth just 2 MHz since the assumption is that most people download far more information than they upload

1048707 Putting both upstream and downstream data on the cable television system requires two types of equipment a cable modem on the customer end and a cable modem termination system (CMTS) at the cable providerrsquos end Between these two types of equipment all the computer networking security and management of Internet access over cable television is put into place

7 Digital Subscriber Line (DSL) connection1048707 DSL is a very high-speed connection that uses the same wires as a regular telephone

line1048707 Here are some advantages of DSL

1 You can leave your Internet connection open and still use the phone line for voice calls

2 The speed is much higher than a regular modem3 DSL doesnrsquot necessarily require new wiring it can use the phone line you

already have4 The company that offers DSL (eg BSNL) will usually provide the modem as

part of the installation1048707 But there are disadvantages

1 A DSL connection works better when you are closer to the providerrsquos central office

2 The service is not available everywhere1048707 Other types of DSL include

1 Asymmetric DSL (ADSL) line ndash The connection is faster for receiving data than it is for sending data over the Internet

2 Very high bit-rate DSL (VDSL) ndash This is a fast connection but works only over a short distance

3 Symmetric DSL (SDSL) ndash This connection used mainly by small businesses doesnrsquot allow you to use the phone at the same time but the speed of receiving and sending data is the same

4 Rate-adaptive DSL (RADSL) ndash This is a variation of ADSL but the modem can adjust the speed of the connection depending on the length and quality of the line

8 Direct Connection (Leased circuit)1048707 Most often used to connect sites within a specific organization such as a university or

business requires owning or leasing of cable (from 64 kbps to T-3) users typically connected via Ethernet LANs multimedia connectivity at its fastest

9 Satellite connections1048707 This connection allows you to download Internet files via a satellite connection This is

an efficient method for receiving large Web graphics and other items but you still need a modem connection for other features You must purchase the connection hardware as well as subscribe to the service

10 Wireless connections1048707 Pagers cellular phones and personal digital assistants (PDAs) now allow varying levels

of Internet access from notification of E-mail to limited Web connections Many of these services remain in the experimental stage The PPP connection is called as TCPIP connection or PSTN dial-up connection ISDN connection is called as ISDN dial-up connection Cable Modem DSL and Direct Connection are always-on connection The words ldquoconnectionrdquo and ldquoaccountrdquo related to Internet are interchangeable

D Computer Virus

The Internet just like the rest of the world is not a perfectly safe place to visit If you download files from the Internet there is a chance a very small chance but nonetheless a chance that your computer could become infected with a virus

Viruses are malicious programs that invade your computer They can cause many different kinds of damage such as deleting data files erasing programs or destroying

everything they find on your hard disk Not every virus causes damage some simply flash annoying messages

Different Types of Computer VirusesThere are Different Types of Computer Viruses could be classified in

(origin techniques types of files they infect where they hide the kind of damage they cause the type of operating system or platform they attack) etc Let us have a look at themhellip

Computer Virus is a kind of malicious software written intentionally to enter a computer without the userrsquos permission or knowledge with an ability to replicate itself thus continuing to spread Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system A virus should never be assumed harmless and left on a system Most common types of viruses are mentioned below

Resident VirusesThis type of virus is a permanent which dwells in the RAM memory From

there it can overcome and interrupt all of the operations executed by the system corrupting files and programs that are opened closed copied renamed etc

Examples include Randex CMJ Meve and MrKlunky

Direct Action VirusesThe main purpose of this virus is to replicate and take action when it is

executed When a specific condition is met the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXECBAT file PATH This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted

Overwrite VirusesVirus of this kind is characterized by the fact that it deletes the information

contained in the files that it infects rendering them partially or totally useless once they have been infected

The only way to clean a file infected by an overwrite virus is to delete the file completely thus losing the original content

Examples of this virus include Way TrjReboot Trivial88D

Boot Virus

This type of virus affects the boot sector of a floppy or hard disk This is a crucial part of a disk in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive

Examples of boot viruses include PolybootB AntiEXE

Macro VirusMacro viruses infect files that are created using certain applications or

programs that contain macros These mini-programs make it possible to automate series of operations so that they are performed as a single action thereby saving the user from having to carry them out one by one

Examples of macro viruses Relax MelissaA Bablas O97MY2K

Directory VirusDirectory viruses change the paths that indicate the location of a file By

executing a program (file with the extension EXE or COM) which has been infected by a virus you are unknowingly running the virus program while the original file and program have been previously moved by the virus

Once infected it becomes impossible to locate the original files

Polymorphic VirusPolymorphic viruses encrypt or encode themselves in a different way

(using different algorithms and encryption keys) every time they infect a system

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves

Examples include Elkern Marburg Satan Bug and Tuareg

File InfectorsThis type of virus infects programs or executable files (files with an EXE

or COM extension) When one of these programs is run directly or indirectly the virus is activated producing the damaging effects it is programmed to carry out The majority of existing viruses belong to this category and can be classified depending on the actions that they carry out

Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types They are known as companion viruses because once they get into the system they accompany the other files that already exist In other words in order to carry out their infection routines companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses)

Some examples include Stator Asimov1539 and Terrax1069

FAT VirusThe file allocation table or FAT is the part of a disk used to connect

information and is a vital part of the normal functioning of the computerThis type of virus attack can be especially dangerous by preventing access to certain sections of the disk where important files are stored Damage caused can result in information losses from individual files or even entire directories

WormsA worm is a program very similar to a virus it has the ability to self-

replicate and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses

Examples of worms include PSWBugbearB LovgateF TrileC SobigD Mapson

Trojans or Trojan HorsesAnother unsavory breed of malicious code are Trojans or Trojan horses

which unlike viruses do not reproduce by infecting other files nor do they self-replicate like worms

Logic BombsThey are not considered viruses because they do not replicate They are not

even programs in their own right but rather camouflaged segments of other programs

Their objective is to destroy data on the computer once certain conditions have been met Logic bombs go undetected until launched and the results can be destructive

E How Do You Stay Safe On The Internet

The first part of the answer to the question How do you stay safe on the Internet is know what the threats are that you and your computer are up against

Without this knowledge how are you going to know youve got everything covered off Do you just rely on what the security software vendors tell you to spend your money on

By being aware of what the risks are I suggest you will save yourself money and have more effective protection when it comes to the second part of the answer to the question How do you stay safe on the Internet selecting effective prevention and protection to guard privacy and online security

To help you decide what is necessary for your particular protection in The Three Levels Of Internet Risk Protection I talk about the safe practices that help protect your computer and the types of software to use -- from those that are absolutely essential for security to others which you may want to install to guard privacy to the level you desire

But back to this article How Do You Stay Safe On The Internet here Ill provide you with an introduction to each type of threat At the end of it youll have a good feel for the dangers on the Internet and how those threats can affect you your PC and your information be it personal financial family or business

There are ten of the most prevalent threats covered here Either go through them all or click on the links below for those you are particularly interested in

1 Viruses and Worms 2 Trojan Horses 3 Rootkits 4 Crackers and Hackers 5 Spam 6 Web Bugs 7 Child Security 8 Pop-UpUnder Ads 9 Tracking Cookies 10 Spyware

By the way Ive tried to keep the technical language simple but if you dont understand some of the terms check them out at Netlingo which provides definitions and explanations for all Net terminology

1 Viruses And Worms

What Is A VirusA virus is a man-made computer program that infects a file or program on our computers Each time the infected program is run the virus is also triggered It spreads itself by infecting other programs on the same computer

What Is A WormA worm is also a man-made program that replicates itself However unlike a virus it does not infect other program files on the computer Instead a worm spreads itself automatically to other computers through email over a network and via Internet Relay Chat (IRC)

How Do We Get InfectedViruses and worms can infect desktop computers laptops and network servers and reach our PCs from email web sites downloaded files and loadable media (eg floppy disks CD-ROMs and DVDs)

How Does A Virus Or Worm Infection Affect UsUnfortunately the effects of an infection are pretty unpleasant The virus or worm can

Disable the computer

Add modify or delete files or reformat the hard disk

Steal addresses held in our computer to send on virus-infected emails to our friends colleagues clients or customers

Send unsolicited bulk email (spam) to those in our mail address books and other users

2 Trojan Horses

What Is A Trojan HorseAlthough Trojan horse programs are categorized as viruses they are not true viruses since they do not replicate But like viruses they are one of the most destructive of the Internet risks covered in How Do You Stay Safe On The Internet and are favored by crackers and spyware writers

How Do We Get InfectedTrojans are one of the sneakiest of the online risks They are often downloaded on the back of a free program (freeware) that has some value to the user -- a free game software program or music for instance

How Does A Trojan Infection Affect Us

A Trojan installed on a computer allows that PC to be entered via a backdoor by any remote user that has the access code to the Trojan

The remote attacker can enter the computer undetected when the user is online to access or destroy any information stored Alternatively the Trojan can be programmed to automatically send any information on our PCs back to the attacker This could include

Client or customer information or other business data

Credit card details

Passwords for access to your online bank ISP or web services

Information you would rather remain hidden

Email addresses which may be used for spamming

Childrens names photographs ages or other personal details held on the computer

Distributed Denial of Service (DDOS) attack on other computers via the victims computer

No wonder we ask how do you stay safe on the Internet

3 How Do You Stay Safe On The InternetRootkitsWhat Is A RootkitRootkits are not destructive in their own right but they are designed to conceal the presence of malicious programs on a computer

How Do We Get InfectedAs with any malware such as viruses worms Trojans and spyware rootkits get onto our computers by various means such as through spam attachments being opened on the back of free downloads or planted by crackers who have breached computer defenses

How Does A Rootkit Affect UsRootkits are there for one reason only to ensure that an intruder can access our system and take control without detection by defenses to guard privacy and security

One of the most common and worrying uses of rootkits which causes us to ask How Do You Stay Safe On The Internet is to launch spam and denial of service (DOS) attacks against other computers or networks Another use of

rootkits is to hide Trojans so an intruder can easily use it to extract data from your computer as mentioned above

4 Crackers And Hackers

What Is A HackerCrackerThe term hacker is a misused term We should really be referring to a cracker to describe those who break security on a computer system

The original term hacker refers to computer enthusiasts who enjoy learning everything about a computer system

How Do We Get AttackedCrackers run programs that scan computer ports over the Internet to work out which ports are accessible If our computer shows up in one of these scans the cracker may decide to enter our PC

Crackers favorite targets are the home and home office computers connected by broadband to the Internet because the connection is always open there is more opportunity to locate these computers with their scanners

Alternatively crackers may just exploit weaknesses that have not been patched in the computers operating system in order to gain entry As discussed above Trojans are another way crackers use to gain access to our PCs

How Does A Cracker Affect UsBesides the potentially valuable information they can obtain from our PCs such as that listed under Trojans these intruders also want our hard disk space and Internet connection With these resources they can use our computers to send out spam or attack other computers on the Internet and all this can be done without our knowledge Another reason why we should know how do you stay safe on the Internet

5 Spam -- Unsolicited Email

What Is SpamSpam is defined in Dictionarycom as Unsolicited e-mail often of a commercial nature sent indiscriminately to multiple mailing lists individuals or newsgroups junk e-mail

Spammers peddle pornography sexual aids diet pills and get-rich-quick schemes in fact anything that has a perceived value

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

Parts of Internet Explorer 7

5 Activities that can do while or after surfinga) How to Copy or Save Image Using Internet Browserb) Print Web Pagesc) Save Book Mark Favorite Websited) Define Search Engine and a subject Guidee) Save Favorite Website on a storage disk

IV LESSON 4 Using Web Browser Manage User

a Using Web Browser1 Website

a Internet Addressesi World Wide Web

ii Domain Name and Extension Name Domain Extension Name

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

3 Uploading and Downloadingi Upload a File

Instructions and Rules uploading a fileii Downloading a File

Procedure and Rules before Downloadiii Buffering

Buffering Over the Internet

5 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this layer Understand the types of signaling

Define multiplexing

OSI Physical layer Services and Functions OSI Model

V TERMS and TERMINOLOGIES

I LESSON 1 The INRODUCTION

Objectives Define and describe the Internet To know the resources of internet Define the Internet backbone

History

A What is Internet

A world wide network of computer network Internet Connected VIA Telecommunication Links The information ldquoSuper Highwayrdquo Mother of all Network

Introduction of InternetThe internet is a global of interconnected government academic public and

private computer networks which is based upon the networking technologies of the Internet Protocol Suite It is the successor of the Advanced Research Project Agency Network (ARPANET) developed by DARPA of the US Department of Defense

The Internet is also a communications backbone underlying the World Wide Web (WWW)

The Internet changes so quickly and the technology advances so rapidly that it can seem almost impossible to keep up with all of it If youre like just about everyone else involved in the Internet your questions are similar to those of my friend Youll find your answers here

C The History

Objectives To know Origin of Internet History To Create a digital archive or source materials about the creation and

evolution of the Internet

Generate new historical material through the collection of commentaries that include participants stories observations perspectives and memories

B1 History Preview

1957 (Potential Origin and Beginning -- The History of the Internet)The USSR launches Sputnik the first artificial earth satellite In response the United States forms the Advanced Research Projects Agency (ARPA) within the Department of Defense (DoD) to establish US lead in science and technology applicable to the militaryBackbones None - Hosts None

1962 RAND Paul Baran of the RAND Corporation (a government agency) was commissioned by the US Air Force to do a study on how it could maintain its command and control over its missiles and bombers after a nuclear attack This was to be a military research network that could survive a nuclear strike decentralized so that if any locations (cities) in the US were attacked the military could still have control of nuclear arms for a counter-attack

Barans finished document described several ways to accomplish this His final proposal was a packet switched network

Packet switching is the breaking down of data into datagrams or packets that are labeled to indicate the origin and the destination of the information and the forwarding of these packets from one computer to another computer until the information arrives at its final destination computer This was crucial to the realization of a computer network If packets are lost at any given point the message can be resent by the originatorBackbones None - Hosts None

1968 ARPA awarded the ARPANET contract to BBN BBN had selected a Honeywell minicomputer as the base on which they would build the switch The physical network was constructed in 1969 linking four nodes University of California at Los Angeles SRI (in Stanford) University of California at Santa Barbara and University of Utah The network was wired together via 50 Kbps circuitsBackbones 50Kbps ARPANET - Hosts 4

1972 The first e-mail program was created by Ray Tomlinson of BBNThe Advanced Research Projects Agency (ARPA) was renamed The Defense Advanced Research Projects Agency (or DARPA)

ARPANET was currently using the Network Control Protocol or NCP to transfer data This allowed communications between hosts running on the same networkBackbones 50Kbps ARPANET - Hosts 23

1973 Development began on the protocol later to be called TCPIP

It was developed by a group headed by Vinton Cerf from Stanford and Bob Kahn from DARPA This new protocol was to allow diverse computer networks to interconnect and communicate with each otherBackbones 50Kbps ARPANET - Hosts 23+

1974 First Use of term Internet by Vint Cerf and Bob Kahn in paper on Transmission Control ProtocolBackbones 50Kbps ARPANET - Hosts 23+

1976 Dr Robert M Metcalfe develops Ethernet which allowed coaxial cable to move data extremely fast This was a crucial component to the development of LANsThe packet satellite project went into practical use SATNET Atlantic packet Satellite network was born This network linked the United States with Europe Surprisingly it used INTELSAT satellites that were owned by a consortium of countries and not exclusively the United States government

UUCP (Unix-to-Unix CoPy) developed at ATampT Bell Labs and distributed with UNIX one year later

The Department of Defense began to experiment with the TCPIP protocol and soon decided to require it for use on ARPANETBackbones 50Kbps ARPANET plus satellite and radio connections - Hosts 111+

1979 USENET (the decentralized news group network) was created by Steve Bellovin a graduate student at University of North Carolina and programmers Tom Truscott and Jim Ellis It was based on UUCP

The Creation of BITNET by IBM Because its Time Network introduced the store and forward network It was used for email and listservsBackbones 50Kbps ARPANET plus satellite and radio connections - Hosts 111+

1981 National Science Foundation Created backbone called CSNET 56 Kbps network for institutions without access to ARPANET Vinton Cerf proposed a plan for an inter-network connection between CSNET and the ARPANETBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 213

1983 Internet Activities Board (IAB) was created in 1983On January 1st every machine connected to ARPANET had to use TCPIP TCPIP became the core Internet protocol and replaced NCP entirely

The University of Wisconsin created Domain Name System (DNS) This allowed packets to be directed to a domain name which would be translated by the server database into the

corresponding IP number This made it much easier for people to access other servers because they no longer had to remember numbersBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 562

1984 The ARPANET was divided into two networks MILNET and ARPANET MILNET was to serve the needs of the military and ARPANET to support the advanced research component Department of Defense continued to support both networks

Upgrade to CSNET was contracted to MCI New circuits would be T1 lines15 Mbps which is twenty-five times faster than the old 56 Kbps lines IBM would provide advanced routers and Merit would manage the network New network was to be called NSFNET (National Science Foundation Network) and old lines were to remain called CSNETBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 1024

1985 The National Science Foundation began deploying its new T1 lines which would be finished by 1988Backbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 1961

1986 The Internet Engineering Task Force or IETF was created to serve as a forum for technical coordination by contractors for DARPA working on ARPANET US Defense Data Network (DDN) and the Internet core gateway systemBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 2308

1987 BITNET and CSNET merged to form the Corporation for Research and Educational Networking (CREN) another work of the National Science FoundationBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 28174

1988 Soon after the completion of the T1 NSFNET backbone traffic increased so quickly that plans immediately began on upgrading the network againBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 56000

1990 (Updated 82001) Merit IBM and MCI formed a not for profit corporation called ANS Advanced Network amp Services which was to conduct research into high speed networking It soon came up with the concept of the T3 a 45 Mbps line NSF quickly adopted the new network and by the end of 1991 all of its sites were connected by this new backbone

While the T3 lines were being constructed the Department of Defense disbanded the ARPANET and it was replaced by the NSFNET backbone The original 50Kbs lines of ARPANET were taken out of service

Tim Berners-Lee and CERN in Geneva implements a hypertext system to provide efficient information access to the members of the international high-energy physics communityBackbones 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 313000

1991CSNET (which consisted of 56Kbps lines) was discontinued having fulfilled its important early role in the provision of academic networking service A key feature of CREN is that its operational costs are fully met through dues paid by its member organizations

The NSF established a new network named NREN the National Research and Education Network The purpose of this network is to conduct high speed networking research It was not to be used as a commercial network nor was it to be used to send a lot of the data that the Internet now transfersBackbones Partial 45Mbps (T3) NSFNET a few private backbones plus satellite and radio connections - Hosts 617000

1992 Internet Society is chartered

World-Wide Web released by CERNNSFNET backbone upgraded to T3 (44736Mbps)Backbones 45Mbps (T3) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps plus satellite and radio connections - Hosts 1136000

1993 InterNIC created by NSF to provide specific Internet services directory and database services (by ATampT) registration services (by Network Solutions Inc) and information services (by General AtomicsCERFnet)

Marc Andreessen and NCSA and the University of Illinois develops a graphical user interface to the WWW called Mosaic for XBackbones 45Mbps (T3) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps and 45Mpbs lines plus satellite and radio connections - Hosts 2056000

1994 No major changes were made to the physical network The most significant thing that happened was the growth Many new networks were added to the NSF backbone Hundreds of thousands of new hosts were added to the INTERNET during this time period

Pizza Hut offers pizza ordering on its Web page

First Virtual the first cyberbank opens

ATM (Asynchronous Transmission Mode 145Mbps) backbone is installed on NSFNETBackbones 145Mbps (ATM) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps and 45Mpbs lines plus satellite and radio connections - Hosts 3864000

1995 The National Science Foundation announced that as of April 30 1995 it would no longer allow direct access to the NSF backbone The National Science Foundation contracted with four companies that would be providers of access to the NSF backbone (Merit) These companies would then sell connections to groups organizations and companies

$50 annual fee is imposed on domains excluding edu and gov domains which are still funded by the National Science FoundationBackbones 145Mbps (ATM) NSFNET (now private) private interconnected backbones consisting mainly of 56Kbps 1544Mbps 45Mpbs 155Mpbs lines in construction plus satellite and radio connections - Hosts 6642000

1996 Most Internet traffic is carried by backbones of independent ISPs including MCI ATampT Sprint UUnet BBN planet ANS and more

The Internet Society the group that controls the INTERNET researches new TCPIP technology that will be able to have more than the approximately 43 billion addresses currently available The problem that has arisen is that it is not known how both the old and the new addressing systems will be able to work at the same time during a transition period

Internet2 is established

(Backbone data below was valid in 1996 please seek other references for current backbone and host data as it is constantly expanded)Backbones 145Mbps (ATM) NSFNET (now private) private interconnected backbones consisting mainly of 56Kbps 1544Mbps 45Mpbsand 155Mpbs lines plus satellite and radio connections - Hosts over 15000000 and growing rapidly

The Present and The Future

A new technology recommendation called IPv6 is suggested to replace the current IPv4 technology IPv4 allows for fewer than 43 billion directly connected Internet devices problematic because the world population (as of 2009) is well over 65 billion (theoretically if ever human had a computer and mobile phone wed need 13 billion addresses which is something IPv6 can easily accomplish)

In 1999 a wireless technology called 80211b more commonly referred to as Wi-Fi is standardized Over the years that follow this technology begins appearing as a built-in feature of portable computers and many handheld devices

In 2005 the One Laptop Per Child project begins In an attempt to provide low cost education-designed laptops to children around the world for a low cost (US$100 per unit) this project helps spark the netbook industry Netbooks are small portable computers with extended battery life and built-in Wi-Fi connectivity

Multi-touch technology begins to appear in handheld devices tablet computers and netbooks This technology supplements traditional touch-screen technology by allowing advanced gesturing (several fingers moving on a screen instead of just one) Multi-touch technology is seen as a possible alternative to traditional keyboard and mouse (touchpad) systems

Read Bill Buxtons Overview and History of Multi-Touch Systems entitled Multi-Touch Systems that I Have Known and Loved

In December 2009 the first multi-touch website is reported

B2 Overview of InternetThe Internet is a global computer network made up of smaller computer networks

it hasbeen called a Network of NetworksThese smaller networks include1048707 Local Area Networks (like networked offices or computer labs and campus-wide

networks)1048707 Wide Area Networks (like city-wide networks)1048707 State and Regional Networks (including regional service providers and others)1048707 National and International Networks

There is no one inventor of the Internet The Internet was created in the 1960s as a huge network linking big university and government computers The science behind the Internet was invented during the Cold War when the United States was in competition against Russia for weapons and technology So the Internet is actually pretty oldmdasharound forty years Much of Internetrsquos initial development was supported by American governmental research and network development (beginning with the American militarys ARPANET in 1969)In fact email has been around since 1972 In 1989 that Tim Berners-Lee a scientist at the European Laboratory for Particle Physics in Geneva proposed the World Wide Web Now Internet Service Providers (ISPs) offer Internet access to their clients at costs ranging from Rs 150- per 6 months to hundreds of rupees per year depending on the types of service they offer

II What people do when surfing People usually get to surfing to internet to do things that are complicated

for them They do a short time for them while surfing depends from the user surfing is the very easiest thing to search for what you want to know

Surfing is one where you can get information access to an educational learning where you can also communicate for an entertainment or an Personal Information

Surfing is one of the easiest way of sharing files and document or any personal data

I1 Surfing is build for a network and made up of organization

i Communication ii Education

iii Business managements Commercial Company iv Government v Private Organization

vi Entertainment

I2 What are the uses of the Internet

There are three fundamental uses of the Internet Communication Information Retrieval Presentation of Information

Communication The Internet is used both for one-to-one communications (email and real-time chat

programs) and one-to-many

Information Retrieval The Internet allows access to public domain information bibliographic databases

libraries and entertainment services as well as to proprietary information services

Presentation of Information Any organization connected to the Internet can provide access to its own in-house

information (library catalogs faculty information etc) to millions of people world-wide Individuals can also develop and provide their own information packages via their own

home pages

II Terms and Web PoliciesObjectives

To know the resources of internet Navigate around the web using Internet Explorer To know what internet services we have To know what is the risk when your online Define the World Wide Web Explain the work of the Domain Name Service Explain the difference between IP address and domain name How to protect and stay safe online

A Internet Addresses

Every computer file of information and person on the Internet is identified by a unique address

A1 Computer AddressesComputer addresses are made up of three parts (or in some cases two parts) separated

by dots like this computer-nameinstitutiondomain

The computer name is a name given locally to identify a particular computer it is in some cases omitted from the address The institution name is the name (or an abbreviation) of the name of the school company or other institution housing the computer The domain name specifies either the type or the geographic location of the computer

A2 Domain NamesThere are several possible domain names including some that identify the type of institution and some that identify a geographical location They include

edu Educational institutioncom Commercial and profitable organizationsorg Non-profitable organizations

net Internet infrastructure and service providersgov Governmental agencydepartmentmil American military agencyint International organizationsus United Statesin Indiamy Malaysiaca Canadajp Japanbiz Businessaero Aeronautics

A3 Personal Addresses

A persons address (or their email address) places the users username (or login) and the symbol before the computer address For example a user whose username is creator who is accessing email from the yahoo server of United State Yahoo Website would have the following address creatoryahoocom

B Internet Services

B1 Internet Services

rdquoInternet servicesrdquo serve more sophisticated and multi-purpose purposes and increasingly make the Internet a truly useful information resource

B11 EmailIt is the Internets version of the postal service Using the Internet it provides the ability to send a message reply to a message send a file created in another program andor even send the same message to a group of people Some benefits of Email arebull Speed A message can be sent from Chennai to Australia in a matter of secondsbull Cost Emails are cheap You are usually only charged for the telephone call time (local call rate) for sending the message into the Internet and not the cost associated with transferring the message across the Internetbull Flexibility It is easy to send duplicates of your messages to other people or groups for the cost of a single messagebull Record keeping Messages sent and received can be easily stored for future referenceIn order to use Email you will need Internet access arranged through an InternetService Provider (ISP) who will allocate you one or a number of Email accounts To be able to retrieve and send mail from these addresses a user will need what is known as Email client software and your ISP usually provides this although nowadays most computers come with it pre-installed

B12 Mail Lists

These use email to support discussion groups on a wide range of specific subjectsOnce you are becoming a subscriber of a mailing list you will receive lot of emails related to the subject covered by the mailing list

B13 FTPFTP was the original Internet mechanism for the storage and retrieval of information There are still many FTP Sites around the Internet although many of them have been melded into the World Wide Web In computer science FTP stands for File Transfer Protocol which is a way of transferring files between computers A file can be anything -- a spreadsheet a word document a song or a picture When someone says Please FTP me that file for instance that means Please transfer that file from your computer to mine To FTP you usually need to download a special program or application You also usually need a password to be able to access or send information to someone elses computer

B14 GopherGopher was developed at the University of Minnesota primarily to support its own Campus Wide Information Server (CWIS) It provides access to information available either locally or elsewhere on the Internet by means of a simple series of uniformly designed menus

B15 Instant Messaging (IM)There are lots of other fun and useful IM features you can explore like group chats file transfers voice calls video conferencing and emoticons that reflect your mood

B16 IRCIRC stands for Internet Relay Chat It has been used in many countries around the world IRC is a multi-user chat system where people meet on channels (rooms virtual places usually with a certain topic of conversation) to talk in groups or privately There is no restriction to the number of people that can participate in a given discussion or the number of channels that can be formed on IRC

B17 NewsgroupsThe Internet has a place where we can gather question and discuss our experiences within a wide variety of topics Its called Usenet News Some users also call it Net NewsThink of Usenet News as a giant worldwide bulletin board Anyone can freely post something on this bulletin board Everyone else can read the posted items and add their own items These voluntary contributions and free exchange of information are the foundation of the Internet

B18 Voice over IPVoice over IP (Voice over Internet Protocol or VoIP) technology converts voice calls from analog to digital to be sent over digital data networks In Voice over IP or VoIP voice data and video all travel along the network

B19 World Wide Web (WWW)The newest information application on the Internet the WWW provides standardized access to Gopher FTP Telnet and more by means of home pages designed either by institutions or

b individuals By means of the HyperText Markup Language (HTML) it allows users to point at highlighted terms following links to whatever information interests them It is a multimedia environment allowing Internet users access to audio and video materials There are a number of client software packages (or browsers) including Lynx (a textonly browser) Netscape and Microsofts Internet Explorer (which are multimedia browsers)

C Types of Internet Connection

C1 Types of Internet connections

The options for providing user connectivity to the Internet are given below

1 Terminal DialupModem (Shell connection)1048707 Most common option1048707 User requirements limited to modem and communications software1048707 Text-only access1048707 Shell accounts were more popular before the advent of the Web A shell account lets

you use your computer much as if it were a virtual console associated with a remote computer You can type commands which are interpreted by the remote computer and view the resulting output on your computer Although a few web browsers such as Lynx can operate via a shell account they donrsquot generally support the highly graphical multimedia pages which web surfers have come to expect

2 SLIP (Serial Line Internet Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software SLIP software amp software for Internet

applications1048707 Multimedia access

3 PPP (Point-to-Point Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software PPP software amp software for Internet

applications1048707 Multimedia access1048707 While your computer is connected to the Internet you can use it to surf the Web with

your favorite browser If your ISP allows you can even run a web server providing pages that can be viewed by others around the world

4 ISDN (Integrated Services Digital Network)1048707 Most often used to connect remote telecommuters to office LANs1048707 Requires ISDN phone line access1048707 Faster than analog terminal dialupmodem service

1048707 User must have ISDN phone line ISDN card communications software TCP software amp SLIP or PPP software multimedia connectivity

5 DIAS1048707 The DIAS offers a wire-line solution for high speed symmetrical Internet access on the

existing telephone lines It provides an always on internet access that is permanently available at customers premises DIAS combines voice and internet data packets on a single twisted pair wire at subscriber premises that means you can use telephone and surf internet at the same time

6 Cable Modem1048707 The term ldquoCable Modemrdquo is quite new and refers to a modem that operates over the

ordinary cable TV network cables Basically you just connect the Cable Modem to the TV outlet for your cable TV and the cable TV operator connects a Cable Modem Termination System (CMTS) in his end (the Head-End)

1048707 Actually the term ldquoCable Modemrdquo is a bit misleading as a Cable Modem works more like a Local Area Network (LAN) interface than as a modem

1048707 In a cable TV system signals from the various channels are each given a 6-MHz slice of the cablersquos available bandwidth and then sent down the cable to your house When a cable company offers Internet access over the cable Internet information can use the same cables because the cable modem system puts downstream data ndash data sent from the Internet to an individual computer ndash into a 6-MHz channel On the cable the data looks just like a TV channel So Internet downstream data takes up the same amount of cable space as any single channel of programming Upstream data ndash information sent from an individual back to the Internet ndash requires even less of the cablersquos bandwidth just 2 MHz since the assumption is that most people download far more information than they upload

1048707 Putting both upstream and downstream data on the cable television system requires two types of equipment a cable modem on the customer end and a cable modem termination system (CMTS) at the cable providerrsquos end Between these two types of equipment all the computer networking security and management of Internet access over cable television is put into place

7 Digital Subscriber Line (DSL) connection1048707 DSL is a very high-speed connection that uses the same wires as a regular telephone

line1048707 Here are some advantages of DSL

1 You can leave your Internet connection open and still use the phone line for voice calls

2 The speed is much higher than a regular modem3 DSL doesnrsquot necessarily require new wiring it can use the phone line you

already have4 The company that offers DSL (eg BSNL) will usually provide the modem as

part of the installation1048707 But there are disadvantages

1 A DSL connection works better when you are closer to the providerrsquos central office

2 The service is not available everywhere1048707 Other types of DSL include

1 Asymmetric DSL (ADSL) line ndash The connection is faster for receiving data than it is for sending data over the Internet

2 Very high bit-rate DSL (VDSL) ndash This is a fast connection but works only over a short distance

3 Symmetric DSL (SDSL) ndash This connection used mainly by small businesses doesnrsquot allow you to use the phone at the same time but the speed of receiving and sending data is the same

4 Rate-adaptive DSL (RADSL) ndash This is a variation of ADSL but the modem can adjust the speed of the connection depending on the length and quality of the line

8 Direct Connection (Leased circuit)1048707 Most often used to connect sites within a specific organization such as a university or

business requires owning or leasing of cable (from 64 kbps to T-3) users typically connected via Ethernet LANs multimedia connectivity at its fastest

9 Satellite connections1048707 This connection allows you to download Internet files via a satellite connection This is

an efficient method for receiving large Web graphics and other items but you still need a modem connection for other features You must purchase the connection hardware as well as subscribe to the service

10 Wireless connections1048707 Pagers cellular phones and personal digital assistants (PDAs) now allow varying levels

of Internet access from notification of E-mail to limited Web connections Many of these services remain in the experimental stage The PPP connection is called as TCPIP connection or PSTN dial-up connection ISDN connection is called as ISDN dial-up connection Cable Modem DSL and Direct Connection are always-on connection The words ldquoconnectionrdquo and ldquoaccountrdquo related to Internet are interchangeable

D Computer Virus

The Internet just like the rest of the world is not a perfectly safe place to visit If you download files from the Internet there is a chance a very small chance but nonetheless a chance that your computer could become infected with a virus

Viruses are malicious programs that invade your computer They can cause many different kinds of damage such as deleting data files erasing programs or destroying

everything they find on your hard disk Not every virus causes damage some simply flash annoying messages

Different Types of Computer VirusesThere are Different Types of Computer Viruses could be classified in

(origin techniques types of files they infect where they hide the kind of damage they cause the type of operating system or platform they attack) etc Let us have a look at themhellip

Computer Virus is a kind of malicious software written intentionally to enter a computer without the userrsquos permission or knowledge with an ability to replicate itself thus continuing to spread Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system A virus should never be assumed harmless and left on a system Most common types of viruses are mentioned below

Resident VirusesThis type of virus is a permanent which dwells in the RAM memory From

there it can overcome and interrupt all of the operations executed by the system corrupting files and programs that are opened closed copied renamed etc

Examples include Randex CMJ Meve and MrKlunky

Direct Action VirusesThe main purpose of this virus is to replicate and take action when it is

executed When a specific condition is met the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXECBAT file PATH This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted

Overwrite VirusesVirus of this kind is characterized by the fact that it deletes the information

contained in the files that it infects rendering them partially or totally useless once they have been infected

The only way to clean a file infected by an overwrite virus is to delete the file completely thus losing the original content

Examples of this virus include Way TrjReboot Trivial88D

Boot Virus

This type of virus affects the boot sector of a floppy or hard disk This is a crucial part of a disk in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive

Examples of boot viruses include PolybootB AntiEXE

Macro VirusMacro viruses infect files that are created using certain applications or

programs that contain macros These mini-programs make it possible to automate series of operations so that they are performed as a single action thereby saving the user from having to carry them out one by one

Examples of macro viruses Relax MelissaA Bablas O97MY2K

Directory VirusDirectory viruses change the paths that indicate the location of a file By

executing a program (file with the extension EXE or COM) which has been infected by a virus you are unknowingly running the virus program while the original file and program have been previously moved by the virus

Once infected it becomes impossible to locate the original files

Polymorphic VirusPolymorphic viruses encrypt or encode themselves in a different way

(using different algorithms and encryption keys) every time they infect a system

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves

Examples include Elkern Marburg Satan Bug and Tuareg

File InfectorsThis type of virus infects programs or executable files (files with an EXE

or COM extension) When one of these programs is run directly or indirectly the virus is activated producing the damaging effects it is programmed to carry out The majority of existing viruses belong to this category and can be classified depending on the actions that they carry out

Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types They are known as companion viruses because once they get into the system they accompany the other files that already exist In other words in order to carry out their infection routines companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses)

Some examples include Stator Asimov1539 and Terrax1069

FAT VirusThe file allocation table or FAT is the part of a disk used to connect

information and is a vital part of the normal functioning of the computerThis type of virus attack can be especially dangerous by preventing access to certain sections of the disk where important files are stored Damage caused can result in information losses from individual files or even entire directories

WormsA worm is a program very similar to a virus it has the ability to self-

replicate and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses

Examples of worms include PSWBugbearB LovgateF TrileC SobigD Mapson

Trojans or Trojan HorsesAnother unsavory breed of malicious code are Trojans or Trojan horses

which unlike viruses do not reproduce by infecting other files nor do they self-replicate like worms

Logic BombsThey are not considered viruses because they do not replicate They are not

even programs in their own right but rather camouflaged segments of other programs

Their objective is to destroy data on the computer once certain conditions have been met Logic bombs go undetected until launched and the results can be destructive

E How Do You Stay Safe On The Internet

The first part of the answer to the question How do you stay safe on the Internet is know what the threats are that you and your computer are up against

Without this knowledge how are you going to know youve got everything covered off Do you just rely on what the security software vendors tell you to spend your money on

By being aware of what the risks are I suggest you will save yourself money and have more effective protection when it comes to the second part of the answer to the question How do you stay safe on the Internet selecting effective prevention and protection to guard privacy and online security

To help you decide what is necessary for your particular protection in The Three Levels Of Internet Risk Protection I talk about the safe practices that help protect your computer and the types of software to use -- from those that are absolutely essential for security to others which you may want to install to guard privacy to the level you desire

But back to this article How Do You Stay Safe On The Internet here Ill provide you with an introduction to each type of threat At the end of it youll have a good feel for the dangers on the Internet and how those threats can affect you your PC and your information be it personal financial family or business

There are ten of the most prevalent threats covered here Either go through them all or click on the links below for those you are particularly interested in

1 Viruses and Worms 2 Trojan Horses 3 Rootkits 4 Crackers and Hackers 5 Spam 6 Web Bugs 7 Child Security 8 Pop-UpUnder Ads 9 Tracking Cookies 10 Spyware

By the way Ive tried to keep the technical language simple but if you dont understand some of the terms check them out at Netlingo which provides definitions and explanations for all Net terminology

1 Viruses And Worms

What Is A VirusA virus is a man-made computer program that infects a file or program on our computers Each time the infected program is run the virus is also triggered It spreads itself by infecting other programs on the same computer

What Is A WormA worm is also a man-made program that replicates itself However unlike a virus it does not infect other program files on the computer Instead a worm spreads itself automatically to other computers through email over a network and via Internet Relay Chat (IRC)

How Do We Get InfectedViruses and worms can infect desktop computers laptops and network servers and reach our PCs from email web sites downloaded files and loadable media (eg floppy disks CD-ROMs and DVDs)

How Does A Virus Or Worm Infection Affect UsUnfortunately the effects of an infection are pretty unpleasant The virus or worm can

Disable the computer

Add modify or delete files or reformat the hard disk

Steal addresses held in our computer to send on virus-infected emails to our friends colleagues clients or customers

Send unsolicited bulk email (spam) to those in our mail address books and other users

2 Trojan Horses

What Is A Trojan HorseAlthough Trojan horse programs are categorized as viruses they are not true viruses since they do not replicate But like viruses they are one of the most destructive of the Internet risks covered in How Do You Stay Safe On The Internet and are favored by crackers and spyware writers

How Do We Get InfectedTrojans are one of the sneakiest of the online risks They are often downloaded on the back of a free program (freeware) that has some value to the user -- a free game software program or music for instance

How Does A Trojan Infection Affect Us

A Trojan installed on a computer allows that PC to be entered via a backdoor by any remote user that has the access code to the Trojan

The remote attacker can enter the computer undetected when the user is online to access or destroy any information stored Alternatively the Trojan can be programmed to automatically send any information on our PCs back to the attacker This could include

Client or customer information or other business data

Credit card details

Passwords for access to your online bank ISP or web services

Information you would rather remain hidden

Email addresses which may be used for spamming

Childrens names photographs ages or other personal details held on the computer

Distributed Denial of Service (DDOS) attack on other computers via the victims computer

No wonder we ask how do you stay safe on the Internet

3 How Do You Stay Safe On The InternetRootkitsWhat Is A RootkitRootkits are not destructive in their own right but they are designed to conceal the presence of malicious programs on a computer

How Do We Get InfectedAs with any malware such as viruses worms Trojans and spyware rootkits get onto our computers by various means such as through spam attachments being opened on the back of free downloads or planted by crackers who have breached computer defenses

How Does A Rootkit Affect UsRootkits are there for one reason only to ensure that an intruder can access our system and take control without detection by defenses to guard privacy and security

One of the most common and worrying uses of rootkits which causes us to ask How Do You Stay Safe On The Internet is to launch spam and denial of service (DOS) attacks against other computers or networks Another use of

rootkits is to hide Trojans so an intruder can easily use it to extract data from your computer as mentioned above

4 Crackers And Hackers

What Is A HackerCrackerThe term hacker is a misused term We should really be referring to a cracker to describe those who break security on a computer system

The original term hacker refers to computer enthusiasts who enjoy learning everything about a computer system

How Do We Get AttackedCrackers run programs that scan computer ports over the Internet to work out which ports are accessible If our computer shows up in one of these scans the cracker may decide to enter our PC

Crackers favorite targets are the home and home office computers connected by broadband to the Internet because the connection is always open there is more opportunity to locate these computers with their scanners

Alternatively crackers may just exploit weaknesses that have not been patched in the computers operating system in order to gain entry As discussed above Trojans are another way crackers use to gain access to our PCs

How Does A Cracker Affect UsBesides the potentially valuable information they can obtain from our PCs such as that listed under Trojans these intruders also want our hard disk space and Internet connection With these resources they can use our computers to send out spam or attack other computers on the Internet and all this can be done without our knowledge Another reason why we should know how do you stay safe on the Internet

5 Spam -- Unsolicited Email

What Is SpamSpam is defined in Dictionarycom as Unsolicited e-mail often of a commercial nature sent indiscriminately to multiple mailing lists individuals or newsgroups junk e-mail

Spammers peddle pornography sexual aids diet pills and get-rich-quick schemes in fact anything that has a perceived value

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

Define multiplexing

OSI Physical layer Services and Functions OSI Model

V TERMS and TERMINOLOGIES

I LESSON 1 The INRODUCTION

Objectives Define and describe the Internet To know the resources of internet Define the Internet backbone

History

A What is Internet

A world wide network of computer network Internet Connected VIA Telecommunication Links The information ldquoSuper Highwayrdquo Mother of all Network

Introduction of InternetThe internet is a global of interconnected government academic public and

private computer networks which is based upon the networking technologies of the Internet Protocol Suite It is the successor of the Advanced Research Project Agency Network (ARPANET) developed by DARPA of the US Department of Defense

The Internet is also a communications backbone underlying the World Wide Web (WWW)

The Internet changes so quickly and the technology advances so rapidly that it can seem almost impossible to keep up with all of it If youre like just about everyone else involved in the Internet your questions are similar to those of my friend Youll find your answers here

C The History

Objectives To know Origin of Internet History To Create a digital archive or source materials about the creation and

evolution of the Internet

Generate new historical material through the collection of commentaries that include participants stories observations perspectives and memories

B1 History Preview

1957 (Potential Origin and Beginning -- The History of the Internet)The USSR launches Sputnik the first artificial earth satellite In response the United States forms the Advanced Research Projects Agency (ARPA) within the Department of Defense (DoD) to establish US lead in science and technology applicable to the militaryBackbones None - Hosts None

1962 RAND Paul Baran of the RAND Corporation (a government agency) was commissioned by the US Air Force to do a study on how it could maintain its command and control over its missiles and bombers after a nuclear attack This was to be a military research network that could survive a nuclear strike decentralized so that if any locations (cities) in the US were attacked the military could still have control of nuclear arms for a counter-attack

Barans finished document described several ways to accomplish this His final proposal was a packet switched network

Packet switching is the breaking down of data into datagrams or packets that are labeled to indicate the origin and the destination of the information and the forwarding of these packets from one computer to another computer until the information arrives at its final destination computer This was crucial to the realization of a computer network If packets are lost at any given point the message can be resent by the originatorBackbones None - Hosts None

1968 ARPA awarded the ARPANET contract to BBN BBN had selected a Honeywell minicomputer as the base on which they would build the switch The physical network was constructed in 1969 linking four nodes University of California at Los Angeles SRI (in Stanford) University of California at Santa Barbara and University of Utah The network was wired together via 50 Kbps circuitsBackbones 50Kbps ARPANET - Hosts 4

1972 The first e-mail program was created by Ray Tomlinson of BBNThe Advanced Research Projects Agency (ARPA) was renamed The Defense Advanced Research Projects Agency (or DARPA)

ARPANET was currently using the Network Control Protocol or NCP to transfer data This allowed communications between hosts running on the same networkBackbones 50Kbps ARPANET - Hosts 23

1973 Development began on the protocol later to be called TCPIP

It was developed by a group headed by Vinton Cerf from Stanford and Bob Kahn from DARPA This new protocol was to allow diverse computer networks to interconnect and communicate with each otherBackbones 50Kbps ARPANET - Hosts 23+

1974 First Use of term Internet by Vint Cerf and Bob Kahn in paper on Transmission Control ProtocolBackbones 50Kbps ARPANET - Hosts 23+

1976 Dr Robert M Metcalfe develops Ethernet which allowed coaxial cable to move data extremely fast This was a crucial component to the development of LANsThe packet satellite project went into practical use SATNET Atlantic packet Satellite network was born This network linked the United States with Europe Surprisingly it used INTELSAT satellites that were owned by a consortium of countries and not exclusively the United States government

UUCP (Unix-to-Unix CoPy) developed at ATampT Bell Labs and distributed with UNIX one year later

The Department of Defense began to experiment with the TCPIP protocol and soon decided to require it for use on ARPANETBackbones 50Kbps ARPANET plus satellite and radio connections - Hosts 111+

1979 USENET (the decentralized news group network) was created by Steve Bellovin a graduate student at University of North Carolina and programmers Tom Truscott and Jim Ellis It was based on UUCP

The Creation of BITNET by IBM Because its Time Network introduced the store and forward network It was used for email and listservsBackbones 50Kbps ARPANET plus satellite and radio connections - Hosts 111+

1981 National Science Foundation Created backbone called CSNET 56 Kbps network for institutions without access to ARPANET Vinton Cerf proposed a plan for an inter-network connection between CSNET and the ARPANETBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 213

1983 Internet Activities Board (IAB) was created in 1983On January 1st every machine connected to ARPANET had to use TCPIP TCPIP became the core Internet protocol and replaced NCP entirely

The University of Wisconsin created Domain Name System (DNS) This allowed packets to be directed to a domain name which would be translated by the server database into the

corresponding IP number This made it much easier for people to access other servers because they no longer had to remember numbersBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 562

1984 The ARPANET was divided into two networks MILNET and ARPANET MILNET was to serve the needs of the military and ARPANET to support the advanced research component Department of Defense continued to support both networks

Upgrade to CSNET was contracted to MCI New circuits would be T1 lines15 Mbps which is twenty-five times faster than the old 56 Kbps lines IBM would provide advanced routers and Merit would manage the network New network was to be called NSFNET (National Science Foundation Network) and old lines were to remain called CSNETBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 1024

1985 The National Science Foundation began deploying its new T1 lines which would be finished by 1988Backbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 1961

1986 The Internet Engineering Task Force or IETF was created to serve as a forum for technical coordination by contractors for DARPA working on ARPANET US Defense Data Network (DDN) and the Internet core gateway systemBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 2308

1987 BITNET and CSNET merged to form the Corporation for Research and Educational Networking (CREN) another work of the National Science FoundationBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 28174

1988 Soon after the completion of the T1 NSFNET backbone traffic increased so quickly that plans immediately began on upgrading the network againBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 56000

1990 (Updated 82001) Merit IBM and MCI formed a not for profit corporation called ANS Advanced Network amp Services which was to conduct research into high speed networking It soon came up with the concept of the T3 a 45 Mbps line NSF quickly adopted the new network and by the end of 1991 all of its sites were connected by this new backbone

While the T3 lines were being constructed the Department of Defense disbanded the ARPANET and it was replaced by the NSFNET backbone The original 50Kbs lines of ARPANET were taken out of service

Tim Berners-Lee and CERN in Geneva implements a hypertext system to provide efficient information access to the members of the international high-energy physics communityBackbones 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 313000

1991CSNET (which consisted of 56Kbps lines) was discontinued having fulfilled its important early role in the provision of academic networking service A key feature of CREN is that its operational costs are fully met through dues paid by its member organizations

The NSF established a new network named NREN the National Research and Education Network The purpose of this network is to conduct high speed networking research It was not to be used as a commercial network nor was it to be used to send a lot of the data that the Internet now transfersBackbones Partial 45Mbps (T3) NSFNET a few private backbones plus satellite and radio connections - Hosts 617000

1992 Internet Society is chartered

World-Wide Web released by CERNNSFNET backbone upgraded to T3 (44736Mbps)Backbones 45Mbps (T3) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps plus satellite and radio connections - Hosts 1136000

1993 InterNIC created by NSF to provide specific Internet services directory and database services (by ATampT) registration services (by Network Solutions Inc) and information services (by General AtomicsCERFnet)

Marc Andreessen and NCSA and the University of Illinois develops a graphical user interface to the WWW called Mosaic for XBackbones 45Mbps (T3) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps and 45Mpbs lines plus satellite and radio connections - Hosts 2056000

1994 No major changes were made to the physical network The most significant thing that happened was the growth Many new networks were added to the NSF backbone Hundreds of thousands of new hosts were added to the INTERNET during this time period

Pizza Hut offers pizza ordering on its Web page

First Virtual the first cyberbank opens

ATM (Asynchronous Transmission Mode 145Mbps) backbone is installed on NSFNETBackbones 145Mbps (ATM) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps and 45Mpbs lines plus satellite and radio connections - Hosts 3864000

1995 The National Science Foundation announced that as of April 30 1995 it would no longer allow direct access to the NSF backbone The National Science Foundation contracted with four companies that would be providers of access to the NSF backbone (Merit) These companies would then sell connections to groups organizations and companies

$50 annual fee is imposed on domains excluding edu and gov domains which are still funded by the National Science FoundationBackbones 145Mbps (ATM) NSFNET (now private) private interconnected backbones consisting mainly of 56Kbps 1544Mbps 45Mpbs 155Mpbs lines in construction plus satellite and radio connections - Hosts 6642000

1996 Most Internet traffic is carried by backbones of independent ISPs including MCI ATampT Sprint UUnet BBN planet ANS and more

The Internet Society the group that controls the INTERNET researches new TCPIP technology that will be able to have more than the approximately 43 billion addresses currently available The problem that has arisen is that it is not known how both the old and the new addressing systems will be able to work at the same time during a transition period

Internet2 is established

(Backbone data below was valid in 1996 please seek other references for current backbone and host data as it is constantly expanded)Backbones 145Mbps (ATM) NSFNET (now private) private interconnected backbones consisting mainly of 56Kbps 1544Mbps 45Mpbsand 155Mpbs lines plus satellite and radio connections - Hosts over 15000000 and growing rapidly

The Present and The Future

A new technology recommendation called IPv6 is suggested to replace the current IPv4 technology IPv4 allows for fewer than 43 billion directly connected Internet devices problematic because the world population (as of 2009) is well over 65 billion (theoretically if ever human had a computer and mobile phone wed need 13 billion addresses which is something IPv6 can easily accomplish)

In 1999 a wireless technology called 80211b more commonly referred to as Wi-Fi is standardized Over the years that follow this technology begins appearing as a built-in feature of portable computers and many handheld devices

In 2005 the One Laptop Per Child project begins In an attempt to provide low cost education-designed laptops to children around the world for a low cost (US$100 per unit) this project helps spark the netbook industry Netbooks are small portable computers with extended battery life and built-in Wi-Fi connectivity

Multi-touch technology begins to appear in handheld devices tablet computers and netbooks This technology supplements traditional touch-screen technology by allowing advanced gesturing (several fingers moving on a screen instead of just one) Multi-touch technology is seen as a possible alternative to traditional keyboard and mouse (touchpad) systems

Read Bill Buxtons Overview and History of Multi-Touch Systems entitled Multi-Touch Systems that I Have Known and Loved

In December 2009 the first multi-touch website is reported

B2 Overview of InternetThe Internet is a global computer network made up of smaller computer networks

it hasbeen called a Network of NetworksThese smaller networks include1048707 Local Area Networks (like networked offices or computer labs and campus-wide

networks)1048707 Wide Area Networks (like city-wide networks)1048707 State and Regional Networks (including regional service providers and others)1048707 National and International Networks

There is no one inventor of the Internet The Internet was created in the 1960s as a huge network linking big university and government computers The science behind the Internet was invented during the Cold War when the United States was in competition against Russia for weapons and technology So the Internet is actually pretty oldmdasharound forty years Much of Internetrsquos initial development was supported by American governmental research and network development (beginning with the American militarys ARPANET in 1969)In fact email has been around since 1972 In 1989 that Tim Berners-Lee a scientist at the European Laboratory for Particle Physics in Geneva proposed the World Wide Web Now Internet Service Providers (ISPs) offer Internet access to their clients at costs ranging from Rs 150- per 6 months to hundreds of rupees per year depending on the types of service they offer

II What people do when surfing People usually get to surfing to internet to do things that are complicated

for them They do a short time for them while surfing depends from the user surfing is the very easiest thing to search for what you want to know

Surfing is one where you can get information access to an educational learning where you can also communicate for an entertainment or an Personal Information

Surfing is one of the easiest way of sharing files and document or any personal data

I1 Surfing is build for a network and made up of organization

i Communication ii Education

iii Business managements Commercial Company iv Government v Private Organization

vi Entertainment

I2 What are the uses of the Internet

There are three fundamental uses of the Internet Communication Information Retrieval Presentation of Information

Communication The Internet is used both for one-to-one communications (email and real-time chat

programs) and one-to-many

Information Retrieval The Internet allows access to public domain information bibliographic databases

libraries and entertainment services as well as to proprietary information services

Presentation of Information Any organization connected to the Internet can provide access to its own in-house

information (library catalogs faculty information etc) to millions of people world-wide Individuals can also develop and provide their own information packages via their own

home pages

II Terms and Web PoliciesObjectives

To know the resources of internet Navigate around the web using Internet Explorer To know what internet services we have To know what is the risk when your online Define the World Wide Web Explain the work of the Domain Name Service Explain the difference between IP address and domain name How to protect and stay safe online

A Internet Addresses

Every computer file of information and person on the Internet is identified by a unique address

A1 Computer AddressesComputer addresses are made up of three parts (or in some cases two parts) separated

by dots like this computer-nameinstitutiondomain

The computer name is a name given locally to identify a particular computer it is in some cases omitted from the address The institution name is the name (or an abbreviation) of the name of the school company or other institution housing the computer The domain name specifies either the type or the geographic location of the computer

A2 Domain NamesThere are several possible domain names including some that identify the type of institution and some that identify a geographical location They include

edu Educational institutioncom Commercial and profitable organizationsorg Non-profitable organizations

net Internet infrastructure and service providersgov Governmental agencydepartmentmil American military agencyint International organizationsus United Statesin Indiamy Malaysiaca Canadajp Japanbiz Businessaero Aeronautics

A3 Personal Addresses

A persons address (or their email address) places the users username (or login) and the symbol before the computer address For example a user whose username is creator who is accessing email from the yahoo server of United State Yahoo Website would have the following address creatoryahoocom

B Internet Services

B1 Internet Services

rdquoInternet servicesrdquo serve more sophisticated and multi-purpose purposes and increasingly make the Internet a truly useful information resource

B11 EmailIt is the Internets version of the postal service Using the Internet it provides the ability to send a message reply to a message send a file created in another program andor even send the same message to a group of people Some benefits of Email arebull Speed A message can be sent from Chennai to Australia in a matter of secondsbull Cost Emails are cheap You are usually only charged for the telephone call time (local call rate) for sending the message into the Internet and not the cost associated with transferring the message across the Internetbull Flexibility It is easy to send duplicates of your messages to other people or groups for the cost of a single messagebull Record keeping Messages sent and received can be easily stored for future referenceIn order to use Email you will need Internet access arranged through an InternetService Provider (ISP) who will allocate you one or a number of Email accounts To be able to retrieve and send mail from these addresses a user will need what is known as Email client software and your ISP usually provides this although nowadays most computers come with it pre-installed

B12 Mail Lists

These use email to support discussion groups on a wide range of specific subjectsOnce you are becoming a subscriber of a mailing list you will receive lot of emails related to the subject covered by the mailing list

B13 FTPFTP was the original Internet mechanism for the storage and retrieval of information There are still many FTP Sites around the Internet although many of them have been melded into the World Wide Web In computer science FTP stands for File Transfer Protocol which is a way of transferring files between computers A file can be anything -- a spreadsheet a word document a song or a picture When someone says Please FTP me that file for instance that means Please transfer that file from your computer to mine To FTP you usually need to download a special program or application You also usually need a password to be able to access or send information to someone elses computer

B14 GopherGopher was developed at the University of Minnesota primarily to support its own Campus Wide Information Server (CWIS) It provides access to information available either locally or elsewhere on the Internet by means of a simple series of uniformly designed menus

B15 Instant Messaging (IM)There are lots of other fun and useful IM features you can explore like group chats file transfers voice calls video conferencing and emoticons that reflect your mood

B16 IRCIRC stands for Internet Relay Chat It has been used in many countries around the world IRC is a multi-user chat system where people meet on channels (rooms virtual places usually with a certain topic of conversation) to talk in groups or privately There is no restriction to the number of people that can participate in a given discussion or the number of channels that can be formed on IRC

B17 NewsgroupsThe Internet has a place where we can gather question and discuss our experiences within a wide variety of topics Its called Usenet News Some users also call it Net NewsThink of Usenet News as a giant worldwide bulletin board Anyone can freely post something on this bulletin board Everyone else can read the posted items and add their own items These voluntary contributions and free exchange of information are the foundation of the Internet

B18 Voice over IPVoice over IP (Voice over Internet Protocol or VoIP) technology converts voice calls from analog to digital to be sent over digital data networks In Voice over IP or VoIP voice data and video all travel along the network

B19 World Wide Web (WWW)The newest information application on the Internet the WWW provides standardized access to Gopher FTP Telnet and more by means of home pages designed either by institutions or

b individuals By means of the HyperText Markup Language (HTML) it allows users to point at highlighted terms following links to whatever information interests them It is a multimedia environment allowing Internet users access to audio and video materials There are a number of client software packages (or browsers) including Lynx (a textonly browser) Netscape and Microsofts Internet Explorer (which are multimedia browsers)

C Types of Internet Connection

C1 Types of Internet connections

The options for providing user connectivity to the Internet are given below

1 Terminal DialupModem (Shell connection)1048707 Most common option1048707 User requirements limited to modem and communications software1048707 Text-only access1048707 Shell accounts were more popular before the advent of the Web A shell account lets

you use your computer much as if it were a virtual console associated with a remote computer You can type commands which are interpreted by the remote computer and view the resulting output on your computer Although a few web browsers such as Lynx can operate via a shell account they donrsquot generally support the highly graphical multimedia pages which web surfers have come to expect

2 SLIP (Serial Line Internet Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software SLIP software amp software for Internet

applications1048707 Multimedia access

3 PPP (Point-to-Point Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software PPP software amp software for Internet

applications1048707 Multimedia access1048707 While your computer is connected to the Internet you can use it to surf the Web with

your favorite browser If your ISP allows you can even run a web server providing pages that can be viewed by others around the world

4 ISDN (Integrated Services Digital Network)1048707 Most often used to connect remote telecommuters to office LANs1048707 Requires ISDN phone line access1048707 Faster than analog terminal dialupmodem service

1048707 User must have ISDN phone line ISDN card communications software TCP software amp SLIP or PPP software multimedia connectivity

5 DIAS1048707 The DIAS offers a wire-line solution for high speed symmetrical Internet access on the

existing telephone lines It provides an always on internet access that is permanently available at customers premises DIAS combines voice and internet data packets on a single twisted pair wire at subscriber premises that means you can use telephone and surf internet at the same time

6 Cable Modem1048707 The term ldquoCable Modemrdquo is quite new and refers to a modem that operates over the

ordinary cable TV network cables Basically you just connect the Cable Modem to the TV outlet for your cable TV and the cable TV operator connects a Cable Modem Termination System (CMTS) in his end (the Head-End)

1048707 Actually the term ldquoCable Modemrdquo is a bit misleading as a Cable Modem works more like a Local Area Network (LAN) interface than as a modem

1048707 In a cable TV system signals from the various channels are each given a 6-MHz slice of the cablersquos available bandwidth and then sent down the cable to your house When a cable company offers Internet access over the cable Internet information can use the same cables because the cable modem system puts downstream data ndash data sent from the Internet to an individual computer ndash into a 6-MHz channel On the cable the data looks just like a TV channel So Internet downstream data takes up the same amount of cable space as any single channel of programming Upstream data ndash information sent from an individual back to the Internet ndash requires even less of the cablersquos bandwidth just 2 MHz since the assumption is that most people download far more information than they upload

1048707 Putting both upstream and downstream data on the cable television system requires two types of equipment a cable modem on the customer end and a cable modem termination system (CMTS) at the cable providerrsquos end Between these two types of equipment all the computer networking security and management of Internet access over cable television is put into place

7 Digital Subscriber Line (DSL) connection1048707 DSL is a very high-speed connection that uses the same wires as a regular telephone

line1048707 Here are some advantages of DSL

1 You can leave your Internet connection open and still use the phone line for voice calls

2 The speed is much higher than a regular modem3 DSL doesnrsquot necessarily require new wiring it can use the phone line you

already have4 The company that offers DSL (eg BSNL) will usually provide the modem as

part of the installation1048707 But there are disadvantages

1 A DSL connection works better when you are closer to the providerrsquos central office

2 The service is not available everywhere1048707 Other types of DSL include

1 Asymmetric DSL (ADSL) line ndash The connection is faster for receiving data than it is for sending data over the Internet

2 Very high bit-rate DSL (VDSL) ndash This is a fast connection but works only over a short distance

3 Symmetric DSL (SDSL) ndash This connection used mainly by small businesses doesnrsquot allow you to use the phone at the same time but the speed of receiving and sending data is the same

4 Rate-adaptive DSL (RADSL) ndash This is a variation of ADSL but the modem can adjust the speed of the connection depending on the length and quality of the line

8 Direct Connection (Leased circuit)1048707 Most often used to connect sites within a specific organization such as a university or

business requires owning or leasing of cable (from 64 kbps to T-3) users typically connected via Ethernet LANs multimedia connectivity at its fastest

9 Satellite connections1048707 This connection allows you to download Internet files via a satellite connection This is

an efficient method for receiving large Web graphics and other items but you still need a modem connection for other features You must purchase the connection hardware as well as subscribe to the service

10 Wireless connections1048707 Pagers cellular phones and personal digital assistants (PDAs) now allow varying levels

of Internet access from notification of E-mail to limited Web connections Many of these services remain in the experimental stage The PPP connection is called as TCPIP connection or PSTN dial-up connection ISDN connection is called as ISDN dial-up connection Cable Modem DSL and Direct Connection are always-on connection The words ldquoconnectionrdquo and ldquoaccountrdquo related to Internet are interchangeable

D Computer Virus

The Internet just like the rest of the world is not a perfectly safe place to visit If you download files from the Internet there is a chance a very small chance but nonetheless a chance that your computer could become infected with a virus

Viruses are malicious programs that invade your computer They can cause many different kinds of damage such as deleting data files erasing programs or destroying

everything they find on your hard disk Not every virus causes damage some simply flash annoying messages

Different Types of Computer VirusesThere are Different Types of Computer Viruses could be classified in

(origin techniques types of files they infect where they hide the kind of damage they cause the type of operating system or platform they attack) etc Let us have a look at themhellip

Computer Virus is a kind of malicious software written intentionally to enter a computer without the userrsquos permission or knowledge with an ability to replicate itself thus continuing to spread Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system A virus should never be assumed harmless and left on a system Most common types of viruses are mentioned below

Resident VirusesThis type of virus is a permanent which dwells in the RAM memory From

there it can overcome and interrupt all of the operations executed by the system corrupting files and programs that are opened closed copied renamed etc

Examples include Randex CMJ Meve and MrKlunky

Direct Action VirusesThe main purpose of this virus is to replicate and take action when it is

executed When a specific condition is met the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXECBAT file PATH This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted

Overwrite VirusesVirus of this kind is characterized by the fact that it deletes the information

contained in the files that it infects rendering them partially or totally useless once they have been infected

The only way to clean a file infected by an overwrite virus is to delete the file completely thus losing the original content

Examples of this virus include Way TrjReboot Trivial88D

Boot Virus

This type of virus affects the boot sector of a floppy or hard disk This is a crucial part of a disk in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive

Examples of boot viruses include PolybootB AntiEXE

Macro VirusMacro viruses infect files that are created using certain applications or

programs that contain macros These mini-programs make it possible to automate series of operations so that they are performed as a single action thereby saving the user from having to carry them out one by one

Examples of macro viruses Relax MelissaA Bablas O97MY2K

Directory VirusDirectory viruses change the paths that indicate the location of a file By

executing a program (file with the extension EXE or COM) which has been infected by a virus you are unknowingly running the virus program while the original file and program have been previously moved by the virus

Once infected it becomes impossible to locate the original files

Polymorphic VirusPolymorphic viruses encrypt or encode themselves in a different way

(using different algorithms and encryption keys) every time they infect a system

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves

Examples include Elkern Marburg Satan Bug and Tuareg

File InfectorsThis type of virus infects programs or executable files (files with an EXE

or COM extension) When one of these programs is run directly or indirectly the virus is activated producing the damaging effects it is programmed to carry out The majority of existing viruses belong to this category and can be classified depending on the actions that they carry out

Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types They are known as companion viruses because once they get into the system they accompany the other files that already exist In other words in order to carry out their infection routines companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses)

Some examples include Stator Asimov1539 and Terrax1069

FAT VirusThe file allocation table or FAT is the part of a disk used to connect

information and is a vital part of the normal functioning of the computerThis type of virus attack can be especially dangerous by preventing access to certain sections of the disk where important files are stored Damage caused can result in information losses from individual files or even entire directories

WormsA worm is a program very similar to a virus it has the ability to self-

replicate and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses

Examples of worms include PSWBugbearB LovgateF TrileC SobigD Mapson

Trojans or Trojan HorsesAnother unsavory breed of malicious code are Trojans or Trojan horses

which unlike viruses do not reproduce by infecting other files nor do they self-replicate like worms

Logic BombsThey are not considered viruses because they do not replicate They are not

even programs in their own right but rather camouflaged segments of other programs

Their objective is to destroy data on the computer once certain conditions have been met Logic bombs go undetected until launched and the results can be destructive

E How Do You Stay Safe On The Internet

The first part of the answer to the question How do you stay safe on the Internet is know what the threats are that you and your computer are up against

Without this knowledge how are you going to know youve got everything covered off Do you just rely on what the security software vendors tell you to spend your money on

By being aware of what the risks are I suggest you will save yourself money and have more effective protection when it comes to the second part of the answer to the question How do you stay safe on the Internet selecting effective prevention and protection to guard privacy and online security

To help you decide what is necessary for your particular protection in The Three Levels Of Internet Risk Protection I talk about the safe practices that help protect your computer and the types of software to use -- from those that are absolutely essential for security to others which you may want to install to guard privacy to the level you desire

But back to this article How Do You Stay Safe On The Internet here Ill provide you with an introduction to each type of threat At the end of it youll have a good feel for the dangers on the Internet and how those threats can affect you your PC and your information be it personal financial family or business

There are ten of the most prevalent threats covered here Either go through them all or click on the links below for those you are particularly interested in

1 Viruses and Worms 2 Trojan Horses 3 Rootkits 4 Crackers and Hackers 5 Spam 6 Web Bugs 7 Child Security 8 Pop-UpUnder Ads 9 Tracking Cookies 10 Spyware

By the way Ive tried to keep the technical language simple but if you dont understand some of the terms check them out at Netlingo which provides definitions and explanations for all Net terminology

1 Viruses And Worms

What Is A VirusA virus is a man-made computer program that infects a file or program on our computers Each time the infected program is run the virus is also triggered It spreads itself by infecting other programs on the same computer

What Is A WormA worm is also a man-made program that replicates itself However unlike a virus it does not infect other program files on the computer Instead a worm spreads itself automatically to other computers through email over a network and via Internet Relay Chat (IRC)

How Do We Get InfectedViruses and worms can infect desktop computers laptops and network servers and reach our PCs from email web sites downloaded files and loadable media (eg floppy disks CD-ROMs and DVDs)

How Does A Virus Or Worm Infection Affect UsUnfortunately the effects of an infection are pretty unpleasant The virus or worm can

Disable the computer

Add modify or delete files or reformat the hard disk

Steal addresses held in our computer to send on virus-infected emails to our friends colleagues clients or customers

Send unsolicited bulk email (spam) to those in our mail address books and other users

2 Trojan Horses

What Is A Trojan HorseAlthough Trojan horse programs are categorized as viruses they are not true viruses since they do not replicate But like viruses they are one of the most destructive of the Internet risks covered in How Do You Stay Safe On The Internet and are favored by crackers and spyware writers

How Do We Get InfectedTrojans are one of the sneakiest of the online risks They are often downloaded on the back of a free program (freeware) that has some value to the user -- a free game software program or music for instance

How Does A Trojan Infection Affect Us

A Trojan installed on a computer allows that PC to be entered via a backdoor by any remote user that has the access code to the Trojan

The remote attacker can enter the computer undetected when the user is online to access or destroy any information stored Alternatively the Trojan can be programmed to automatically send any information on our PCs back to the attacker This could include

Client or customer information or other business data

Credit card details

Passwords for access to your online bank ISP or web services

Information you would rather remain hidden

Email addresses which may be used for spamming

Childrens names photographs ages or other personal details held on the computer

Distributed Denial of Service (DDOS) attack on other computers via the victims computer

No wonder we ask how do you stay safe on the Internet

3 How Do You Stay Safe On The InternetRootkitsWhat Is A RootkitRootkits are not destructive in their own right but they are designed to conceal the presence of malicious programs on a computer

How Do We Get InfectedAs with any malware such as viruses worms Trojans and spyware rootkits get onto our computers by various means such as through spam attachments being opened on the back of free downloads or planted by crackers who have breached computer defenses

How Does A Rootkit Affect UsRootkits are there for one reason only to ensure that an intruder can access our system and take control without detection by defenses to guard privacy and security

One of the most common and worrying uses of rootkits which causes us to ask How Do You Stay Safe On The Internet is to launch spam and denial of service (DOS) attacks against other computers or networks Another use of

rootkits is to hide Trojans so an intruder can easily use it to extract data from your computer as mentioned above

4 Crackers And Hackers

What Is A HackerCrackerThe term hacker is a misused term We should really be referring to a cracker to describe those who break security on a computer system

The original term hacker refers to computer enthusiasts who enjoy learning everything about a computer system

How Do We Get AttackedCrackers run programs that scan computer ports over the Internet to work out which ports are accessible If our computer shows up in one of these scans the cracker may decide to enter our PC

Crackers favorite targets are the home and home office computers connected by broadband to the Internet because the connection is always open there is more opportunity to locate these computers with their scanners

Alternatively crackers may just exploit weaknesses that have not been patched in the computers operating system in order to gain entry As discussed above Trojans are another way crackers use to gain access to our PCs

How Does A Cracker Affect UsBesides the potentially valuable information they can obtain from our PCs such as that listed under Trojans these intruders also want our hard disk space and Internet connection With these resources they can use our computers to send out spam or attack other computers on the Internet and all this can be done without our knowledge Another reason why we should know how do you stay safe on the Internet

5 Spam -- Unsolicited Email

What Is SpamSpam is defined in Dictionarycom as Unsolicited e-mail often of a commercial nature sent indiscriminately to multiple mailing lists individuals or newsgroups junk e-mail

Spammers peddle pornography sexual aids diet pills and get-rich-quick schemes in fact anything that has a perceived value

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

I LESSON 1 The INRODUCTION

Objectives Define and describe the Internet To know the resources of internet Define the Internet backbone

History

A What is Internet

A world wide network of computer network Internet Connected VIA Telecommunication Links The information ldquoSuper Highwayrdquo Mother of all Network

Introduction of InternetThe internet is a global of interconnected government academic public and

private computer networks which is based upon the networking technologies of the Internet Protocol Suite It is the successor of the Advanced Research Project Agency Network (ARPANET) developed by DARPA of the US Department of Defense

The Internet is also a communications backbone underlying the World Wide Web (WWW)

The Internet changes so quickly and the technology advances so rapidly that it can seem almost impossible to keep up with all of it If youre like just about everyone else involved in the Internet your questions are similar to those of my friend Youll find your answers here

C The History

Objectives To know Origin of Internet History To Create a digital archive or source materials about the creation and

evolution of the Internet

Generate new historical material through the collection of commentaries that include participants stories observations perspectives and memories

B1 History Preview

1957 (Potential Origin and Beginning -- The History of the Internet)The USSR launches Sputnik the first artificial earth satellite In response the United States forms the Advanced Research Projects Agency (ARPA) within the Department of Defense (DoD) to establish US lead in science and technology applicable to the militaryBackbones None - Hosts None

1962 RAND Paul Baran of the RAND Corporation (a government agency) was commissioned by the US Air Force to do a study on how it could maintain its command and control over its missiles and bombers after a nuclear attack This was to be a military research network that could survive a nuclear strike decentralized so that if any locations (cities) in the US were attacked the military could still have control of nuclear arms for a counter-attack

Barans finished document described several ways to accomplish this His final proposal was a packet switched network

Packet switching is the breaking down of data into datagrams or packets that are labeled to indicate the origin and the destination of the information and the forwarding of these packets from one computer to another computer until the information arrives at its final destination computer This was crucial to the realization of a computer network If packets are lost at any given point the message can be resent by the originatorBackbones None - Hosts None

1968 ARPA awarded the ARPANET contract to BBN BBN had selected a Honeywell minicomputer as the base on which they would build the switch The physical network was constructed in 1969 linking four nodes University of California at Los Angeles SRI (in Stanford) University of California at Santa Barbara and University of Utah The network was wired together via 50 Kbps circuitsBackbones 50Kbps ARPANET - Hosts 4

1972 The first e-mail program was created by Ray Tomlinson of BBNThe Advanced Research Projects Agency (ARPA) was renamed The Defense Advanced Research Projects Agency (or DARPA)

ARPANET was currently using the Network Control Protocol or NCP to transfer data This allowed communications between hosts running on the same networkBackbones 50Kbps ARPANET - Hosts 23

1973 Development began on the protocol later to be called TCPIP

It was developed by a group headed by Vinton Cerf from Stanford and Bob Kahn from DARPA This new protocol was to allow diverse computer networks to interconnect and communicate with each otherBackbones 50Kbps ARPANET - Hosts 23+

1974 First Use of term Internet by Vint Cerf and Bob Kahn in paper on Transmission Control ProtocolBackbones 50Kbps ARPANET - Hosts 23+

1976 Dr Robert M Metcalfe develops Ethernet which allowed coaxial cable to move data extremely fast This was a crucial component to the development of LANsThe packet satellite project went into practical use SATNET Atlantic packet Satellite network was born This network linked the United States with Europe Surprisingly it used INTELSAT satellites that were owned by a consortium of countries and not exclusively the United States government

UUCP (Unix-to-Unix CoPy) developed at ATampT Bell Labs and distributed with UNIX one year later

The Department of Defense began to experiment with the TCPIP protocol and soon decided to require it for use on ARPANETBackbones 50Kbps ARPANET plus satellite and radio connections - Hosts 111+

1979 USENET (the decentralized news group network) was created by Steve Bellovin a graduate student at University of North Carolina and programmers Tom Truscott and Jim Ellis It was based on UUCP

The Creation of BITNET by IBM Because its Time Network introduced the store and forward network It was used for email and listservsBackbones 50Kbps ARPANET plus satellite and radio connections - Hosts 111+

1981 National Science Foundation Created backbone called CSNET 56 Kbps network for institutions without access to ARPANET Vinton Cerf proposed a plan for an inter-network connection between CSNET and the ARPANETBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 213

1983 Internet Activities Board (IAB) was created in 1983On January 1st every machine connected to ARPANET had to use TCPIP TCPIP became the core Internet protocol and replaced NCP entirely

The University of Wisconsin created Domain Name System (DNS) This allowed packets to be directed to a domain name which would be translated by the server database into the

corresponding IP number This made it much easier for people to access other servers because they no longer had to remember numbersBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 562

1984 The ARPANET was divided into two networks MILNET and ARPANET MILNET was to serve the needs of the military and ARPANET to support the advanced research component Department of Defense continued to support both networks

Upgrade to CSNET was contracted to MCI New circuits would be T1 lines15 Mbps which is twenty-five times faster than the old 56 Kbps lines IBM would provide advanced routers and Merit would manage the network New network was to be called NSFNET (National Science Foundation Network) and old lines were to remain called CSNETBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 1024

1985 The National Science Foundation began deploying its new T1 lines which would be finished by 1988Backbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 1961

1986 The Internet Engineering Task Force or IETF was created to serve as a forum for technical coordination by contractors for DARPA working on ARPANET US Defense Data Network (DDN) and the Internet core gateway systemBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 2308

1987 BITNET and CSNET merged to form the Corporation for Research and Educational Networking (CREN) another work of the National Science FoundationBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 28174

1988 Soon after the completion of the T1 NSFNET backbone traffic increased so quickly that plans immediately began on upgrading the network againBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 56000

1990 (Updated 82001) Merit IBM and MCI formed a not for profit corporation called ANS Advanced Network amp Services which was to conduct research into high speed networking It soon came up with the concept of the T3 a 45 Mbps line NSF quickly adopted the new network and by the end of 1991 all of its sites were connected by this new backbone

While the T3 lines were being constructed the Department of Defense disbanded the ARPANET and it was replaced by the NSFNET backbone The original 50Kbs lines of ARPANET were taken out of service

Tim Berners-Lee and CERN in Geneva implements a hypertext system to provide efficient information access to the members of the international high-energy physics communityBackbones 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 313000

1991CSNET (which consisted of 56Kbps lines) was discontinued having fulfilled its important early role in the provision of academic networking service A key feature of CREN is that its operational costs are fully met through dues paid by its member organizations

The NSF established a new network named NREN the National Research and Education Network The purpose of this network is to conduct high speed networking research It was not to be used as a commercial network nor was it to be used to send a lot of the data that the Internet now transfersBackbones Partial 45Mbps (T3) NSFNET a few private backbones plus satellite and radio connections - Hosts 617000

1992 Internet Society is chartered

World-Wide Web released by CERNNSFNET backbone upgraded to T3 (44736Mbps)Backbones 45Mbps (T3) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps plus satellite and radio connections - Hosts 1136000

1993 InterNIC created by NSF to provide specific Internet services directory and database services (by ATampT) registration services (by Network Solutions Inc) and information services (by General AtomicsCERFnet)

Marc Andreessen and NCSA and the University of Illinois develops a graphical user interface to the WWW called Mosaic for XBackbones 45Mbps (T3) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps and 45Mpbs lines plus satellite and radio connections - Hosts 2056000

1994 No major changes were made to the physical network The most significant thing that happened was the growth Many new networks were added to the NSF backbone Hundreds of thousands of new hosts were added to the INTERNET during this time period

Pizza Hut offers pizza ordering on its Web page

First Virtual the first cyberbank opens

ATM (Asynchronous Transmission Mode 145Mbps) backbone is installed on NSFNETBackbones 145Mbps (ATM) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps and 45Mpbs lines plus satellite and radio connections - Hosts 3864000

1995 The National Science Foundation announced that as of April 30 1995 it would no longer allow direct access to the NSF backbone The National Science Foundation contracted with four companies that would be providers of access to the NSF backbone (Merit) These companies would then sell connections to groups organizations and companies

$50 annual fee is imposed on domains excluding edu and gov domains which are still funded by the National Science FoundationBackbones 145Mbps (ATM) NSFNET (now private) private interconnected backbones consisting mainly of 56Kbps 1544Mbps 45Mpbs 155Mpbs lines in construction plus satellite and radio connections - Hosts 6642000

1996 Most Internet traffic is carried by backbones of independent ISPs including MCI ATampT Sprint UUnet BBN planet ANS and more

The Internet Society the group that controls the INTERNET researches new TCPIP technology that will be able to have more than the approximately 43 billion addresses currently available The problem that has arisen is that it is not known how both the old and the new addressing systems will be able to work at the same time during a transition period

Internet2 is established

(Backbone data below was valid in 1996 please seek other references for current backbone and host data as it is constantly expanded)Backbones 145Mbps (ATM) NSFNET (now private) private interconnected backbones consisting mainly of 56Kbps 1544Mbps 45Mpbsand 155Mpbs lines plus satellite and radio connections - Hosts over 15000000 and growing rapidly

The Present and The Future

A new technology recommendation called IPv6 is suggested to replace the current IPv4 technology IPv4 allows for fewer than 43 billion directly connected Internet devices problematic because the world population (as of 2009) is well over 65 billion (theoretically if ever human had a computer and mobile phone wed need 13 billion addresses which is something IPv6 can easily accomplish)

In 1999 a wireless technology called 80211b more commonly referred to as Wi-Fi is standardized Over the years that follow this technology begins appearing as a built-in feature of portable computers and many handheld devices

In 2005 the One Laptop Per Child project begins In an attempt to provide low cost education-designed laptops to children around the world for a low cost (US$100 per unit) this project helps spark the netbook industry Netbooks are small portable computers with extended battery life and built-in Wi-Fi connectivity

Multi-touch technology begins to appear in handheld devices tablet computers and netbooks This technology supplements traditional touch-screen technology by allowing advanced gesturing (several fingers moving on a screen instead of just one) Multi-touch technology is seen as a possible alternative to traditional keyboard and mouse (touchpad) systems

Read Bill Buxtons Overview and History of Multi-Touch Systems entitled Multi-Touch Systems that I Have Known and Loved

In December 2009 the first multi-touch website is reported

B2 Overview of InternetThe Internet is a global computer network made up of smaller computer networks

it hasbeen called a Network of NetworksThese smaller networks include1048707 Local Area Networks (like networked offices or computer labs and campus-wide

networks)1048707 Wide Area Networks (like city-wide networks)1048707 State and Regional Networks (including regional service providers and others)1048707 National and International Networks

There is no one inventor of the Internet The Internet was created in the 1960s as a huge network linking big university and government computers The science behind the Internet was invented during the Cold War when the United States was in competition against Russia for weapons and technology So the Internet is actually pretty oldmdasharound forty years Much of Internetrsquos initial development was supported by American governmental research and network development (beginning with the American militarys ARPANET in 1969)In fact email has been around since 1972 In 1989 that Tim Berners-Lee a scientist at the European Laboratory for Particle Physics in Geneva proposed the World Wide Web Now Internet Service Providers (ISPs) offer Internet access to their clients at costs ranging from Rs 150- per 6 months to hundreds of rupees per year depending on the types of service they offer

II What people do when surfing People usually get to surfing to internet to do things that are complicated

for them They do a short time for them while surfing depends from the user surfing is the very easiest thing to search for what you want to know

Surfing is one where you can get information access to an educational learning where you can also communicate for an entertainment or an Personal Information

Surfing is one of the easiest way of sharing files and document or any personal data

I1 Surfing is build for a network and made up of organization

i Communication ii Education

iii Business managements Commercial Company iv Government v Private Organization

vi Entertainment

I2 What are the uses of the Internet

There are three fundamental uses of the Internet Communication Information Retrieval Presentation of Information

Communication The Internet is used both for one-to-one communications (email and real-time chat

programs) and one-to-many

Information Retrieval The Internet allows access to public domain information bibliographic databases

libraries and entertainment services as well as to proprietary information services

Presentation of Information Any organization connected to the Internet can provide access to its own in-house

information (library catalogs faculty information etc) to millions of people world-wide Individuals can also develop and provide their own information packages via their own

home pages

II Terms and Web PoliciesObjectives

To know the resources of internet Navigate around the web using Internet Explorer To know what internet services we have To know what is the risk when your online Define the World Wide Web Explain the work of the Domain Name Service Explain the difference between IP address and domain name How to protect and stay safe online

A Internet Addresses

Every computer file of information and person on the Internet is identified by a unique address

A1 Computer AddressesComputer addresses are made up of three parts (or in some cases two parts) separated

by dots like this computer-nameinstitutiondomain

The computer name is a name given locally to identify a particular computer it is in some cases omitted from the address The institution name is the name (or an abbreviation) of the name of the school company or other institution housing the computer The domain name specifies either the type or the geographic location of the computer

A2 Domain NamesThere are several possible domain names including some that identify the type of institution and some that identify a geographical location They include

edu Educational institutioncom Commercial and profitable organizationsorg Non-profitable organizations

net Internet infrastructure and service providersgov Governmental agencydepartmentmil American military agencyint International organizationsus United Statesin Indiamy Malaysiaca Canadajp Japanbiz Businessaero Aeronautics

A3 Personal Addresses

A persons address (or their email address) places the users username (or login) and the symbol before the computer address For example a user whose username is creator who is accessing email from the yahoo server of United State Yahoo Website would have the following address creatoryahoocom

B Internet Services

B1 Internet Services

rdquoInternet servicesrdquo serve more sophisticated and multi-purpose purposes and increasingly make the Internet a truly useful information resource

B11 EmailIt is the Internets version of the postal service Using the Internet it provides the ability to send a message reply to a message send a file created in another program andor even send the same message to a group of people Some benefits of Email arebull Speed A message can be sent from Chennai to Australia in a matter of secondsbull Cost Emails are cheap You are usually only charged for the telephone call time (local call rate) for sending the message into the Internet and not the cost associated with transferring the message across the Internetbull Flexibility It is easy to send duplicates of your messages to other people or groups for the cost of a single messagebull Record keeping Messages sent and received can be easily stored for future referenceIn order to use Email you will need Internet access arranged through an InternetService Provider (ISP) who will allocate you one or a number of Email accounts To be able to retrieve and send mail from these addresses a user will need what is known as Email client software and your ISP usually provides this although nowadays most computers come with it pre-installed

B12 Mail Lists

These use email to support discussion groups on a wide range of specific subjectsOnce you are becoming a subscriber of a mailing list you will receive lot of emails related to the subject covered by the mailing list

B13 FTPFTP was the original Internet mechanism for the storage and retrieval of information There are still many FTP Sites around the Internet although many of them have been melded into the World Wide Web In computer science FTP stands for File Transfer Protocol which is a way of transferring files between computers A file can be anything -- a spreadsheet a word document a song or a picture When someone says Please FTP me that file for instance that means Please transfer that file from your computer to mine To FTP you usually need to download a special program or application You also usually need a password to be able to access or send information to someone elses computer

B14 GopherGopher was developed at the University of Minnesota primarily to support its own Campus Wide Information Server (CWIS) It provides access to information available either locally or elsewhere on the Internet by means of a simple series of uniformly designed menus

B15 Instant Messaging (IM)There are lots of other fun and useful IM features you can explore like group chats file transfers voice calls video conferencing and emoticons that reflect your mood

B16 IRCIRC stands for Internet Relay Chat It has been used in many countries around the world IRC is a multi-user chat system where people meet on channels (rooms virtual places usually with a certain topic of conversation) to talk in groups or privately There is no restriction to the number of people that can participate in a given discussion or the number of channels that can be formed on IRC

B17 NewsgroupsThe Internet has a place where we can gather question and discuss our experiences within a wide variety of topics Its called Usenet News Some users also call it Net NewsThink of Usenet News as a giant worldwide bulletin board Anyone can freely post something on this bulletin board Everyone else can read the posted items and add their own items These voluntary contributions and free exchange of information are the foundation of the Internet

B18 Voice over IPVoice over IP (Voice over Internet Protocol or VoIP) technology converts voice calls from analog to digital to be sent over digital data networks In Voice over IP or VoIP voice data and video all travel along the network

B19 World Wide Web (WWW)The newest information application on the Internet the WWW provides standardized access to Gopher FTP Telnet and more by means of home pages designed either by institutions or

b individuals By means of the HyperText Markup Language (HTML) it allows users to point at highlighted terms following links to whatever information interests them It is a multimedia environment allowing Internet users access to audio and video materials There are a number of client software packages (or browsers) including Lynx (a textonly browser) Netscape and Microsofts Internet Explorer (which are multimedia browsers)

C Types of Internet Connection

C1 Types of Internet connections

The options for providing user connectivity to the Internet are given below

1 Terminal DialupModem (Shell connection)1048707 Most common option1048707 User requirements limited to modem and communications software1048707 Text-only access1048707 Shell accounts were more popular before the advent of the Web A shell account lets

you use your computer much as if it were a virtual console associated with a remote computer You can type commands which are interpreted by the remote computer and view the resulting output on your computer Although a few web browsers such as Lynx can operate via a shell account they donrsquot generally support the highly graphical multimedia pages which web surfers have come to expect

2 SLIP (Serial Line Internet Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software SLIP software amp software for Internet

applications1048707 Multimedia access

3 PPP (Point-to-Point Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software PPP software amp software for Internet

applications1048707 Multimedia access1048707 While your computer is connected to the Internet you can use it to surf the Web with

your favorite browser If your ISP allows you can even run a web server providing pages that can be viewed by others around the world

4 ISDN (Integrated Services Digital Network)1048707 Most often used to connect remote telecommuters to office LANs1048707 Requires ISDN phone line access1048707 Faster than analog terminal dialupmodem service

1048707 User must have ISDN phone line ISDN card communications software TCP software amp SLIP or PPP software multimedia connectivity

5 DIAS1048707 The DIAS offers a wire-line solution for high speed symmetrical Internet access on the

existing telephone lines It provides an always on internet access that is permanently available at customers premises DIAS combines voice and internet data packets on a single twisted pair wire at subscriber premises that means you can use telephone and surf internet at the same time

6 Cable Modem1048707 The term ldquoCable Modemrdquo is quite new and refers to a modem that operates over the

ordinary cable TV network cables Basically you just connect the Cable Modem to the TV outlet for your cable TV and the cable TV operator connects a Cable Modem Termination System (CMTS) in his end (the Head-End)

1048707 Actually the term ldquoCable Modemrdquo is a bit misleading as a Cable Modem works more like a Local Area Network (LAN) interface than as a modem

1048707 In a cable TV system signals from the various channels are each given a 6-MHz slice of the cablersquos available bandwidth and then sent down the cable to your house When a cable company offers Internet access over the cable Internet information can use the same cables because the cable modem system puts downstream data ndash data sent from the Internet to an individual computer ndash into a 6-MHz channel On the cable the data looks just like a TV channel So Internet downstream data takes up the same amount of cable space as any single channel of programming Upstream data ndash information sent from an individual back to the Internet ndash requires even less of the cablersquos bandwidth just 2 MHz since the assumption is that most people download far more information than they upload

1048707 Putting both upstream and downstream data on the cable television system requires two types of equipment a cable modem on the customer end and a cable modem termination system (CMTS) at the cable providerrsquos end Between these two types of equipment all the computer networking security and management of Internet access over cable television is put into place

7 Digital Subscriber Line (DSL) connection1048707 DSL is a very high-speed connection that uses the same wires as a regular telephone

line1048707 Here are some advantages of DSL

1 You can leave your Internet connection open and still use the phone line for voice calls

2 The speed is much higher than a regular modem3 DSL doesnrsquot necessarily require new wiring it can use the phone line you

already have4 The company that offers DSL (eg BSNL) will usually provide the modem as

part of the installation1048707 But there are disadvantages

1 A DSL connection works better when you are closer to the providerrsquos central office

2 The service is not available everywhere1048707 Other types of DSL include

1 Asymmetric DSL (ADSL) line ndash The connection is faster for receiving data than it is for sending data over the Internet

2 Very high bit-rate DSL (VDSL) ndash This is a fast connection but works only over a short distance

3 Symmetric DSL (SDSL) ndash This connection used mainly by small businesses doesnrsquot allow you to use the phone at the same time but the speed of receiving and sending data is the same

4 Rate-adaptive DSL (RADSL) ndash This is a variation of ADSL but the modem can adjust the speed of the connection depending on the length and quality of the line

8 Direct Connection (Leased circuit)1048707 Most often used to connect sites within a specific organization such as a university or

business requires owning or leasing of cable (from 64 kbps to T-3) users typically connected via Ethernet LANs multimedia connectivity at its fastest

9 Satellite connections1048707 This connection allows you to download Internet files via a satellite connection This is

an efficient method for receiving large Web graphics and other items but you still need a modem connection for other features You must purchase the connection hardware as well as subscribe to the service

10 Wireless connections1048707 Pagers cellular phones and personal digital assistants (PDAs) now allow varying levels

of Internet access from notification of E-mail to limited Web connections Many of these services remain in the experimental stage The PPP connection is called as TCPIP connection or PSTN dial-up connection ISDN connection is called as ISDN dial-up connection Cable Modem DSL and Direct Connection are always-on connection The words ldquoconnectionrdquo and ldquoaccountrdquo related to Internet are interchangeable

D Computer Virus

The Internet just like the rest of the world is not a perfectly safe place to visit If you download files from the Internet there is a chance a very small chance but nonetheless a chance that your computer could become infected with a virus

Viruses are malicious programs that invade your computer They can cause many different kinds of damage such as deleting data files erasing programs or destroying

everything they find on your hard disk Not every virus causes damage some simply flash annoying messages

Different Types of Computer VirusesThere are Different Types of Computer Viruses could be classified in

(origin techniques types of files they infect where they hide the kind of damage they cause the type of operating system or platform they attack) etc Let us have a look at themhellip

Computer Virus is a kind of malicious software written intentionally to enter a computer without the userrsquos permission or knowledge with an ability to replicate itself thus continuing to spread Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system A virus should never be assumed harmless and left on a system Most common types of viruses are mentioned below

Resident VirusesThis type of virus is a permanent which dwells in the RAM memory From

there it can overcome and interrupt all of the operations executed by the system corrupting files and programs that are opened closed copied renamed etc

Examples include Randex CMJ Meve and MrKlunky

Direct Action VirusesThe main purpose of this virus is to replicate and take action when it is

executed When a specific condition is met the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXECBAT file PATH This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted

Overwrite VirusesVirus of this kind is characterized by the fact that it deletes the information

contained in the files that it infects rendering them partially or totally useless once they have been infected

The only way to clean a file infected by an overwrite virus is to delete the file completely thus losing the original content

Examples of this virus include Way TrjReboot Trivial88D

Boot Virus

This type of virus affects the boot sector of a floppy or hard disk This is a crucial part of a disk in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive

Examples of boot viruses include PolybootB AntiEXE

Macro VirusMacro viruses infect files that are created using certain applications or

programs that contain macros These mini-programs make it possible to automate series of operations so that they are performed as a single action thereby saving the user from having to carry them out one by one

Examples of macro viruses Relax MelissaA Bablas O97MY2K

Directory VirusDirectory viruses change the paths that indicate the location of a file By

executing a program (file with the extension EXE or COM) which has been infected by a virus you are unknowingly running the virus program while the original file and program have been previously moved by the virus

Once infected it becomes impossible to locate the original files

Polymorphic VirusPolymorphic viruses encrypt or encode themselves in a different way

(using different algorithms and encryption keys) every time they infect a system

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves

Examples include Elkern Marburg Satan Bug and Tuareg

File InfectorsThis type of virus infects programs or executable files (files with an EXE

or COM extension) When one of these programs is run directly or indirectly the virus is activated producing the damaging effects it is programmed to carry out The majority of existing viruses belong to this category and can be classified depending on the actions that they carry out

Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types They are known as companion viruses because once they get into the system they accompany the other files that already exist In other words in order to carry out their infection routines companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses)

Some examples include Stator Asimov1539 and Terrax1069

FAT VirusThe file allocation table or FAT is the part of a disk used to connect

information and is a vital part of the normal functioning of the computerThis type of virus attack can be especially dangerous by preventing access to certain sections of the disk where important files are stored Damage caused can result in information losses from individual files or even entire directories

WormsA worm is a program very similar to a virus it has the ability to self-

replicate and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses

Examples of worms include PSWBugbearB LovgateF TrileC SobigD Mapson

Trojans or Trojan HorsesAnother unsavory breed of malicious code are Trojans or Trojan horses

which unlike viruses do not reproduce by infecting other files nor do they self-replicate like worms

Logic BombsThey are not considered viruses because they do not replicate They are not

even programs in their own right but rather camouflaged segments of other programs

Their objective is to destroy data on the computer once certain conditions have been met Logic bombs go undetected until launched and the results can be destructive

E How Do You Stay Safe On The Internet

The first part of the answer to the question How do you stay safe on the Internet is know what the threats are that you and your computer are up against

Without this knowledge how are you going to know youve got everything covered off Do you just rely on what the security software vendors tell you to spend your money on

By being aware of what the risks are I suggest you will save yourself money and have more effective protection when it comes to the second part of the answer to the question How do you stay safe on the Internet selecting effective prevention and protection to guard privacy and online security

To help you decide what is necessary for your particular protection in The Three Levels Of Internet Risk Protection I talk about the safe practices that help protect your computer and the types of software to use -- from those that are absolutely essential for security to others which you may want to install to guard privacy to the level you desire

But back to this article How Do You Stay Safe On The Internet here Ill provide you with an introduction to each type of threat At the end of it youll have a good feel for the dangers on the Internet and how those threats can affect you your PC and your information be it personal financial family or business

There are ten of the most prevalent threats covered here Either go through them all or click on the links below for those you are particularly interested in

1 Viruses and Worms 2 Trojan Horses 3 Rootkits 4 Crackers and Hackers 5 Spam 6 Web Bugs 7 Child Security 8 Pop-UpUnder Ads 9 Tracking Cookies 10 Spyware

By the way Ive tried to keep the technical language simple but if you dont understand some of the terms check them out at Netlingo which provides definitions and explanations for all Net terminology

1 Viruses And Worms

What Is A VirusA virus is a man-made computer program that infects a file or program on our computers Each time the infected program is run the virus is also triggered It spreads itself by infecting other programs on the same computer

What Is A WormA worm is also a man-made program that replicates itself However unlike a virus it does not infect other program files on the computer Instead a worm spreads itself automatically to other computers through email over a network and via Internet Relay Chat (IRC)

How Do We Get InfectedViruses and worms can infect desktop computers laptops and network servers and reach our PCs from email web sites downloaded files and loadable media (eg floppy disks CD-ROMs and DVDs)

How Does A Virus Or Worm Infection Affect UsUnfortunately the effects of an infection are pretty unpleasant The virus or worm can

Disable the computer

Add modify or delete files or reformat the hard disk

Steal addresses held in our computer to send on virus-infected emails to our friends colleagues clients or customers

Send unsolicited bulk email (spam) to those in our mail address books and other users

2 Trojan Horses

What Is A Trojan HorseAlthough Trojan horse programs are categorized as viruses they are not true viruses since they do not replicate But like viruses they are one of the most destructive of the Internet risks covered in How Do You Stay Safe On The Internet and are favored by crackers and spyware writers

How Do We Get InfectedTrojans are one of the sneakiest of the online risks They are often downloaded on the back of a free program (freeware) that has some value to the user -- a free game software program or music for instance

How Does A Trojan Infection Affect Us

A Trojan installed on a computer allows that PC to be entered via a backdoor by any remote user that has the access code to the Trojan

The remote attacker can enter the computer undetected when the user is online to access or destroy any information stored Alternatively the Trojan can be programmed to automatically send any information on our PCs back to the attacker This could include

Client or customer information or other business data

Credit card details

Passwords for access to your online bank ISP or web services

Information you would rather remain hidden

Email addresses which may be used for spamming

Childrens names photographs ages or other personal details held on the computer

Distributed Denial of Service (DDOS) attack on other computers via the victims computer

No wonder we ask how do you stay safe on the Internet

3 How Do You Stay Safe On The InternetRootkitsWhat Is A RootkitRootkits are not destructive in their own right but they are designed to conceal the presence of malicious programs on a computer

How Do We Get InfectedAs with any malware such as viruses worms Trojans and spyware rootkits get onto our computers by various means such as through spam attachments being opened on the back of free downloads or planted by crackers who have breached computer defenses

How Does A Rootkit Affect UsRootkits are there for one reason only to ensure that an intruder can access our system and take control without detection by defenses to guard privacy and security

One of the most common and worrying uses of rootkits which causes us to ask How Do You Stay Safe On The Internet is to launch spam and denial of service (DOS) attacks against other computers or networks Another use of

rootkits is to hide Trojans so an intruder can easily use it to extract data from your computer as mentioned above

4 Crackers And Hackers

What Is A HackerCrackerThe term hacker is a misused term We should really be referring to a cracker to describe those who break security on a computer system

The original term hacker refers to computer enthusiasts who enjoy learning everything about a computer system

How Do We Get AttackedCrackers run programs that scan computer ports over the Internet to work out which ports are accessible If our computer shows up in one of these scans the cracker may decide to enter our PC

Crackers favorite targets are the home and home office computers connected by broadband to the Internet because the connection is always open there is more opportunity to locate these computers with their scanners

Alternatively crackers may just exploit weaknesses that have not been patched in the computers operating system in order to gain entry As discussed above Trojans are another way crackers use to gain access to our PCs

How Does A Cracker Affect UsBesides the potentially valuable information they can obtain from our PCs such as that listed under Trojans these intruders also want our hard disk space and Internet connection With these resources they can use our computers to send out spam or attack other computers on the Internet and all this can be done without our knowledge Another reason why we should know how do you stay safe on the Internet

5 Spam -- Unsolicited Email

What Is SpamSpam is defined in Dictionarycom as Unsolicited e-mail often of a commercial nature sent indiscriminately to multiple mailing lists individuals or newsgroups junk e-mail

Spammers peddle pornography sexual aids diet pills and get-rich-quick schemes in fact anything that has a perceived value

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

Generate new historical material through the collection of commentaries that include participants stories observations perspectives and memories

B1 History Preview

1957 (Potential Origin and Beginning -- The History of the Internet)The USSR launches Sputnik the first artificial earth satellite In response the United States forms the Advanced Research Projects Agency (ARPA) within the Department of Defense (DoD) to establish US lead in science and technology applicable to the militaryBackbones None - Hosts None

1962 RAND Paul Baran of the RAND Corporation (a government agency) was commissioned by the US Air Force to do a study on how it could maintain its command and control over its missiles and bombers after a nuclear attack This was to be a military research network that could survive a nuclear strike decentralized so that if any locations (cities) in the US were attacked the military could still have control of nuclear arms for a counter-attack

Barans finished document described several ways to accomplish this His final proposal was a packet switched network

Packet switching is the breaking down of data into datagrams or packets that are labeled to indicate the origin and the destination of the information and the forwarding of these packets from one computer to another computer until the information arrives at its final destination computer This was crucial to the realization of a computer network If packets are lost at any given point the message can be resent by the originatorBackbones None - Hosts None

1968 ARPA awarded the ARPANET contract to BBN BBN had selected a Honeywell minicomputer as the base on which they would build the switch The physical network was constructed in 1969 linking four nodes University of California at Los Angeles SRI (in Stanford) University of California at Santa Barbara and University of Utah The network was wired together via 50 Kbps circuitsBackbones 50Kbps ARPANET - Hosts 4

1972 The first e-mail program was created by Ray Tomlinson of BBNThe Advanced Research Projects Agency (ARPA) was renamed The Defense Advanced Research Projects Agency (or DARPA)

ARPANET was currently using the Network Control Protocol or NCP to transfer data This allowed communications between hosts running on the same networkBackbones 50Kbps ARPANET - Hosts 23

1973 Development began on the protocol later to be called TCPIP

It was developed by a group headed by Vinton Cerf from Stanford and Bob Kahn from DARPA This new protocol was to allow diverse computer networks to interconnect and communicate with each otherBackbones 50Kbps ARPANET - Hosts 23+

1974 First Use of term Internet by Vint Cerf and Bob Kahn in paper on Transmission Control ProtocolBackbones 50Kbps ARPANET - Hosts 23+

1976 Dr Robert M Metcalfe develops Ethernet which allowed coaxial cable to move data extremely fast This was a crucial component to the development of LANsThe packet satellite project went into practical use SATNET Atlantic packet Satellite network was born This network linked the United States with Europe Surprisingly it used INTELSAT satellites that were owned by a consortium of countries and not exclusively the United States government

UUCP (Unix-to-Unix CoPy) developed at ATampT Bell Labs and distributed with UNIX one year later

The Department of Defense began to experiment with the TCPIP protocol and soon decided to require it for use on ARPANETBackbones 50Kbps ARPANET plus satellite and radio connections - Hosts 111+

1979 USENET (the decentralized news group network) was created by Steve Bellovin a graduate student at University of North Carolina and programmers Tom Truscott and Jim Ellis It was based on UUCP

The Creation of BITNET by IBM Because its Time Network introduced the store and forward network It was used for email and listservsBackbones 50Kbps ARPANET plus satellite and radio connections - Hosts 111+

1981 National Science Foundation Created backbone called CSNET 56 Kbps network for institutions without access to ARPANET Vinton Cerf proposed a plan for an inter-network connection between CSNET and the ARPANETBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 213

1983 Internet Activities Board (IAB) was created in 1983On January 1st every machine connected to ARPANET had to use TCPIP TCPIP became the core Internet protocol and replaced NCP entirely

The University of Wisconsin created Domain Name System (DNS) This allowed packets to be directed to a domain name which would be translated by the server database into the

corresponding IP number This made it much easier for people to access other servers because they no longer had to remember numbersBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 562

1984 The ARPANET was divided into two networks MILNET and ARPANET MILNET was to serve the needs of the military and ARPANET to support the advanced research component Department of Defense continued to support both networks

Upgrade to CSNET was contracted to MCI New circuits would be T1 lines15 Mbps which is twenty-five times faster than the old 56 Kbps lines IBM would provide advanced routers and Merit would manage the network New network was to be called NSFNET (National Science Foundation Network) and old lines were to remain called CSNETBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 1024

1985 The National Science Foundation began deploying its new T1 lines which would be finished by 1988Backbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 1961

1986 The Internet Engineering Task Force or IETF was created to serve as a forum for technical coordination by contractors for DARPA working on ARPANET US Defense Data Network (DDN) and the Internet core gateway systemBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 2308

1987 BITNET and CSNET merged to form the Corporation for Research and Educational Networking (CREN) another work of the National Science FoundationBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 28174

1988 Soon after the completion of the T1 NSFNET backbone traffic increased so quickly that plans immediately began on upgrading the network againBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 56000

1990 (Updated 82001) Merit IBM and MCI formed a not for profit corporation called ANS Advanced Network amp Services which was to conduct research into high speed networking It soon came up with the concept of the T3 a 45 Mbps line NSF quickly adopted the new network and by the end of 1991 all of its sites were connected by this new backbone

While the T3 lines were being constructed the Department of Defense disbanded the ARPANET and it was replaced by the NSFNET backbone The original 50Kbs lines of ARPANET were taken out of service

Tim Berners-Lee and CERN in Geneva implements a hypertext system to provide efficient information access to the members of the international high-energy physics communityBackbones 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 313000

1991CSNET (which consisted of 56Kbps lines) was discontinued having fulfilled its important early role in the provision of academic networking service A key feature of CREN is that its operational costs are fully met through dues paid by its member organizations

The NSF established a new network named NREN the National Research and Education Network The purpose of this network is to conduct high speed networking research It was not to be used as a commercial network nor was it to be used to send a lot of the data that the Internet now transfersBackbones Partial 45Mbps (T3) NSFNET a few private backbones plus satellite and radio connections - Hosts 617000

1992 Internet Society is chartered

World-Wide Web released by CERNNSFNET backbone upgraded to T3 (44736Mbps)Backbones 45Mbps (T3) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps plus satellite and radio connections - Hosts 1136000

1993 InterNIC created by NSF to provide specific Internet services directory and database services (by ATampT) registration services (by Network Solutions Inc) and information services (by General AtomicsCERFnet)

Marc Andreessen and NCSA and the University of Illinois develops a graphical user interface to the WWW called Mosaic for XBackbones 45Mbps (T3) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps and 45Mpbs lines plus satellite and radio connections - Hosts 2056000

1994 No major changes were made to the physical network The most significant thing that happened was the growth Many new networks were added to the NSF backbone Hundreds of thousands of new hosts were added to the INTERNET during this time period

Pizza Hut offers pizza ordering on its Web page

First Virtual the first cyberbank opens

ATM (Asynchronous Transmission Mode 145Mbps) backbone is installed on NSFNETBackbones 145Mbps (ATM) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps and 45Mpbs lines plus satellite and radio connections - Hosts 3864000

1995 The National Science Foundation announced that as of April 30 1995 it would no longer allow direct access to the NSF backbone The National Science Foundation contracted with four companies that would be providers of access to the NSF backbone (Merit) These companies would then sell connections to groups organizations and companies

$50 annual fee is imposed on domains excluding edu and gov domains which are still funded by the National Science FoundationBackbones 145Mbps (ATM) NSFNET (now private) private interconnected backbones consisting mainly of 56Kbps 1544Mbps 45Mpbs 155Mpbs lines in construction plus satellite and radio connections - Hosts 6642000

1996 Most Internet traffic is carried by backbones of independent ISPs including MCI ATampT Sprint UUnet BBN planet ANS and more

The Internet Society the group that controls the INTERNET researches new TCPIP technology that will be able to have more than the approximately 43 billion addresses currently available The problem that has arisen is that it is not known how both the old and the new addressing systems will be able to work at the same time during a transition period

Internet2 is established

(Backbone data below was valid in 1996 please seek other references for current backbone and host data as it is constantly expanded)Backbones 145Mbps (ATM) NSFNET (now private) private interconnected backbones consisting mainly of 56Kbps 1544Mbps 45Mpbsand 155Mpbs lines plus satellite and radio connections - Hosts over 15000000 and growing rapidly

The Present and The Future

A new technology recommendation called IPv6 is suggested to replace the current IPv4 technology IPv4 allows for fewer than 43 billion directly connected Internet devices problematic because the world population (as of 2009) is well over 65 billion (theoretically if ever human had a computer and mobile phone wed need 13 billion addresses which is something IPv6 can easily accomplish)

In 1999 a wireless technology called 80211b more commonly referred to as Wi-Fi is standardized Over the years that follow this technology begins appearing as a built-in feature of portable computers and many handheld devices

In 2005 the One Laptop Per Child project begins In an attempt to provide low cost education-designed laptops to children around the world for a low cost (US$100 per unit) this project helps spark the netbook industry Netbooks are small portable computers with extended battery life and built-in Wi-Fi connectivity

Multi-touch technology begins to appear in handheld devices tablet computers and netbooks This technology supplements traditional touch-screen technology by allowing advanced gesturing (several fingers moving on a screen instead of just one) Multi-touch technology is seen as a possible alternative to traditional keyboard and mouse (touchpad) systems

Read Bill Buxtons Overview and History of Multi-Touch Systems entitled Multi-Touch Systems that I Have Known and Loved

In December 2009 the first multi-touch website is reported

B2 Overview of InternetThe Internet is a global computer network made up of smaller computer networks

it hasbeen called a Network of NetworksThese smaller networks include1048707 Local Area Networks (like networked offices or computer labs and campus-wide

networks)1048707 Wide Area Networks (like city-wide networks)1048707 State and Regional Networks (including regional service providers and others)1048707 National and International Networks

There is no one inventor of the Internet The Internet was created in the 1960s as a huge network linking big university and government computers The science behind the Internet was invented during the Cold War when the United States was in competition against Russia for weapons and technology So the Internet is actually pretty oldmdasharound forty years Much of Internetrsquos initial development was supported by American governmental research and network development (beginning with the American militarys ARPANET in 1969)In fact email has been around since 1972 In 1989 that Tim Berners-Lee a scientist at the European Laboratory for Particle Physics in Geneva proposed the World Wide Web Now Internet Service Providers (ISPs) offer Internet access to their clients at costs ranging from Rs 150- per 6 months to hundreds of rupees per year depending on the types of service they offer

II What people do when surfing People usually get to surfing to internet to do things that are complicated

for them They do a short time for them while surfing depends from the user surfing is the very easiest thing to search for what you want to know

Surfing is one where you can get information access to an educational learning where you can also communicate for an entertainment or an Personal Information

Surfing is one of the easiest way of sharing files and document or any personal data

I1 Surfing is build for a network and made up of organization

i Communication ii Education

iii Business managements Commercial Company iv Government v Private Organization

vi Entertainment

I2 What are the uses of the Internet

There are three fundamental uses of the Internet Communication Information Retrieval Presentation of Information

Communication The Internet is used both for one-to-one communications (email and real-time chat

programs) and one-to-many

Information Retrieval The Internet allows access to public domain information bibliographic databases

libraries and entertainment services as well as to proprietary information services

Presentation of Information Any organization connected to the Internet can provide access to its own in-house

information (library catalogs faculty information etc) to millions of people world-wide Individuals can also develop and provide their own information packages via their own

home pages

II Terms and Web PoliciesObjectives

To know the resources of internet Navigate around the web using Internet Explorer To know what internet services we have To know what is the risk when your online Define the World Wide Web Explain the work of the Domain Name Service Explain the difference between IP address and domain name How to protect and stay safe online

A Internet Addresses

Every computer file of information and person on the Internet is identified by a unique address

A1 Computer AddressesComputer addresses are made up of three parts (or in some cases two parts) separated

by dots like this computer-nameinstitutiondomain

The computer name is a name given locally to identify a particular computer it is in some cases omitted from the address The institution name is the name (or an abbreviation) of the name of the school company or other institution housing the computer The domain name specifies either the type or the geographic location of the computer

A2 Domain NamesThere are several possible domain names including some that identify the type of institution and some that identify a geographical location They include

edu Educational institutioncom Commercial and profitable organizationsorg Non-profitable organizations

net Internet infrastructure and service providersgov Governmental agencydepartmentmil American military agencyint International organizationsus United Statesin Indiamy Malaysiaca Canadajp Japanbiz Businessaero Aeronautics

A3 Personal Addresses

A persons address (or their email address) places the users username (or login) and the symbol before the computer address For example a user whose username is creator who is accessing email from the yahoo server of United State Yahoo Website would have the following address creatoryahoocom

B Internet Services

B1 Internet Services

rdquoInternet servicesrdquo serve more sophisticated and multi-purpose purposes and increasingly make the Internet a truly useful information resource

B11 EmailIt is the Internets version of the postal service Using the Internet it provides the ability to send a message reply to a message send a file created in another program andor even send the same message to a group of people Some benefits of Email arebull Speed A message can be sent from Chennai to Australia in a matter of secondsbull Cost Emails are cheap You are usually only charged for the telephone call time (local call rate) for sending the message into the Internet and not the cost associated with transferring the message across the Internetbull Flexibility It is easy to send duplicates of your messages to other people or groups for the cost of a single messagebull Record keeping Messages sent and received can be easily stored for future referenceIn order to use Email you will need Internet access arranged through an InternetService Provider (ISP) who will allocate you one or a number of Email accounts To be able to retrieve and send mail from these addresses a user will need what is known as Email client software and your ISP usually provides this although nowadays most computers come with it pre-installed

B12 Mail Lists

These use email to support discussion groups on a wide range of specific subjectsOnce you are becoming a subscriber of a mailing list you will receive lot of emails related to the subject covered by the mailing list

B13 FTPFTP was the original Internet mechanism for the storage and retrieval of information There are still many FTP Sites around the Internet although many of them have been melded into the World Wide Web In computer science FTP stands for File Transfer Protocol which is a way of transferring files between computers A file can be anything -- a spreadsheet a word document a song or a picture When someone says Please FTP me that file for instance that means Please transfer that file from your computer to mine To FTP you usually need to download a special program or application You also usually need a password to be able to access or send information to someone elses computer

B14 GopherGopher was developed at the University of Minnesota primarily to support its own Campus Wide Information Server (CWIS) It provides access to information available either locally or elsewhere on the Internet by means of a simple series of uniformly designed menus

B15 Instant Messaging (IM)There are lots of other fun and useful IM features you can explore like group chats file transfers voice calls video conferencing and emoticons that reflect your mood

B16 IRCIRC stands for Internet Relay Chat It has been used in many countries around the world IRC is a multi-user chat system where people meet on channels (rooms virtual places usually with a certain topic of conversation) to talk in groups or privately There is no restriction to the number of people that can participate in a given discussion or the number of channels that can be formed on IRC

B17 NewsgroupsThe Internet has a place where we can gather question and discuss our experiences within a wide variety of topics Its called Usenet News Some users also call it Net NewsThink of Usenet News as a giant worldwide bulletin board Anyone can freely post something on this bulletin board Everyone else can read the posted items and add their own items These voluntary contributions and free exchange of information are the foundation of the Internet

B18 Voice over IPVoice over IP (Voice over Internet Protocol or VoIP) technology converts voice calls from analog to digital to be sent over digital data networks In Voice over IP or VoIP voice data and video all travel along the network

B19 World Wide Web (WWW)The newest information application on the Internet the WWW provides standardized access to Gopher FTP Telnet and more by means of home pages designed either by institutions or

b individuals By means of the HyperText Markup Language (HTML) it allows users to point at highlighted terms following links to whatever information interests them It is a multimedia environment allowing Internet users access to audio and video materials There are a number of client software packages (or browsers) including Lynx (a textonly browser) Netscape and Microsofts Internet Explorer (which are multimedia browsers)

C Types of Internet Connection

C1 Types of Internet connections

The options for providing user connectivity to the Internet are given below

1 Terminal DialupModem (Shell connection)1048707 Most common option1048707 User requirements limited to modem and communications software1048707 Text-only access1048707 Shell accounts were more popular before the advent of the Web A shell account lets

you use your computer much as if it were a virtual console associated with a remote computer You can type commands which are interpreted by the remote computer and view the resulting output on your computer Although a few web browsers such as Lynx can operate via a shell account they donrsquot generally support the highly graphical multimedia pages which web surfers have come to expect

2 SLIP (Serial Line Internet Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software SLIP software amp software for Internet

applications1048707 Multimedia access

3 PPP (Point-to-Point Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software PPP software amp software for Internet

applications1048707 Multimedia access1048707 While your computer is connected to the Internet you can use it to surf the Web with

your favorite browser If your ISP allows you can even run a web server providing pages that can be viewed by others around the world

4 ISDN (Integrated Services Digital Network)1048707 Most often used to connect remote telecommuters to office LANs1048707 Requires ISDN phone line access1048707 Faster than analog terminal dialupmodem service

1048707 User must have ISDN phone line ISDN card communications software TCP software amp SLIP or PPP software multimedia connectivity

5 DIAS1048707 The DIAS offers a wire-line solution for high speed symmetrical Internet access on the

existing telephone lines It provides an always on internet access that is permanently available at customers premises DIAS combines voice and internet data packets on a single twisted pair wire at subscriber premises that means you can use telephone and surf internet at the same time

6 Cable Modem1048707 The term ldquoCable Modemrdquo is quite new and refers to a modem that operates over the

ordinary cable TV network cables Basically you just connect the Cable Modem to the TV outlet for your cable TV and the cable TV operator connects a Cable Modem Termination System (CMTS) in his end (the Head-End)

1048707 Actually the term ldquoCable Modemrdquo is a bit misleading as a Cable Modem works more like a Local Area Network (LAN) interface than as a modem

1048707 In a cable TV system signals from the various channels are each given a 6-MHz slice of the cablersquos available bandwidth and then sent down the cable to your house When a cable company offers Internet access over the cable Internet information can use the same cables because the cable modem system puts downstream data ndash data sent from the Internet to an individual computer ndash into a 6-MHz channel On the cable the data looks just like a TV channel So Internet downstream data takes up the same amount of cable space as any single channel of programming Upstream data ndash information sent from an individual back to the Internet ndash requires even less of the cablersquos bandwidth just 2 MHz since the assumption is that most people download far more information than they upload

1048707 Putting both upstream and downstream data on the cable television system requires two types of equipment a cable modem on the customer end and a cable modem termination system (CMTS) at the cable providerrsquos end Between these two types of equipment all the computer networking security and management of Internet access over cable television is put into place

7 Digital Subscriber Line (DSL) connection1048707 DSL is a very high-speed connection that uses the same wires as a regular telephone

line1048707 Here are some advantages of DSL

1 You can leave your Internet connection open and still use the phone line for voice calls

2 The speed is much higher than a regular modem3 DSL doesnrsquot necessarily require new wiring it can use the phone line you

already have4 The company that offers DSL (eg BSNL) will usually provide the modem as

part of the installation1048707 But there are disadvantages

1 A DSL connection works better when you are closer to the providerrsquos central office

2 The service is not available everywhere1048707 Other types of DSL include

1 Asymmetric DSL (ADSL) line ndash The connection is faster for receiving data than it is for sending data over the Internet

2 Very high bit-rate DSL (VDSL) ndash This is a fast connection but works only over a short distance

3 Symmetric DSL (SDSL) ndash This connection used mainly by small businesses doesnrsquot allow you to use the phone at the same time but the speed of receiving and sending data is the same

4 Rate-adaptive DSL (RADSL) ndash This is a variation of ADSL but the modem can adjust the speed of the connection depending on the length and quality of the line

8 Direct Connection (Leased circuit)1048707 Most often used to connect sites within a specific organization such as a university or

business requires owning or leasing of cable (from 64 kbps to T-3) users typically connected via Ethernet LANs multimedia connectivity at its fastest

9 Satellite connections1048707 This connection allows you to download Internet files via a satellite connection This is

an efficient method for receiving large Web graphics and other items but you still need a modem connection for other features You must purchase the connection hardware as well as subscribe to the service

10 Wireless connections1048707 Pagers cellular phones and personal digital assistants (PDAs) now allow varying levels

of Internet access from notification of E-mail to limited Web connections Many of these services remain in the experimental stage The PPP connection is called as TCPIP connection or PSTN dial-up connection ISDN connection is called as ISDN dial-up connection Cable Modem DSL and Direct Connection are always-on connection The words ldquoconnectionrdquo and ldquoaccountrdquo related to Internet are interchangeable

D Computer Virus

The Internet just like the rest of the world is not a perfectly safe place to visit If you download files from the Internet there is a chance a very small chance but nonetheless a chance that your computer could become infected with a virus

Viruses are malicious programs that invade your computer They can cause many different kinds of damage such as deleting data files erasing programs or destroying

everything they find on your hard disk Not every virus causes damage some simply flash annoying messages

Different Types of Computer VirusesThere are Different Types of Computer Viruses could be classified in

(origin techniques types of files they infect where they hide the kind of damage they cause the type of operating system or platform they attack) etc Let us have a look at themhellip

Computer Virus is a kind of malicious software written intentionally to enter a computer without the userrsquos permission or knowledge with an ability to replicate itself thus continuing to spread Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system A virus should never be assumed harmless and left on a system Most common types of viruses are mentioned below

Resident VirusesThis type of virus is a permanent which dwells in the RAM memory From

there it can overcome and interrupt all of the operations executed by the system corrupting files and programs that are opened closed copied renamed etc

Examples include Randex CMJ Meve and MrKlunky

Direct Action VirusesThe main purpose of this virus is to replicate and take action when it is

executed When a specific condition is met the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXECBAT file PATH This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted

Overwrite VirusesVirus of this kind is characterized by the fact that it deletes the information

contained in the files that it infects rendering them partially or totally useless once they have been infected

The only way to clean a file infected by an overwrite virus is to delete the file completely thus losing the original content

Examples of this virus include Way TrjReboot Trivial88D

Boot Virus

This type of virus affects the boot sector of a floppy or hard disk This is a crucial part of a disk in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive

Examples of boot viruses include PolybootB AntiEXE

Macro VirusMacro viruses infect files that are created using certain applications or

programs that contain macros These mini-programs make it possible to automate series of operations so that they are performed as a single action thereby saving the user from having to carry them out one by one

Examples of macro viruses Relax MelissaA Bablas O97MY2K

Directory VirusDirectory viruses change the paths that indicate the location of a file By

executing a program (file with the extension EXE or COM) which has been infected by a virus you are unknowingly running the virus program while the original file and program have been previously moved by the virus

Once infected it becomes impossible to locate the original files

Polymorphic VirusPolymorphic viruses encrypt or encode themselves in a different way

(using different algorithms and encryption keys) every time they infect a system

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves

Examples include Elkern Marburg Satan Bug and Tuareg

File InfectorsThis type of virus infects programs or executable files (files with an EXE

or COM extension) When one of these programs is run directly or indirectly the virus is activated producing the damaging effects it is programmed to carry out The majority of existing viruses belong to this category and can be classified depending on the actions that they carry out

Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types They are known as companion viruses because once they get into the system they accompany the other files that already exist In other words in order to carry out their infection routines companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses)

Some examples include Stator Asimov1539 and Terrax1069

FAT VirusThe file allocation table or FAT is the part of a disk used to connect

information and is a vital part of the normal functioning of the computerThis type of virus attack can be especially dangerous by preventing access to certain sections of the disk where important files are stored Damage caused can result in information losses from individual files or even entire directories

WormsA worm is a program very similar to a virus it has the ability to self-

replicate and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses

Examples of worms include PSWBugbearB LovgateF TrileC SobigD Mapson

Trojans or Trojan HorsesAnother unsavory breed of malicious code are Trojans or Trojan horses

which unlike viruses do not reproduce by infecting other files nor do they self-replicate like worms

Logic BombsThey are not considered viruses because they do not replicate They are not

even programs in their own right but rather camouflaged segments of other programs

Their objective is to destroy data on the computer once certain conditions have been met Logic bombs go undetected until launched and the results can be destructive

E How Do You Stay Safe On The Internet

The first part of the answer to the question How do you stay safe on the Internet is know what the threats are that you and your computer are up against

Without this knowledge how are you going to know youve got everything covered off Do you just rely on what the security software vendors tell you to spend your money on

By being aware of what the risks are I suggest you will save yourself money and have more effective protection when it comes to the second part of the answer to the question How do you stay safe on the Internet selecting effective prevention and protection to guard privacy and online security

To help you decide what is necessary for your particular protection in The Three Levels Of Internet Risk Protection I talk about the safe practices that help protect your computer and the types of software to use -- from those that are absolutely essential for security to others which you may want to install to guard privacy to the level you desire

But back to this article How Do You Stay Safe On The Internet here Ill provide you with an introduction to each type of threat At the end of it youll have a good feel for the dangers on the Internet and how those threats can affect you your PC and your information be it personal financial family or business

There are ten of the most prevalent threats covered here Either go through them all or click on the links below for those you are particularly interested in

1 Viruses and Worms 2 Trojan Horses 3 Rootkits 4 Crackers and Hackers 5 Spam 6 Web Bugs 7 Child Security 8 Pop-UpUnder Ads 9 Tracking Cookies 10 Spyware

By the way Ive tried to keep the technical language simple but if you dont understand some of the terms check them out at Netlingo which provides definitions and explanations for all Net terminology

1 Viruses And Worms

What Is A VirusA virus is a man-made computer program that infects a file or program on our computers Each time the infected program is run the virus is also triggered It spreads itself by infecting other programs on the same computer

What Is A WormA worm is also a man-made program that replicates itself However unlike a virus it does not infect other program files on the computer Instead a worm spreads itself automatically to other computers through email over a network and via Internet Relay Chat (IRC)

How Do We Get InfectedViruses and worms can infect desktop computers laptops and network servers and reach our PCs from email web sites downloaded files and loadable media (eg floppy disks CD-ROMs and DVDs)

How Does A Virus Or Worm Infection Affect UsUnfortunately the effects of an infection are pretty unpleasant The virus or worm can

Disable the computer

Add modify or delete files or reformat the hard disk

Steal addresses held in our computer to send on virus-infected emails to our friends colleagues clients or customers

Send unsolicited bulk email (spam) to those in our mail address books and other users

2 Trojan Horses

What Is A Trojan HorseAlthough Trojan horse programs are categorized as viruses they are not true viruses since they do not replicate But like viruses they are one of the most destructive of the Internet risks covered in How Do You Stay Safe On The Internet and are favored by crackers and spyware writers

How Do We Get InfectedTrojans are one of the sneakiest of the online risks They are often downloaded on the back of a free program (freeware) that has some value to the user -- a free game software program or music for instance

How Does A Trojan Infection Affect Us

A Trojan installed on a computer allows that PC to be entered via a backdoor by any remote user that has the access code to the Trojan

The remote attacker can enter the computer undetected when the user is online to access or destroy any information stored Alternatively the Trojan can be programmed to automatically send any information on our PCs back to the attacker This could include

Client or customer information or other business data

Credit card details

Passwords for access to your online bank ISP or web services

Information you would rather remain hidden

Email addresses which may be used for spamming

Childrens names photographs ages or other personal details held on the computer

Distributed Denial of Service (DDOS) attack on other computers via the victims computer

No wonder we ask how do you stay safe on the Internet

3 How Do You Stay Safe On The InternetRootkitsWhat Is A RootkitRootkits are not destructive in their own right but they are designed to conceal the presence of malicious programs on a computer

How Do We Get InfectedAs with any malware such as viruses worms Trojans and spyware rootkits get onto our computers by various means such as through spam attachments being opened on the back of free downloads or planted by crackers who have breached computer defenses

How Does A Rootkit Affect UsRootkits are there for one reason only to ensure that an intruder can access our system and take control without detection by defenses to guard privacy and security

One of the most common and worrying uses of rootkits which causes us to ask How Do You Stay Safe On The Internet is to launch spam and denial of service (DOS) attacks against other computers or networks Another use of

rootkits is to hide Trojans so an intruder can easily use it to extract data from your computer as mentioned above

4 Crackers And Hackers

What Is A HackerCrackerThe term hacker is a misused term We should really be referring to a cracker to describe those who break security on a computer system

The original term hacker refers to computer enthusiasts who enjoy learning everything about a computer system

How Do We Get AttackedCrackers run programs that scan computer ports over the Internet to work out which ports are accessible If our computer shows up in one of these scans the cracker may decide to enter our PC

Crackers favorite targets are the home and home office computers connected by broadband to the Internet because the connection is always open there is more opportunity to locate these computers with their scanners

Alternatively crackers may just exploit weaknesses that have not been patched in the computers operating system in order to gain entry As discussed above Trojans are another way crackers use to gain access to our PCs

How Does A Cracker Affect UsBesides the potentially valuable information they can obtain from our PCs such as that listed under Trojans these intruders also want our hard disk space and Internet connection With these resources they can use our computers to send out spam or attack other computers on the Internet and all this can be done without our knowledge Another reason why we should know how do you stay safe on the Internet

5 Spam -- Unsolicited Email

What Is SpamSpam is defined in Dictionarycom as Unsolicited e-mail often of a commercial nature sent indiscriminately to multiple mailing lists individuals or newsgroups junk e-mail

Spammers peddle pornography sexual aids diet pills and get-rich-quick schemes in fact anything that has a perceived value

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

It was developed by a group headed by Vinton Cerf from Stanford and Bob Kahn from DARPA This new protocol was to allow diverse computer networks to interconnect and communicate with each otherBackbones 50Kbps ARPANET - Hosts 23+

1974 First Use of term Internet by Vint Cerf and Bob Kahn in paper on Transmission Control ProtocolBackbones 50Kbps ARPANET - Hosts 23+

1976 Dr Robert M Metcalfe develops Ethernet which allowed coaxial cable to move data extremely fast This was a crucial component to the development of LANsThe packet satellite project went into practical use SATNET Atlantic packet Satellite network was born This network linked the United States with Europe Surprisingly it used INTELSAT satellites that were owned by a consortium of countries and not exclusively the United States government

UUCP (Unix-to-Unix CoPy) developed at ATampT Bell Labs and distributed with UNIX one year later

The Department of Defense began to experiment with the TCPIP protocol and soon decided to require it for use on ARPANETBackbones 50Kbps ARPANET plus satellite and radio connections - Hosts 111+

1979 USENET (the decentralized news group network) was created by Steve Bellovin a graduate student at University of North Carolina and programmers Tom Truscott and Jim Ellis It was based on UUCP

The Creation of BITNET by IBM Because its Time Network introduced the store and forward network It was used for email and listservsBackbones 50Kbps ARPANET plus satellite and radio connections - Hosts 111+

1981 National Science Foundation Created backbone called CSNET 56 Kbps network for institutions without access to ARPANET Vinton Cerf proposed a plan for an inter-network connection between CSNET and the ARPANETBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 213

1983 Internet Activities Board (IAB) was created in 1983On January 1st every machine connected to ARPANET had to use TCPIP TCPIP became the core Internet protocol and replaced NCP entirely

The University of Wisconsin created Domain Name System (DNS) This allowed packets to be directed to a domain name which would be translated by the server database into the

corresponding IP number This made it much easier for people to access other servers because they no longer had to remember numbersBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 562

1984 The ARPANET was divided into two networks MILNET and ARPANET MILNET was to serve the needs of the military and ARPANET to support the advanced research component Department of Defense continued to support both networks

Upgrade to CSNET was contracted to MCI New circuits would be T1 lines15 Mbps which is twenty-five times faster than the old 56 Kbps lines IBM would provide advanced routers and Merit would manage the network New network was to be called NSFNET (National Science Foundation Network) and old lines were to remain called CSNETBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 1024

1985 The National Science Foundation began deploying its new T1 lines which would be finished by 1988Backbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 1961

1986 The Internet Engineering Task Force or IETF was created to serve as a forum for technical coordination by contractors for DARPA working on ARPANET US Defense Data Network (DDN) and the Internet core gateway systemBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 2308

1987 BITNET and CSNET merged to form the Corporation for Research and Educational Networking (CREN) another work of the National Science FoundationBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 28174

1988 Soon after the completion of the T1 NSFNET backbone traffic increased so quickly that plans immediately began on upgrading the network againBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 56000

1990 (Updated 82001) Merit IBM and MCI formed a not for profit corporation called ANS Advanced Network amp Services which was to conduct research into high speed networking It soon came up with the concept of the T3 a 45 Mbps line NSF quickly adopted the new network and by the end of 1991 all of its sites were connected by this new backbone

While the T3 lines were being constructed the Department of Defense disbanded the ARPANET and it was replaced by the NSFNET backbone The original 50Kbs lines of ARPANET were taken out of service

Tim Berners-Lee and CERN in Geneva implements a hypertext system to provide efficient information access to the members of the international high-energy physics communityBackbones 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 313000

1991CSNET (which consisted of 56Kbps lines) was discontinued having fulfilled its important early role in the provision of academic networking service A key feature of CREN is that its operational costs are fully met through dues paid by its member organizations

The NSF established a new network named NREN the National Research and Education Network The purpose of this network is to conduct high speed networking research It was not to be used as a commercial network nor was it to be used to send a lot of the data that the Internet now transfersBackbones Partial 45Mbps (T3) NSFNET a few private backbones plus satellite and radio connections - Hosts 617000

1992 Internet Society is chartered

World-Wide Web released by CERNNSFNET backbone upgraded to T3 (44736Mbps)Backbones 45Mbps (T3) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps plus satellite and radio connections - Hosts 1136000

1993 InterNIC created by NSF to provide specific Internet services directory and database services (by ATampT) registration services (by Network Solutions Inc) and information services (by General AtomicsCERFnet)

Marc Andreessen and NCSA and the University of Illinois develops a graphical user interface to the WWW called Mosaic for XBackbones 45Mbps (T3) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps and 45Mpbs lines plus satellite and radio connections - Hosts 2056000

1994 No major changes were made to the physical network The most significant thing that happened was the growth Many new networks were added to the NSF backbone Hundreds of thousands of new hosts were added to the INTERNET during this time period

Pizza Hut offers pizza ordering on its Web page

First Virtual the first cyberbank opens

ATM (Asynchronous Transmission Mode 145Mbps) backbone is installed on NSFNETBackbones 145Mbps (ATM) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps and 45Mpbs lines plus satellite and radio connections - Hosts 3864000

1995 The National Science Foundation announced that as of April 30 1995 it would no longer allow direct access to the NSF backbone The National Science Foundation contracted with four companies that would be providers of access to the NSF backbone (Merit) These companies would then sell connections to groups organizations and companies

$50 annual fee is imposed on domains excluding edu and gov domains which are still funded by the National Science FoundationBackbones 145Mbps (ATM) NSFNET (now private) private interconnected backbones consisting mainly of 56Kbps 1544Mbps 45Mpbs 155Mpbs lines in construction plus satellite and radio connections - Hosts 6642000

1996 Most Internet traffic is carried by backbones of independent ISPs including MCI ATampT Sprint UUnet BBN planet ANS and more

The Internet Society the group that controls the INTERNET researches new TCPIP technology that will be able to have more than the approximately 43 billion addresses currently available The problem that has arisen is that it is not known how both the old and the new addressing systems will be able to work at the same time during a transition period

Internet2 is established

(Backbone data below was valid in 1996 please seek other references for current backbone and host data as it is constantly expanded)Backbones 145Mbps (ATM) NSFNET (now private) private interconnected backbones consisting mainly of 56Kbps 1544Mbps 45Mpbsand 155Mpbs lines plus satellite and radio connections - Hosts over 15000000 and growing rapidly

The Present and The Future

A new technology recommendation called IPv6 is suggested to replace the current IPv4 technology IPv4 allows for fewer than 43 billion directly connected Internet devices problematic because the world population (as of 2009) is well over 65 billion (theoretically if ever human had a computer and mobile phone wed need 13 billion addresses which is something IPv6 can easily accomplish)

In 1999 a wireless technology called 80211b more commonly referred to as Wi-Fi is standardized Over the years that follow this technology begins appearing as a built-in feature of portable computers and many handheld devices

In 2005 the One Laptop Per Child project begins In an attempt to provide low cost education-designed laptops to children around the world for a low cost (US$100 per unit) this project helps spark the netbook industry Netbooks are small portable computers with extended battery life and built-in Wi-Fi connectivity

Multi-touch technology begins to appear in handheld devices tablet computers and netbooks This technology supplements traditional touch-screen technology by allowing advanced gesturing (several fingers moving on a screen instead of just one) Multi-touch technology is seen as a possible alternative to traditional keyboard and mouse (touchpad) systems

Read Bill Buxtons Overview and History of Multi-Touch Systems entitled Multi-Touch Systems that I Have Known and Loved

In December 2009 the first multi-touch website is reported

B2 Overview of InternetThe Internet is a global computer network made up of smaller computer networks

it hasbeen called a Network of NetworksThese smaller networks include1048707 Local Area Networks (like networked offices or computer labs and campus-wide

networks)1048707 Wide Area Networks (like city-wide networks)1048707 State and Regional Networks (including regional service providers and others)1048707 National and International Networks

There is no one inventor of the Internet The Internet was created in the 1960s as a huge network linking big university and government computers The science behind the Internet was invented during the Cold War when the United States was in competition against Russia for weapons and technology So the Internet is actually pretty oldmdasharound forty years Much of Internetrsquos initial development was supported by American governmental research and network development (beginning with the American militarys ARPANET in 1969)In fact email has been around since 1972 In 1989 that Tim Berners-Lee a scientist at the European Laboratory for Particle Physics in Geneva proposed the World Wide Web Now Internet Service Providers (ISPs) offer Internet access to their clients at costs ranging from Rs 150- per 6 months to hundreds of rupees per year depending on the types of service they offer

II What people do when surfing People usually get to surfing to internet to do things that are complicated

for them They do a short time for them while surfing depends from the user surfing is the very easiest thing to search for what you want to know

Surfing is one where you can get information access to an educational learning where you can also communicate for an entertainment or an Personal Information

Surfing is one of the easiest way of sharing files and document or any personal data

I1 Surfing is build for a network and made up of organization

i Communication ii Education

iii Business managements Commercial Company iv Government v Private Organization

vi Entertainment

I2 What are the uses of the Internet

There are three fundamental uses of the Internet Communication Information Retrieval Presentation of Information

Communication The Internet is used both for one-to-one communications (email and real-time chat

programs) and one-to-many

Information Retrieval The Internet allows access to public domain information bibliographic databases

libraries and entertainment services as well as to proprietary information services

Presentation of Information Any organization connected to the Internet can provide access to its own in-house

information (library catalogs faculty information etc) to millions of people world-wide Individuals can also develop and provide their own information packages via their own

home pages

II Terms and Web PoliciesObjectives

To know the resources of internet Navigate around the web using Internet Explorer To know what internet services we have To know what is the risk when your online Define the World Wide Web Explain the work of the Domain Name Service Explain the difference between IP address and domain name How to protect and stay safe online

A Internet Addresses

Every computer file of information and person on the Internet is identified by a unique address

A1 Computer AddressesComputer addresses are made up of three parts (or in some cases two parts) separated

by dots like this computer-nameinstitutiondomain

The computer name is a name given locally to identify a particular computer it is in some cases omitted from the address The institution name is the name (or an abbreviation) of the name of the school company or other institution housing the computer The domain name specifies either the type or the geographic location of the computer

A2 Domain NamesThere are several possible domain names including some that identify the type of institution and some that identify a geographical location They include

edu Educational institutioncom Commercial and profitable organizationsorg Non-profitable organizations

net Internet infrastructure and service providersgov Governmental agencydepartmentmil American military agencyint International organizationsus United Statesin Indiamy Malaysiaca Canadajp Japanbiz Businessaero Aeronautics

A3 Personal Addresses

A persons address (or their email address) places the users username (or login) and the symbol before the computer address For example a user whose username is creator who is accessing email from the yahoo server of United State Yahoo Website would have the following address creatoryahoocom

B Internet Services

B1 Internet Services

rdquoInternet servicesrdquo serve more sophisticated and multi-purpose purposes and increasingly make the Internet a truly useful information resource

B11 EmailIt is the Internets version of the postal service Using the Internet it provides the ability to send a message reply to a message send a file created in another program andor even send the same message to a group of people Some benefits of Email arebull Speed A message can be sent from Chennai to Australia in a matter of secondsbull Cost Emails are cheap You are usually only charged for the telephone call time (local call rate) for sending the message into the Internet and not the cost associated with transferring the message across the Internetbull Flexibility It is easy to send duplicates of your messages to other people or groups for the cost of a single messagebull Record keeping Messages sent and received can be easily stored for future referenceIn order to use Email you will need Internet access arranged through an InternetService Provider (ISP) who will allocate you one or a number of Email accounts To be able to retrieve and send mail from these addresses a user will need what is known as Email client software and your ISP usually provides this although nowadays most computers come with it pre-installed

B12 Mail Lists

These use email to support discussion groups on a wide range of specific subjectsOnce you are becoming a subscriber of a mailing list you will receive lot of emails related to the subject covered by the mailing list

B13 FTPFTP was the original Internet mechanism for the storage and retrieval of information There are still many FTP Sites around the Internet although many of them have been melded into the World Wide Web In computer science FTP stands for File Transfer Protocol which is a way of transferring files between computers A file can be anything -- a spreadsheet a word document a song or a picture When someone says Please FTP me that file for instance that means Please transfer that file from your computer to mine To FTP you usually need to download a special program or application You also usually need a password to be able to access or send information to someone elses computer

B14 GopherGopher was developed at the University of Minnesota primarily to support its own Campus Wide Information Server (CWIS) It provides access to information available either locally or elsewhere on the Internet by means of a simple series of uniformly designed menus

B15 Instant Messaging (IM)There are lots of other fun and useful IM features you can explore like group chats file transfers voice calls video conferencing and emoticons that reflect your mood

B16 IRCIRC stands for Internet Relay Chat It has been used in many countries around the world IRC is a multi-user chat system where people meet on channels (rooms virtual places usually with a certain topic of conversation) to talk in groups or privately There is no restriction to the number of people that can participate in a given discussion or the number of channels that can be formed on IRC

B17 NewsgroupsThe Internet has a place where we can gather question and discuss our experiences within a wide variety of topics Its called Usenet News Some users also call it Net NewsThink of Usenet News as a giant worldwide bulletin board Anyone can freely post something on this bulletin board Everyone else can read the posted items and add their own items These voluntary contributions and free exchange of information are the foundation of the Internet

B18 Voice over IPVoice over IP (Voice over Internet Protocol or VoIP) technology converts voice calls from analog to digital to be sent over digital data networks In Voice over IP or VoIP voice data and video all travel along the network

B19 World Wide Web (WWW)The newest information application on the Internet the WWW provides standardized access to Gopher FTP Telnet and more by means of home pages designed either by institutions or

b individuals By means of the HyperText Markup Language (HTML) it allows users to point at highlighted terms following links to whatever information interests them It is a multimedia environment allowing Internet users access to audio and video materials There are a number of client software packages (or browsers) including Lynx (a textonly browser) Netscape and Microsofts Internet Explorer (which are multimedia browsers)

C Types of Internet Connection

C1 Types of Internet connections

The options for providing user connectivity to the Internet are given below

1 Terminal DialupModem (Shell connection)1048707 Most common option1048707 User requirements limited to modem and communications software1048707 Text-only access1048707 Shell accounts were more popular before the advent of the Web A shell account lets

you use your computer much as if it were a virtual console associated with a remote computer You can type commands which are interpreted by the remote computer and view the resulting output on your computer Although a few web browsers such as Lynx can operate via a shell account they donrsquot generally support the highly graphical multimedia pages which web surfers have come to expect

2 SLIP (Serial Line Internet Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software SLIP software amp software for Internet

applications1048707 Multimedia access

3 PPP (Point-to-Point Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software PPP software amp software for Internet

applications1048707 Multimedia access1048707 While your computer is connected to the Internet you can use it to surf the Web with

your favorite browser If your ISP allows you can even run a web server providing pages that can be viewed by others around the world

4 ISDN (Integrated Services Digital Network)1048707 Most often used to connect remote telecommuters to office LANs1048707 Requires ISDN phone line access1048707 Faster than analog terminal dialupmodem service

1048707 User must have ISDN phone line ISDN card communications software TCP software amp SLIP or PPP software multimedia connectivity

5 DIAS1048707 The DIAS offers a wire-line solution for high speed symmetrical Internet access on the

existing telephone lines It provides an always on internet access that is permanently available at customers premises DIAS combines voice and internet data packets on a single twisted pair wire at subscriber premises that means you can use telephone and surf internet at the same time

6 Cable Modem1048707 The term ldquoCable Modemrdquo is quite new and refers to a modem that operates over the

ordinary cable TV network cables Basically you just connect the Cable Modem to the TV outlet for your cable TV and the cable TV operator connects a Cable Modem Termination System (CMTS) in his end (the Head-End)

1048707 Actually the term ldquoCable Modemrdquo is a bit misleading as a Cable Modem works more like a Local Area Network (LAN) interface than as a modem

1048707 In a cable TV system signals from the various channels are each given a 6-MHz slice of the cablersquos available bandwidth and then sent down the cable to your house When a cable company offers Internet access over the cable Internet information can use the same cables because the cable modem system puts downstream data ndash data sent from the Internet to an individual computer ndash into a 6-MHz channel On the cable the data looks just like a TV channel So Internet downstream data takes up the same amount of cable space as any single channel of programming Upstream data ndash information sent from an individual back to the Internet ndash requires even less of the cablersquos bandwidth just 2 MHz since the assumption is that most people download far more information than they upload

1048707 Putting both upstream and downstream data on the cable television system requires two types of equipment a cable modem on the customer end and a cable modem termination system (CMTS) at the cable providerrsquos end Between these two types of equipment all the computer networking security and management of Internet access over cable television is put into place

7 Digital Subscriber Line (DSL) connection1048707 DSL is a very high-speed connection that uses the same wires as a regular telephone

line1048707 Here are some advantages of DSL

1 You can leave your Internet connection open and still use the phone line for voice calls

2 The speed is much higher than a regular modem3 DSL doesnrsquot necessarily require new wiring it can use the phone line you

already have4 The company that offers DSL (eg BSNL) will usually provide the modem as

part of the installation1048707 But there are disadvantages

1 A DSL connection works better when you are closer to the providerrsquos central office

2 The service is not available everywhere1048707 Other types of DSL include

1 Asymmetric DSL (ADSL) line ndash The connection is faster for receiving data than it is for sending data over the Internet

2 Very high bit-rate DSL (VDSL) ndash This is a fast connection but works only over a short distance

3 Symmetric DSL (SDSL) ndash This connection used mainly by small businesses doesnrsquot allow you to use the phone at the same time but the speed of receiving and sending data is the same

4 Rate-adaptive DSL (RADSL) ndash This is a variation of ADSL but the modem can adjust the speed of the connection depending on the length and quality of the line

8 Direct Connection (Leased circuit)1048707 Most often used to connect sites within a specific organization such as a university or

business requires owning or leasing of cable (from 64 kbps to T-3) users typically connected via Ethernet LANs multimedia connectivity at its fastest

9 Satellite connections1048707 This connection allows you to download Internet files via a satellite connection This is

an efficient method for receiving large Web graphics and other items but you still need a modem connection for other features You must purchase the connection hardware as well as subscribe to the service

10 Wireless connections1048707 Pagers cellular phones and personal digital assistants (PDAs) now allow varying levels

of Internet access from notification of E-mail to limited Web connections Many of these services remain in the experimental stage The PPP connection is called as TCPIP connection or PSTN dial-up connection ISDN connection is called as ISDN dial-up connection Cable Modem DSL and Direct Connection are always-on connection The words ldquoconnectionrdquo and ldquoaccountrdquo related to Internet are interchangeable

D Computer Virus

The Internet just like the rest of the world is not a perfectly safe place to visit If you download files from the Internet there is a chance a very small chance but nonetheless a chance that your computer could become infected with a virus

Viruses are malicious programs that invade your computer They can cause many different kinds of damage such as deleting data files erasing programs or destroying

everything they find on your hard disk Not every virus causes damage some simply flash annoying messages

Different Types of Computer VirusesThere are Different Types of Computer Viruses could be classified in

(origin techniques types of files they infect where they hide the kind of damage they cause the type of operating system or platform they attack) etc Let us have a look at themhellip

Computer Virus is a kind of malicious software written intentionally to enter a computer without the userrsquos permission or knowledge with an ability to replicate itself thus continuing to spread Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system A virus should never be assumed harmless and left on a system Most common types of viruses are mentioned below

Resident VirusesThis type of virus is a permanent which dwells in the RAM memory From

there it can overcome and interrupt all of the operations executed by the system corrupting files and programs that are opened closed copied renamed etc

Examples include Randex CMJ Meve and MrKlunky

Direct Action VirusesThe main purpose of this virus is to replicate and take action when it is

executed When a specific condition is met the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXECBAT file PATH This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted

Overwrite VirusesVirus of this kind is characterized by the fact that it deletes the information

contained in the files that it infects rendering them partially or totally useless once they have been infected

The only way to clean a file infected by an overwrite virus is to delete the file completely thus losing the original content

Examples of this virus include Way TrjReboot Trivial88D

Boot Virus

This type of virus affects the boot sector of a floppy or hard disk This is a crucial part of a disk in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive

Examples of boot viruses include PolybootB AntiEXE

Macro VirusMacro viruses infect files that are created using certain applications or

programs that contain macros These mini-programs make it possible to automate series of operations so that they are performed as a single action thereby saving the user from having to carry them out one by one

Examples of macro viruses Relax MelissaA Bablas O97MY2K

Directory VirusDirectory viruses change the paths that indicate the location of a file By

executing a program (file with the extension EXE or COM) which has been infected by a virus you are unknowingly running the virus program while the original file and program have been previously moved by the virus

Once infected it becomes impossible to locate the original files

Polymorphic VirusPolymorphic viruses encrypt or encode themselves in a different way

(using different algorithms and encryption keys) every time they infect a system

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves

Examples include Elkern Marburg Satan Bug and Tuareg

File InfectorsThis type of virus infects programs or executable files (files with an EXE

or COM extension) When one of these programs is run directly or indirectly the virus is activated producing the damaging effects it is programmed to carry out The majority of existing viruses belong to this category and can be classified depending on the actions that they carry out

Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types They are known as companion viruses because once they get into the system they accompany the other files that already exist In other words in order to carry out their infection routines companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses)

Some examples include Stator Asimov1539 and Terrax1069

FAT VirusThe file allocation table or FAT is the part of a disk used to connect

information and is a vital part of the normal functioning of the computerThis type of virus attack can be especially dangerous by preventing access to certain sections of the disk where important files are stored Damage caused can result in information losses from individual files or even entire directories

WormsA worm is a program very similar to a virus it has the ability to self-

replicate and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses

Examples of worms include PSWBugbearB LovgateF TrileC SobigD Mapson

Trojans or Trojan HorsesAnother unsavory breed of malicious code are Trojans or Trojan horses

which unlike viruses do not reproduce by infecting other files nor do they self-replicate like worms

Logic BombsThey are not considered viruses because they do not replicate They are not

even programs in their own right but rather camouflaged segments of other programs

Their objective is to destroy data on the computer once certain conditions have been met Logic bombs go undetected until launched and the results can be destructive

E How Do You Stay Safe On The Internet

The first part of the answer to the question How do you stay safe on the Internet is know what the threats are that you and your computer are up against

Without this knowledge how are you going to know youve got everything covered off Do you just rely on what the security software vendors tell you to spend your money on

By being aware of what the risks are I suggest you will save yourself money and have more effective protection when it comes to the second part of the answer to the question How do you stay safe on the Internet selecting effective prevention and protection to guard privacy and online security

To help you decide what is necessary for your particular protection in The Three Levels Of Internet Risk Protection I talk about the safe practices that help protect your computer and the types of software to use -- from those that are absolutely essential for security to others which you may want to install to guard privacy to the level you desire

But back to this article How Do You Stay Safe On The Internet here Ill provide you with an introduction to each type of threat At the end of it youll have a good feel for the dangers on the Internet and how those threats can affect you your PC and your information be it personal financial family or business

There are ten of the most prevalent threats covered here Either go through them all or click on the links below for those you are particularly interested in

1 Viruses and Worms 2 Trojan Horses 3 Rootkits 4 Crackers and Hackers 5 Spam 6 Web Bugs 7 Child Security 8 Pop-UpUnder Ads 9 Tracking Cookies 10 Spyware

By the way Ive tried to keep the technical language simple but if you dont understand some of the terms check them out at Netlingo which provides definitions and explanations for all Net terminology

1 Viruses And Worms

What Is A VirusA virus is a man-made computer program that infects a file or program on our computers Each time the infected program is run the virus is also triggered It spreads itself by infecting other programs on the same computer

What Is A WormA worm is also a man-made program that replicates itself However unlike a virus it does not infect other program files on the computer Instead a worm spreads itself automatically to other computers through email over a network and via Internet Relay Chat (IRC)

How Do We Get InfectedViruses and worms can infect desktop computers laptops and network servers and reach our PCs from email web sites downloaded files and loadable media (eg floppy disks CD-ROMs and DVDs)

How Does A Virus Or Worm Infection Affect UsUnfortunately the effects of an infection are pretty unpleasant The virus or worm can

Disable the computer

Add modify or delete files or reformat the hard disk

Steal addresses held in our computer to send on virus-infected emails to our friends colleagues clients or customers

Send unsolicited bulk email (spam) to those in our mail address books and other users

2 Trojan Horses

What Is A Trojan HorseAlthough Trojan horse programs are categorized as viruses they are not true viruses since they do not replicate But like viruses they are one of the most destructive of the Internet risks covered in How Do You Stay Safe On The Internet and are favored by crackers and spyware writers

How Do We Get InfectedTrojans are one of the sneakiest of the online risks They are often downloaded on the back of a free program (freeware) that has some value to the user -- a free game software program or music for instance

How Does A Trojan Infection Affect Us

A Trojan installed on a computer allows that PC to be entered via a backdoor by any remote user that has the access code to the Trojan

The remote attacker can enter the computer undetected when the user is online to access or destroy any information stored Alternatively the Trojan can be programmed to automatically send any information on our PCs back to the attacker This could include

Client or customer information or other business data

Credit card details

Passwords for access to your online bank ISP or web services

Information you would rather remain hidden

Email addresses which may be used for spamming

Childrens names photographs ages or other personal details held on the computer

Distributed Denial of Service (DDOS) attack on other computers via the victims computer

No wonder we ask how do you stay safe on the Internet

3 How Do You Stay Safe On The InternetRootkitsWhat Is A RootkitRootkits are not destructive in their own right but they are designed to conceal the presence of malicious programs on a computer

How Do We Get InfectedAs with any malware such as viruses worms Trojans and spyware rootkits get onto our computers by various means such as through spam attachments being opened on the back of free downloads or planted by crackers who have breached computer defenses

How Does A Rootkit Affect UsRootkits are there for one reason only to ensure that an intruder can access our system and take control without detection by defenses to guard privacy and security

One of the most common and worrying uses of rootkits which causes us to ask How Do You Stay Safe On The Internet is to launch spam and denial of service (DOS) attacks against other computers or networks Another use of

rootkits is to hide Trojans so an intruder can easily use it to extract data from your computer as mentioned above

4 Crackers And Hackers

What Is A HackerCrackerThe term hacker is a misused term We should really be referring to a cracker to describe those who break security on a computer system

The original term hacker refers to computer enthusiasts who enjoy learning everything about a computer system

How Do We Get AttackedCrackers run programs that scan computer ports over the Internet to work out which ports are accessible If our computer shows up in one of these scans the cracker may decide to enter our PC

Crackers favorite targets are the home and home office computers connected by broadband to the Internet because the connection is always open there is more opportunity to locate these computers with their scanners

Alternatively crackers may just exploit weaknesses that have not been patched in the computers operating system in order to gain entry As discussed above Trojans are another way crackers use to gain access to our PCs

How Does A Cracker Affect UsBesides the potentially valuable information they can obtain from our PCs such as that listed under Trojans these intruders also want our hard disk space and Internet connection With these resources they can use our computers to send out spam or attack other computers on the Internet and all this can be done without our knowledge Another reason why we should know how do you stay safe on the Internet

5 Spam -- Unsolicited Email

What Is SpamSpam is defined in Dictionarycom as Unsolicited e-mail often of a commercial nature sent indiscriminately to multiple mailing lists individuals or newsgroups junk e-mail

Spammers peddle pornography sexual aids diet pills and get-rich-quick schemes in fact anything that has a perceived value

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

corresponding IP number This made it much easier for people to access other servers because they no longer had to remember numbersBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 562

1984 The ARPANET was divided into two networks MILNET and ARPANET MILNET was to serve the needs of the military and ARPANET to support the advanced research component Department of Defense continued to support both networks

Upgrade to CSNET was contracted to MCI New circuits would be T1 lines15 Mbps which is twenty-five times faster than the old 56 Kbps lines IBM would provide advanced routers and Merit would manage the network New network was to be called NSFNET (National Science Foundation Network) and old lines were to remain called CSNETBackbones 50Kbps ARPANET 56Kbps CSNET plus satellite and radio connections - Hosts 1024

1985 The National Science Foundation began deploying its new T1 lines which would be finished by 1988Backbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 1961

1986 The Internet Engineering Task Force or IETF was created to serve as a forum for technical coordination by contractors for DARPA working on ARPANET US Defense Data Network (DDN) and the Internet core gateway systemBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 2308

1987 BITNET and CSNET merged to form the Corporation for Research and Educational Networking (CREN) another work of the National Science FoundationBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 28174

1988 Soon after the completion of the T1 NSFNET backbone traffic increased so quickly that plans immediately began on upgrading the network againBackbones 50Kbps ARPANET 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 56000

1990 (Updated 82001) Merit IBM and MCI formed a not for profit corporation called ANS Advanced Network amp Services which was to conduct research into high speed networking It soon came up with the concept of the T3 a 45 Mbps line NSF quickly adopted the new network and by the end of 1991 all of its sites were connected by this new backbone

While the T3 lines were being constructed the Department of Defense disbanded the ARPANET and it was replaced by the NSFNET backbone The original 50Kbs lines of ARPANET were taken out of service

Tim Berners-Lee and CERN in Geneva implements a hypertext system to provide efficient information access to the members of the international high-energy physics communityBackbones 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 313000

1991CSNET (which consisted of 56Kbps lines) was discontinued having fulfilled its important early role in the provision of academic networking service A key feature of CREN is that its operational costs are fully met through dues paid by its member organizations

The NSF established a new network named NREN the National Research and Education Network The purpose of this network is to conduct high speed networking research It was not to be used as a commercial network nor was it to be used to send a lot of the data that the Internet now transfersBackbones Partial 45Mbps (T3) NSFNET a few private backbones plus satellite and radio connections - Hosts 617000

1992 Internet Society is chartered

World-Wide Web released by CERNNSFNET backbone upgraded to T3 (44736Mbps)Backbones 45Mbps (T3) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps plus satellite and radio connections - Hosts 1136000

1993 InterNIC created by NSF to provide specific Internet services directory and database services (by ATampT) registration services (by Network Solutions Inc) and information services (by General AtomicsCERFnet)

Marc Andreessen and NCSA and the University of Illinois develops a graphical user interface to the WWW called Mosaic for XBackbones 45Mbps (T3) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps and 45Mpbs lines plus satellite and radio connections - Hosts 2056000

1994 No major changes were made to the physical network The most significant thing that happened was the growth Many new networks were added to the NSF backbone Hundreds of thousands of new hosts were added to the INTERNET during this time period

Pizza Hut offers pizza ordering on its Web page

First Virtual the first cyberbank opens

ATM (Asynchronous Transmission Mode 145Mbps) backbone is installed on NSFNETBackbones 145Mbps (ATM) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps and 45Mpbs lines plus satellite and radio connections - Hosts 3864000

1995 The National Science Foundation announced that as of April 30 1995 it would no longer allow direct access to the NSF backbone The National Science Foundation contracted with four companies that would be providers of access to the NSF backbone (Merit) These companies would then sell connections to groups organizations and companies

$50 annual fee is imposed on domains excluding edu and gov domains which are still funded by the National Science FoundationBackbones 145Mbps (ATM) NSFNET (now private) private interconnected backbones consisting mainly of 56Kbps 1544Mbps 45Mpbs 155Mpbs lines in construction plus satellite and radio connections - Hosts 6642000

1996 Most Internet traffic is carried by backbones of independent ISPs including MCI ATampT Sprint UUnet BBN planet ANS and more

The Internet Society the group that controls the INTERNET researches new TCPIP technology that will be able to have more than the approximately 43 billion addresses currently available The problem that has arisen is that it is not known how both the old and the new addressing systems will be able to work at the same time during a transition period

Internet2 is established

(Backbone data below was valid in 1996 please seek other references for current backbone and host data as it is constantly expanded)Backbones 145Mbps (ATM) NSFNET (now private) private interconnected backbones consisting mainly of 56Kbps 1544Mbps 45Mpbsand 155Mpbs lines plus satellite and radio connections - Hosts over 15000000 and growing rapidly

The Present and The Future

A new technology recommendation called IPv6 is suggested to replace the current IPv4 technology IPv4 allows for fewer than 43 billion directly connected Internet devices problematic because the world population (as of 2009) is well over 65 billion (theoretically if ever human had a computer and mobile phone wed need 13 billion addresses which is something IPv6 can easily accomplish)

In 1999 a wireless technology called 80211b more commonly referred to as Wi-Fi is standardized Over the years that follow this technology begins appearing as a built-in feature of portable computers and many handheld devices

In 2005 the One Laptop Per Child project begins In an attempt to provide low cost education-designed laptops to children around the world for a low cost (US$100 per unit) this project helps spark the netbook industry Netbooks are small portable computers with extended battery life and built-in Wi-Fi connectivity

Multi-touch technology begins to appear in handheld devices tablet computers and netbooks This technology supplements traditional touch-screen technology by allowing advanced gesturing (several fingers moving on a screen instead of just one) Multi-touch technology is seen as a possible alternative to traditional keyboard and mouse (touchpad) systems

Read Bill Buxtons Overview and History of Multi-Touch Systems entitled Multi-Touch Systems that I Have Known and Loved

In December 2009 the first multi-touch website is reported

B2 Overview of InternetThe Internet is a global computer network made up of smaller computer networks

it hasbeen called a Network of NetworksThese smaller networks include1048707 Local Area Networks (like networked offices or computer labs and campus-wide

networks)1048707 Wide Area Networks (like city-wide networks)1048707 State and Regional Networks (including regional service providers and others)1048707 National and International Networks

There is no one inventor of the Internet The Internet was created in the 1960s as a huge network linking big university and government computers The science behind the Internet was invented during the Cold War when the United States was in competition against Russia for weapons and technology So the Internet is actually pretty oldmdasharound forty years Much of Internetrsquos initial development was supported by American governmental research and network development (beginning with the American militarys ARPANET in 1969)In fact email has been around since 1972 In 1989 that Tim Berners-Lee a scientist at the European Laboratory for Particle Physics in Geneva proposed the World Wide Web Now Internet Service Providers (ISPs) offer Internet access to their clients at costs ranging from Rs 150- per 6 months to hundreds of rupees per year depending on the types of service they offer

II What people do when surfing People usually get to surfing to internet to do things that are complicated

for them They do a short time for them while surfing depends from the user surfing is the very easiest thing to search for what you want to know

Surfing is one where you can get information access to an educational learning where you can also communicate for an entertainment or an Personal Information

Surfing is one of the easiest way of sharing files and document or any personal data

I1 Surfing is build for a network and made up of organization

i Communication ii Education

iii Business managements Commercial Company iv Government v Private Organization

vi Entertainment

I2 What are the uses of the Internet

There are three fundamental uses of the Internet Communication Information Retrieval Presentation of Information

Communication The Internet is used both for one-to-one communications (email and real-time chat

programs) and one-to-many

Information Retrieval The Internet allows access to public domain information bibliographic databases

libraries and entertainment services as well as to proprietary information services

Presentation of Information Any organization connected to the Internet can provide access to its own in-house

information (library catalogs faculty information etc) to millions of people world-wide Individuals can also develop and provide their own information packages via their own

home pages

II Terms and Web PoliciesObjectives

To know the resources of internet Navigate around the web using Internet Explorer To know what internet services we have To know what is the risk when your online Define the World Wide Web Explain the work of the Domain Name Service Explain the difference between IP address and domain name How to protect and stay safe online

A Internet Addresses

Every computer file of information and person on the Internet is identified by a unique address

A1 Computer AddressesComputer addresses are made up of three parts (or in some cases two parts) separated

by dots like this computer-nameinstitutiondomain

The computer name is a name given locally to identify a particular computer it is in some cases omitted from the address The institution name is the name (or an abbreviation) of the name of the school company or other institution housing the computer The domain name specifies either the type or the geographic location of the computer

A2 Domain NamesThere are several possible domain names including some that identify the type of institution and some that identify a geographical location They include

edu Educational institutioncom Commercial and profitable organizationsorg Non-profitable organizations

net Internet infrastructure and service providersgov Governmental agencydepartmentmil American military agencyint International organizationsus United Statesin Indiamy Malaysiaca Canadajp Japanbiz Businessaero Aeronautics

A3 Personal Addresses

A persons address (or their email address) places the users username (or login) and the symbol before the computer address For example a user whose username is creator who is accessing email from the yahoo server of United State Yahoo Website would have the following address creatoryahoocom

B Internet Services

B1 Internet Services

rdquoInternet servicesrdquo serve more sophisticated and multi-purpose purposes and increasingly make the Internet a truly useful information resource

B11 EmailIt is the Internets version of the postal service Using the Internet it provides the ability to send a message reply to a message send a file created in another program andor even send the same message to a group of people Some benefits of Email arebull Speed A message can be sent from Chennai to Australia in a matter of secondsbull Cost Emails are cheap You are usually only charged for the telephone call time (local call rate) for sending the message into the Internet and not the cost associated with transferring the message across the Internetbull Flexibility It is easy to send duplicates of your messages to other people or groups for the cost of a single messagebull Record keeping Messages sent and received can be easily stored for future referenceIn order to use Email you will need Internet access arranged through an InternetService Provider (ISP) who will allocate you one or a number of Email accounts To be able to retrieve and send mail from these addresses a user will need what is known as Email client software and your ISP usually provides this although nowadays most computers come with it pre-installed

B12 Mail Lists

These use email to support discussion groups on a wide range of specific subjectsOnce you are becoming a subscriber of a mailing list you will receive lot of emails related to the subject covered by the mailing list

B13 FTPFTP was the original Internet mechanism for the storage and retrieval of information There are still many FTP Sites around the Internet although many of them have been melded into the World Wide Web In computer science FTP stands for File Transfer Protocol which is a way of transferring files between computers A file can be anything -- a spreadsheet a word document a song or a picture When someone says Please FTP me that file for instance that means Please transfer that file from your computer to mine To FTP you usually need to download a special program or application You also usually need a password to be able to access or send information to someone elses computer

B14 GopherGopher was developed at the University of Minnesota primarily to support its own Campus Wide Information Server (CWIS) It provides access to information available either locally or elsewhere on the Internet by means of a simple series of uniformly designed menus

B15 Instant Messaging (IM)There are lots of other fun and useful IM features you can explore like group chats file transfers voice calls video conferencing and emoticons that reflect your mood

B16 IRCIRC stands for Internet Relay Chat It has been used in many countries around the world IRC is a multi-user chat system where people meet on channels (rooms virtual places usually with a certain topic of conversation) to talk in groups or privately There is no restriction to the number of people that can participate in a given discussion or the number of channels that can be formed on IRC

B17 NewsgroupsThe Internet has a place where we can gather question and discuss our experiences within a wide variety of topics Its called Usenet News Some users also call it Net NewsThink of Usenet News as a giant worldwide bulletin board Anyone can freely post something on this bulletin board Everyone else can read the posted items and add their own items These voluntary contributions and free exchange of information are the foundation of the Internet

B18 Voice over IPVoice over IP (Voice over Internet Protocol or VoIP) technology converts voice calls from analog to digital to be sent over digital data networks In Voice over IP or VoIP voice data and video all travel along the network

B19 World Wide Web (WWW)The newest information application on the Internet the WWW provides standardized access to Gopher FTP Telnet and more by means of home pages designed either by institutions or

b individuals By means of the HyperText Markup Language (HTML) it allows users to point at highlighted terms following links to whatever information interests them It is a multimedia environment allowing Internet users access to audio and video materials There are a number of client software packages (or browsers) including Lynx (a textonly browser) Netscape and Microsofts Internet Explorer (which are multimedia browsers)

C Types of Internet Connection

C1 Types of Internet connections

The options for providing user connectivity to the Internet are given below

1 Terminal DialupModem (Shell connection)1048707 Most common option1048707 User requirements limited to modem and communications software1048707 Text-only access1048707 Shell accounts were more popular before the advent of the Web A shell account lets

you use your computer much as if it were a virtual console associated with a remote computer You can type commands which are interpreted by the remote computer and view the resulting output on your computer Although a few web browsers such as Lynx can operate via a shell account they donrsquot generally support the highly graphical multimedia pages which web surfers have come to expect

2 SLIP (Serial Line Internet Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software SLIP software amp software for Internet

applications1048707 Multimedia access

3 PPP (Point-to-Point Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software PPP software amp software for Internet

applications1048707 Multimedia access1048707 While your computer is connected to the Internet you can use it to surf the Web with

your favorite browser If your ISP allows you can even run a web server providing pages that can be viewed by others around the world

4 ISDN (Integrated Services Digital Network)1048707 Most often used to connect remote telecommuters to office LANs1048707 Requires ISDN phone line access1048707 Faster than analog terminal dialupmodem service

1048707 User must have ISDN phone line ISDN card communications software TCP software amp SLIP or PPP software multimedia connectivity

5 DIAS1048707 The DIAS offers a wire-line solution for high speed symmetrical Internet access on the

existing telephone lines It provides an always on internet access that is permanently available at customers premises DIAS combines voice and internet data packets on a single twisted pair wire at subscriber premises that means you can use telephone and surf internet at the same time

6 Cable Modem1048707 The term ldquoCable Modemrdquo is quite new and refers to a modem that operates over the

ordinary cable TV network cables Basically you just connect the Cable Modem to the TV outlet for your cable TV and the cable TV operator connects a Cable Modem Termination System (CMTS) in his end (the Head-End)

1048707 Actually the term ldquoCable Modemrdquo is a bit misleading as a Cable Modem works more like a Local Area Network (LAN) interface than as a modem

1048707 In a cable TV system signals from the various channels are each given a 6-MHz slice of the cablersquos available bandwidth and then sent down the cable to your house When a cable company offers Internet access over the cable Internet information can use the same cables because the cable modem system puts downstream data ndash data sent from the Internet to an individual computer ndash into a 6-MHz channel On the cable the data looks just like a TV channel So Internet downstream data takes up the same amount of cable space as any single channel of programming Upstream data ndash information sent from an individual back to the Internet ndash requires even less of the cablersquos bandwidth just 2 MHz since the assumption is that most people download far more information than they upload

1048707 Putting both upstream and downstream data on the cable television system requires two types of equipment a cable modem on the customer end and a cable modem termination system (CMTS) at the cable providerrsquos end Between these two types of equipment all the computer networking security and management of Internet access over cable television is put into place

7 Digital Subscriber Line (DSL) connection1048707 DSL is a very high-speed connection that uses the same wires as a regular telephone

line1048707 Here are some advantages of DSL

1 You can leave your Internet connection open and still use the phone line for voice calls

2 The speed is much higher than a regular modem3 DSL doesnrsquot necessarily require new wiring it can use the phone line you

already have4 The company that offers DSL (eg BSNL) will usually provide the modem as

part of the installation1048707 But there are disadvantages

1 A DSL connection works better when you are closer to the providerrsquos central office

2 The service is not available everywhere1048707 Other types of DSL include

1 Asymmetric DSL (ADSL) line ndash The connection is faster for receiving data than it is for sending data over the Internet

2 Very high bit-rate DSL (VDSL) ndash This is a fast connection but works only over a short distance

3 Symmetric DSL (SDSL) ndash This connection used mainly by small businesses doesnrsquot allow you to use the phone at the same time but the speed of receiving and sending data is the same

4 Rate-adaptive DSL (RADSL) ndash This is a variation of ADSL but the modem can adjust the speed of the connection depending on the length and quality of the line

8 Direct Connection (Leased circuit)1048707 Most often used to connect sites within a specific organization such as a university or

business requires owning or leasing of cable (from 64 kbps to T-3) users typically connected via Ethernet LANs multimedia connectivity at its fastest

9 Satellite connections1048707 This connection allows you to download Internet files via a satellite connection This is

an efficient method for receiving large Web graphics and other items but you still need a modem connection for other features You must purchase the connection hardware as well as subscribe to the service

10 Wireless connections1048707 Pagers cellular phones and personal digital assistants (PDAs) now allow varying levels

of Internet access from notification of E-mail to limited Web connections Many of these services remain in the experimental stage The PPP connection is called as TCPIP connection or PSTN dial-up connection ISDN connection is called as ISDN dial-up connection Cable Modem DSL and Direct Connection are always-on connection The words ldquoconnectionrdquo and ldquoaccountrdquo related to Internet are interchangeable

D Computer Virus

The Internet just like the rest of the world is not a perfectly safe place to visit If you download files from the Internet there is a chance a very small chance but nonetheless a chance that your computer could become infected with a virus

Viruses are malicious programs that invade your computer They can cause many different kinds of damage such as deleting data files erasing programs or destroying

everything they find on your hard disk Not every virus causes damage some simply flash annoying messages

Different Types of Computer VirusesThere are Different Types of Computer Viruses could be classified in

(origin techniques types of files they infect where they hide the kind of damage they cause the type of operating system or platform they attack) etc Let us have a look at themhellip

Computer Virus is a kind of malicious software written intentionally to enter a computer without the userrsquos permission or knowledge with an ability to replicate itself thus continuing to spread Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system A virus should never be assumed harmless and left on a system Most common types of viruses are mentioned below

Resident VirusesThis type of virus is a permanent which dwells in the RAM memory From

there it can overcome and interrupt all of the operations executed by the system corrupting files and programs that are opened closed copied renamed etc

Examples include Randex CMJ Meve and MrKlunky

Direct Action VirusesThe main purpose of this virus is to replicate and take action when it is

executed When a specific condition is met the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXECBAT file PATH This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted

Overwrite VirusesVirus of this kind is characterized by the fact that it deletes the information

contained in the files that it infects rendering them partially or totally useless once they have been infected

The only way to clean a file infected by an overwrite virus is to delete the file completely thus losing the original content

Examples of this virus include Way TrjReboot Trivial88D

Boot Virus

This type of virus affects the boot sector of a floppy or hard disk This is a crucial part of a disk in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive

Examples of boot viruses include PolybootB AntiEXE

Macro VirusMacro viruses infect files that are created using certain applications or

programs that contain macros These mini-programs make it possible to automate series of operations so that they are performed as a single action thereby saving the user from having to carry them out one by one

Examples of macro viruses Relax MelissaA Bablas O97MY2K

Directory VirusDirectory viruses change the paths that indicate the location of a file By

executing a program (file with the extension EXE or COM) which has been infected by a virus you are unknowingly running the virus program while the original file and program have been previously moved by the virus

Once infected it becomes impossible to locate the original files

Polymorphic VirusPolymorphic viruses encrypt or encode themselves in a different way

(using different algorithms and encryption keys) every time they infect a system

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves

Examples include Elkern Marburg Satan Bug and Tuareg

File InfectorsThis type of virus infects programs or executable files (files with an EXE

or COM extension) When one of these programs is run directly or indirectly the virus is activated producing the damaging effects it is programmed to carry out The majority of existing viruses belong to this category and can be classified depending on the actions that they carry out

Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types They are known as companion viruses because once they get into the system they accompany the other files that already exist In other words in order to carry out their infection routines companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses)

Some examples include Stator Asimov1539 and Terrax1069

FAT VirusThe file allocation table or FAT is the part of a disk used to connect

information and is a vital part of the normal functioning of the computerThis type of virus attack can be especially dangerous by preventing access to certain sections of the disk where important files are stored Damage caused can result in information losses from individual files or even entire directories

WormsA worm is a program very similar to a virus it has the ability to self-

replicate and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses

Examples of worms include PSWBugbearB LovgateF TrileC SobigD Mapson

Trojans or Trojan HorsesAnother unsavory breed of malicious code are Trojans or Trojan horses

which unlike viruses do not reproduce by infecting other files nor do they self-replicate like worms

Logic BombsThey are not considered viruses because they do not replicate They are not

even programs in their own right but rather camouflaged segments of other programs

Their objective is to destroy data on the computer once certain conditions have been met Logic bombs go undetected until launched and the results can be destructive

E How Do You Stay Safe On The Internet

The first part of the answer to the question How do you stay safe on the Internet is know what the threats are that you and your computer are up against

Without this knowledge how are you going to know youve got everything covered off Do you just rely on what the security software vendors tell you to spend your money on

By being aware of what the risks are I suggest you will save yourself money and have more effective protection when it comes to the second part of the answer to the question How do you stay safe on the Internet selecting effective prevention and protection to guard privacy and online security

To help you decide what is necessary for your particular protection in The Three Levels Of Internet Risk Protection I talk about the safe practices that help protect your computer and the types of software to use -- from those that are absolutely essential for security to others which you may want to install to guard privacy to the level you desire

But back to this article How Do You Stay Safe On The Internet here Ill provide you with an introduction to each type of threat At the end of it youll have a good feel for the dangers on the Internet and how those threats can affect you your PC and your information be it personal financial family or business

There are ten of the most prevalent threats covered here Either go through them all or click on the links below for those you are particularly interested in

1 Viruses and Worms 2 Trojan Horses 3 Rootkits 4 Crackers and Hackers 5 Spam 6 Web Bugs 7 Child Security 8 Pop-UpUnder Ads 9 Tracking Cookies 10 Spyware

By the way Ive tried to keep the technical language simple but if you dont understand some of the terms check them out at Netlingo which provides definitions and explanations for all Net terminology

1 Viruses And Worms

What Is A VirusA virus is a man-made computer program that infects a file or program on our computers Each time the infected program is run the virus is also triggered It spreads itself by infecting other programs on the same computer

What Is A WormA worm is also a man-made program that replicates itself However unlike a virus it does not infect other program files on the computer Instead a worm spreads itself automatically to other computers through email over a network and via Internet Relay Chat (IRC)

How Do We Get InfectedViruses and worms can infect desktop computers laptops and network servers and reach our PCs from email web sites downloaded files and loadable media (eg floppy disks CD-ROMs and DVDs)

How Does A Virus Or Worm Infection Affect UsUnfortunately the effects of an infection are pretty unpleasant The virus or worm can

Disable the computer

Add modify or delete files or reformat the hard disk

Steal addresses held in our computer to send on virus-infected emails to our friends colleagues clients or customers

Send unsolicited bulk email (spam) to those in our mail address books and other users

2 Trojan Horses

What Is A Trojan HorseAlthough Trojan horse programs are categorized as viruses they are not true viruses since they do not replicate But like viruses they are one of the most destructive of the Internet risks covered in How Do You Stay Safe On The Internet and are favored by crackers and spyware writers

How Do We Get InfectedTrojans are one of the sneakiest of the online risks They are often downloaded on the back of a free program (freeware) that has some value to the user -- a free game software program or music for instance

How Does A Trojan Infection Affect Us

A Trojan installed on a computer allows that PC to be entered via a backdoor by any remote user that has the access code to the Trojan

The remote attacker can enter the computer undetected when the user is online to access or destroy any information stored Alternatively the Trojan can be programmed to automatically send any information on our PCs back to the attacker This could include

Client or customer information or other business data

Credit card details

Passwords for access to your online bank ISP or web services

Information you would rather remain hidden

Email addresses which may be used for spamming

Childrens names photographs ages or other personal details held on the computer

Distributed Denial of Service (DDOS) attack on other computers via the victims computer

No wonder we ask how do you stay safe on the Internet

3 How Do You Stay Safe On The InternetRootkitsWhat Is A RootkitRootkits are not destructive in their own right but they are designed to conceal the presence of malicious programs on a computer

How Do We Get InfectedAs with any malware such as viruses worms Trojans and spyware rootkits get onto our computers by various means such as through spam attachments being opened on the back of free downloads or planted by crackers who have breached computer defenses

How Does A Rootkit Affect UsRootkits are there for one reason only to ensure that an intruder can access our system and take control without detection by defenses to guard privacy and security

One of the most common and worrying uses of rootkits which causes us to ask How Do You Stay Safe On The Internet is to launch spam and denial of service (DOS) attacks against other computers or networks Another use of

rootkits is to hide Trojans so an intruder can easily use it to extract data from your computer as mentioned above

4 Crackers And Hackers

What Is A HackerCrackerThe term hacker is a misused term We should really be referring to a cracker to describe those who break security on a computer system

The original term hacker refers to computer enthusiasts who enjoy learning everything about a computer system

How Do We Get AttackedCrackers run programs that scan computer ports over the Internet to work out which ports are accessible If our computer shows up in one of these scans the cracker may decide to enter our PC

Crackers favorite targets are the home and home office computers connected by broadband to the Internet because the connection is always open there is more opportunity to locate these computers with their scanners

Alternatively crackers may just exploit weaknesses that have not been patched in the computers operating system in order to gain entry As discussed above Trojans are another way crackers use to gain access to our PCs

How Does A Cracker Affect UsBesides the potentially valuable information they can obtain from our PCs such as that listed under Trojans these intruders also want our hard disk space and Internet connection With these resources they can use our computers to send out spam or attack other computers on the Internet and all this can be done without our knowledge Another reason why we should know how do you stay safe on the Internet

5 Spam -- Unsolicited Email

What Is SpamSpam is defined in Dictionarycom as Unsolicited e-mail often of a commercial nature sent indiscriminately to multiple mailing lists individuals or newsgroups junk e-mail

Spammers peddle pornography sexual aids diet pills and get-rich-quick schemes in fact anything that has a perceived value

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

While the T3 lines were being constructed the Department of Defense disbanded the ARPANET and it was replaced by the NSFNET backbone The original 50Kbs lines of ARPANET were taken out of service

Tim Berners-Lee and CERN in Geneva implements a hypertext system to provide efficient information access to the members of the international high-energy physics communityBackbones 56Kbps CSNET 1544Mbps (T1) NSFNET plus satellite and radio connections - Hosts 313000

1991CSNET (which consisted of 56Kbps lines) was discontinued having fulfilled its important early role in the provision of academic networking service A key feature of CREN is that its operational costs are fully met through dues paid by its member organizations

The NSF established a new network named NREN the National Research and Education Network The purpose of this network is to conduct high speed networking research It was not to be used as a commercial network nor was it to be used to send a lot of the data that the Internet now transfersBackbones Partial 45Mbps (T3) NSFNET a few private backbones plus satellite and radio connections - Hosts 617000

1992 Internet Society is chartered

World-Wide Web released by CERNNSFNET backbone upgraded to T3 (44736Mbps)Backbones 45Mbps (T3) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps plus satellite and radio connections - Hosts 1136000

1993 InterNIC created by NSF to provide specific Internet services directory and database services (by ATampT) registration services (by Network Solutions Inc) and information services (by General AtomicsCERFnet)

Marc Andreessen and NCSA and the University of Illinois develops a graphical user interface to the WWW called Mosaic for XBackbones 45Mbps (T3) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps and 45Mpbs lines plus satellite and radio connections - Hosts 2056000

1994 No major changes were made to the physical network The most significant thing that happened was the growth Many new networks were added to the NSF backbone Hundreds of thousands of new hosts were added to the INTERNET during this time period

Pizza Hut offers pizza ordering on its Web page

First Virtual the first cyberbank opens

ATM (Asynchronous Transmission Mode 145Mbps) backbone is installed on NSFNETBackbones 145Mbps (ATM) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps and 45Mpbs lines plus satellite and radio connections - Hosts 3864000

1995 The National Science Foundation announced that as of April 30 1995 it would no longer allow direct access to the NSF backbone The National Science Foundation contracted with four companies that would be providers of access to the NSF backbone (Merit) These companies would then sell connections to groups organizations and companies

$50 annual fee is imposed on domains excluding edu and gov domains which are still funded by the National Science FoundationBackbones 145Mbps (ATM) NSFNET (now private) private interconnected backbones consisting mainly of 56Kbps 1544Mbps 45Mpbs 155Mpbs lines in construction plus satellite and radio connections - Hosts 6642000

1996 Most Internet traffic is carried by backbones of independent ISPs including MCI ATampT Sprint UUnet BBN planet ANS and more

The Internet Society the group that controls the INTERNET researches new TCPIP technology that will be able to have more than the approximately 43 billion addresses currently available The problem that has arisen is that it is not known how both the old and the new addressing systems will be able to work at the same time during a transition period

Internet2 is established

(Backbone data below was valid in 1996 please seek other references for current backbone and host data as it is constantly expanded)Backbones 145Mbps (ATM) NSFNET (now private) private interconnected backbones consisting mainly of 56Kbps 1544Mbps 45Mpbsand 155Mpbs lines plus satellite and radio connections - Hosts over 15000000 and growing rapidly

The Present and The Future

A new technology recommendation called IPv6 is suggested to replace the current IPv4 technology IPv4 allows for fewer than 43 billion directly connected Internet devices problematic because the world population (as of 2009) is well over 65 billion (theoretically if ever human had a computer and mobile phone wed need 13 billion addresses which is something IPv6 can easily accomplish)

In 1999 a wireless technology called 80211b more commonly referred to as Wi-Fi is standardized Over the years that follow this technology begins appearing as a built-in feature of portable computers and many handheld devices

In 2005 the One Laptop Per Child project begins In an attempt to provide low cost education-designed laptops to children around the world for a low cost (US$100 per unit) this project helps spark the netbook industry Netbooks are small portable computers with extended battery life and built-in Wi-Fi connectivity

Multi-touch technology begins to appear in handheld devices tablet computers and netbooks This technology supplements traditional touch-screen technology by allowing advanced gesturing (several fingers moving on a screen instead of just one) Multi-touch technology is seen as a possible alternative to traditional keyboard and mouse (touchpad) systems

Read Bill Buxtons Overview and History of Multi-Touch Systems entitled Multi-Touch Systems that I Have Known and Loved

In December 2009 the first multi-touch website is reported

B2 Overview of InternetThe Internet is a global computer network made up of smaller computer networks

it hasbeen called a Network of NetworksThese smaller networks include1048707 Local Area Networks (like networked offices or computer labs and campus-wide

networks)1048707 Wide Area Networks (like city-wide networks)1048707 State and Regional Networks (including regional service providers and others)1048707 National and International Networks

There is no one inventor of the Internet The Internet was created in the 1960s as a huge network linking big university and government computers The science behind the Internet was invented during the Cold War when the United States was in competition against Russia for weapons and technology So the Internet is actually pretty oldmdasharound forty years Much of Internetrsquos initial development was supported by American governmental research and network development (beginning with the American militarys ARPANET in 1969)In fact email has been around since 1972 In 1989 that Tim Berners-Lee a scientist at the European Laboratory for Particle Physics in Geneva proposed the World Wide Web Now Internet Service Providers (ISPs) offer Internet access to their clients at costs ranging from Rs 150- per 6 months to hundreds of rupees per year depending on the types of service they offer

II What people do when surfing People usually get to surfing to internet to do things that are complicated

for them They do a short time for them while surfing depends from the user surfing is the very easiest thing to search for what you want to know

Surfing is one where you can get information access to an educational learning where you can also communicate for an entertainment or an Personal Information

Surfing is one of the easiest way of sharing files and document or any personal data

I1 Surfing is build for a network and made up of organization

i Communication ii Education

iii Business managements Commercial Company iv Government v Private Organization

vi Entertainment

I2 What are the uses of the Internet

There are three fundamental uses of the Internet Communication Information Retrieval Presentation of Information

Communication The Internet is used both for one-to-one communications (email and real-time chat

programs) and one-to-many

Information Retrieval The Internet allows access to public domain information bibliographic databases

libraries and entertainment services as well as to proprietary information services

Presentation of Information Any organization connected to the Internet can provide access to its own in-house

information (library catalogs faculty information etc) to millions of people world-wide Individuals can also develop and provide their own information packages via their own

home pages

II Terms and Web PoliciesObjectives

To know the resources of internet Navigate around the web using Internet Explorer To know what internet services we have To know what is the risk when your online Define the World Wide Web Explain the work of the Domain Name Service Explain the difference between IP address and domain name How to protect and stay safe online

A Internet Addresses

Every computer file of information and person on the Internet is identified by a unique address

A1 Computer AddressesComputer addresses are made up of three parts (or in some cases two parts) separated

by dots like this computer-nameinstitutiondomain

The computer name is a name given locally to identify a particular computer it is in some cases omitted from the address The institution name is the name (or an abbreviation) of the name of the school company or other institution housing the computer The domain name specifies either the type or the geographic location of the computer

A2 Domain NamesThere are several possible domain names including some that identify the type of institution and some that identify a geographical location They include

edu Educational institutioncom Commercial and profitable organizationsorg Non-profitable organizations

net Internet infrastructure and service providersgov Governmental agencydepartmentmil American military agencyint International organizationsus United Statesin Indiamy Malaysiaca Canadajp Japanbiz Businessaero Aeronautics

A3 Personal Addresses

A persons address (or their email address) places the users username (or login) and the symbol before the computer address For example a user whose username is creator who is accessing email from the yahoo server of United State Yahoo Website would have the following address creatoryahoocom

B Internet Services

B1 Internet Services

rdquoInternet servicesrdquo serve more sophisticated and multi-purpose purposes and increasingly make the Internet a truly useful information resource

B11 EmailIt is the Internets version of the postal service Using the Internet it provides the ability to send a message reply to a message send a file created in another program andor even send the same message to a group of people Some benefits of Email arebull Speed A message can be sent from Chennai to Australia in a matter of secondsbull Cost Emails are cheap You are usually only charged for the telephone call time (local call rate) for sending the message into the Internet and not the cost associated with transferring the message across the Internetbull Flexibility It is easy to send duplicates of your messages to other people or groups for the cost of a single messagebull Record keeping Messages sent and received can be easily stored for future referenceIn order to use Email you will need Internet access arranged through an InternetService Provider (ISP) who will allocate you one or a number of Email accounts To be able to retrieve and send mail from these addresses a user will need what is known as Email client software and your ISP usually provides this although nowadays most computers come with it pre-installed

B12 Mail Lists

These use email to support discussion groups on a wide range of specific subjectsOnce you are becoming a subscriber of a mailing list you will receive lot of emails related to the subject covered by the mailing list

B13 FTPFTP was the original Internet mechanism for the storage and retrieval of information There are still many FTP Sites around the Internet although many of them have been melded into the World Wide Web In computer science FTP stands for File Transfer Protocol which is a way of transferring files between computers A file can be anything -- a spreadsheet a word document a song or a picture When someone says Please FTP me that file for instance that means Please transfer that file from your computer to mine To FTP you usually need to download a special program or application You also usually need a password to be able to access or send information to someone elses computer

B14 GopherGopher was developed at the University of Minnesota primarily to support its own Campus Wide Information Server (CWIS) It provides access to information available either locally or elsewhere on the Internet by means of a simple series of uniformly designed menus

B15 Instant Messaging (IM)There are lots of other fun and useful IM features you can explore like group chats file transfers voice calls video conferencing and emoticons that reflect your mood

B16 IRCIRC stands for Internet Relay Chat It has been used in many countries around the world IRC is a multi-user chat system where people meet on channels (rooms virtual places usually with a certain topic of conversation) to talk in groups or privately There is no restriction to the number of people that can participate in a given discussion or the number of channels that can be formed on IRC

B17 NewsgroupsThe Internet has a place where we can gather question and discuss our experiences within a wide variety of topics Its called Usenet News Some users also call it Net NewsThink of Usenet News as a giant worldwide bulletin board Anyone can freely post something on this bulletin board Everyone else can read the posted items and add their own items These voluntary contributions and free exchange of information are the foundation of the Internet

B18 Voice over IPVoice over IP (Voice over Internet Protocol or VoIP) technology converts voice calls from analog to digital to be sent over digital data networks In Voice over IP or VoIP voice data and video all travel along the network

B19 World Wide Web (WWW)The newest information application on the Internet the WWW provides standardized access to Gopher FTP Telnet and more by means of home pages designed either by institutions or

b individuals By means of the HyperText Markup Language (HTML) it allows users to point at highlighted terms following links to whatever information interests them It is a multimedia environment allowing Internet users access to audio and video materials There are a number of client software packages (or browsers) including Lynx (a textonly browser) Netscape and Microsofts Internet Explorer (which are multimedia browsers)

C Types of Internet Connection

C1 Types of Internet connections

The options for providing user connectivity to the Internet are given below

1 Terminal DialupModem (Shell connection)1048707 Most common option1048707 User requirements limited to modem and communications software1048707 Text-only access1048707 Shell accounts were more popular before the advent of the Web A shell account lets

you use your computer much as if it were a virtual console associated with a remote computer You can type commands which are interpreted by the remote computer and view the resulting output on your computer Although a few web browsers such as Lynx can operate via a shell account they donrsquot generally support the highly graphical multimedia pages which web surfers have come to expect

2 SLIP (Serial Line Internet Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software SLIP software amp software for Internet

applications1048707 Multimedia access

3 PPP (Point-to-Point Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software PPP software amp software for Internet

applications1048707 Multimedia access1048707 While your computer is connected to the Internet you can use it to surf the Web with

your favorite browser If your ISP allows you can even run a web server providing pages that can be viewed by others around the world

4 ISDN (Integrated Services Digital Network)1048707 Most often used to connect remote telecommuters to office LANs1048707 Requires ISDN phone line access1048707 Faster than analog terminal dialupmodem service

1048707 User must have ISDN phone line ISDN card communications software TCP software amp SLIP or PPP software multimedia connectivity

5 DIAS1048707 The DIAS offers a wire-line solution for high speed symmetrical Internet access on the

existing telephone lines It provides an always on internet access that is permanently available at customers premises DIAS combines voice and internet data packets on a single twisted pair wire at subscriber premises that means you can use telephone and surf internet at the same time

6 Cable Modem1048707 The term ldquoCable Modemrdquo is quite new and refers to a modem that operates over the

ordinary cable TV network cables Basically you just connect the Cable Modem to the TV outlet for your cable TV and the cable TV operator connects a Cable Modem Termination System (CMTS) in his end (the Head-End)

1048707 Actually the term ldquoCable Modemrdquo is a bit misleading as a Cable Modem works more like a Local Area Network (LAN) interface than as a modem

1048707 In a cable TV system signals from the various channels are each given a 6-MHz slice of the cablersquos available bandwidth and then sent down the cable to your house When a cable company offers Internet access over the cable Internet information can use the same cables because the cable modem system puts downstream data ndash data sent from the Internet to an individual computer ndash into a 6-MHz channel On the cable the data looks just like a TV channel So Internet downstream data takes up the same amount of cable space as any single channel of programming Upstream data ndash information sent from an individual back to the Internet ndash requires even less of the cablersquos bandwidth just 2 MHz since the assumption is that most people download far more information than they upload

1048707 Putting both upstream and downstream data on the cable television system requires two types of equipment a cable modem on the customer end and a cable modem termination system (CMTS) at the cable providerrsquos end Between these two types of equipment all the computer networking security and management of Internet access over cable television is put into place

7 Digital Subscriber Line (DSL) connection1048707 DSL is a very high-speed connection that uses the same wires as a regular telephone

line1048707 Here are some advantages of DSL

1 You can leave your Internet connection open and still use the phone line for voice calls

2 The speed is much higher than a regular modem3 DSL doesnrsquot necessarily require new wiring it can use the phone line you

already have4 The company that offers DSL (eg BSNL) will usually provide the modem as

part of the installation1048707 But there are disadvantages

1 A DSL connection works better when you are closer to the providerrsquos central office

2 The service is not available everywhere1048707 Other types of DSL include

1 Asymmetric DSL (ADSL) line ndash The connection is faster for receiving data than it is for sending data over the Internet

2 Very high bit-rate DSL (VDSL) ndash This is a fast connection but works only over a short distance

3 Symmetric DSL (SDSL) ndash This connection used mainly by small businesses doesnrsquot allow you to use the phone at the same time but the speed of receiving and sending data is the same

4 Rate-adaptive DSL (RADSL) ndash This is a variation of ADSL but the modem can adjust the speed of the connection depending on the length and quality of the line

8 Direct Connection (Leased circuit)1048707 Most often used to connect sites within a specific organization such as a university or

business requires owning or leasing of cable (from 64 kbps to T-3) users typically connected via Ethernet LANs multimedia connectivity at its fastest

9 Satellite connections1048707 This connection allows you to download Internet files via a satellite connection This is

an efficient method for receiving large Web graphics and other items but you still need a modem connection for other features You must purchase the connection hardware as well as subscribe to the service

10 Wireless connections1048707 Pagers cellular phones and personal digital assistants (PDAs) now allow varying levels

of Internet access from notification of E-mail to limited Web connections Many of these services remain in the experimental stage The PPP connection is called as TCPIP connection or PSTN dial-up connection ISDN connection is called as ISDN dial-up connection Cable Modem DSL and Direct Connection are always-on connection The words ldquoconnectionrdquo and ldquoaccountrdquo related to Internet are interchangeable

D Computer Virus

The Internet just like the rest of the world is not a perfectly safe place to visit If you download files from the Internet there is a chance a very small chance but nonetheless a chance that your computer could become infected with a virus

Viruses are malicious programs that invade your computer They can cause many different kinds of damage such as deleting data files erasing programs or destroying

everything they find on your hard disk Not every virus causes damage some simply flash annoying messages

Different Types of Computer VirusesThere are Different Types of Computer Viruses could be classified in

(origin techniques types of files they infect where they hide the kind of damage they cause the type of operating system or platform they attack) etc Let us have a look at themhellip

Computer Virus is a kind of malicious software written intentionally to enter a computer without the userrsquos permission or knowledge with an ability to replicate itself thus continuing to spread Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system A virus should never be assumed harmless and left on a system Most common types of viruses are mentioned below

Resident VirusesThis type of virus is a permanent which dwells in the RAM memory From

there it can overcome and interrupt all of the operations executed by the system corrupting files and programs that are opened closed copied renamed etc

Examples include Randex CMJ Meve and MrKlunky

Direct Action VirusesThe main purpose of this virus is to replicate and take action when it is

executed When a specific condition is met the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXECBAT file PATH This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted

Overwrite VirusesVirus of this kind is characterized by the fact that it deletes the information

contained in the files that it infects rendering them partially or totally useless once they have been infected

The only way to clean a file infected by an overwrite virus is to delete the file completely thus losing the original content

Examples of this virus include Way TrjReboot Trivial88D

Boot Virus

This type of virus affects the boot sector of a floppy or hard disk This is a crucial part of a disk in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive

Examples of boot viruses include PolybootB AntiEXE

Macro VirusMacro viruses infect files that are created using certain applications or

programs that contain macros These mini-programs make it possible to automate series of operations so that they are performed as a single action thereby saving the user from having to carry them out one by one

Examples of macro viruses Relax MelissaA Bablas O97MY2K

Directory VirusDirectory viruses change the paths that indicate the location of a file By

executing a program (file with the extension EXE or COM) which has been infected by a virus you are unknowingly running the virus program while the original file and program have been previously moved by the virus

Once infected it becomes impossible to locate the original files

Polymorphic VirusPolymorphic viruses encrypt or encode themselves in a different way

(using different algorithms and encryption keys) every time they infect a system

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves

Examples include Elkern Marburg Satan Bug and Tuareg

File InfectorsThis type of virus infects programs or executable files (files with an EXE

or COM extension) When one of these programs is run directly or indirectly the virus is activated producing the damaging effects it is programmed to carry out The majority of existing viruses belong to this category and can be classified depending on the actions that they carry out

Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types They are known as companion viruses because once they get into the system they accompany the other files that already exist In other words in order to carry out their infection routines companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses)

Some examples include Stator Asimov1539 and Terrax1069

FAT VirusThe file allocation table or FAT is the part of a disk used to connect

information and is a vital part of the normal functioning of the computerThis type of virus attack can be especially dangerous by preventing access to certain sections of the disk where important files are stored Damage caused can result in information losses from individual files or even entire directories

WormsA worm is a program very similar to a virus it has the ability to self-

replicate and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses

Examples of worms include PSWBugbearB LovgateF TrileC SobigD Mapson

Trojans or Trojan HorsesAnother unsavory breed of malicious code are Trojans or Trojan horses

which unlike viruses do not reproduce by infecting other files nor do they self-replicate like worms

Logic BombsThey are not considered viruses because they do not replicate They are not

even programs in their own right but rather camouflaged segments of other programs

Their objective is to destroy data on the computer once certain conditions have been met Logic bombs go undetected until launched and the results can be destructive

E How Do You Stay Safe On The Internet

The first part of the answer to the question How do you stay safe on the Internet is know what the threats are that you and your computer are up against

Without this knowledge how are you going to know youve got everything covered off Do you just rely on what the security software vendors tell you to spend your money on

By being aware of what the risks are I suggest you will save yourself money and have more effective protection when it comes to the second part of the answer to the question How do you stay safe on the Internet selecting effective prevention and protection to guard privacy and online security

To help you decide what is necessary for your particular protection in The Three Levels Of Internet Risk Protection I talk about the safe practices that help protect your computer and the types of software to use -- from those that are absolutely essential for security to others which you may want to install to guard privacy to the level you desire

But back to this article How Do You Stay Safe On The Internet here Ill provide you with an introduction to each type of threat At the end of it youll have a good feel for the dangers on the Internet and how those threats can affect you your PC and your information be it personal financial family or business

There are ten of the most prevalent threats covered here Either go through them all or click on the links below for those you are particularly interested in

1 Viruses and Worms 2 Trojan Horses 3 Rootkits 4 Crackers and Hackers 5 Spam 6 Web Bugs 7 Child Security 8 Pop-UpUnder Ads 9 Tracking Cookies 10 Spyware

By the way Ive tried to keep the technical language simple but if you dont understand some of the terms check them out at Netlingo which provides definitions and explanations for all Net terminology

1 Viruses And Worms

What Is A VirusA virus is a man-made computer program that infects a file or program on our computers Each time the infected program is run the virus is also triggered It spreads itself by infecting other programs on the same computer

What Is A WormA worm is also a man-made program that replicates itself However unlike a virus it does not infect other program files on the computer Instead a worm spreads itself automatically to other computers through email over a network and via Internet Relay Chat (IRC)

How Do We Get InfectedViruses and worms can infect desktop computers laptops and network servers and reach our PCs from email web sites downloaded files and loadable media (eg floppy disks CD-ROMs and DVDs)

How Does A Virus Or Worm Infection Affect UsUnfortunately the effects of an infection are pretty unpleasant The virus or worm can

Disable the computer

Add modify or delete files or reformat the hard disk

Steal addresses held in our computer to send on virus-infected emails to our friends colleagues clients or customers

Send unsolicited bulk email (spam) to those in our mail address books and other users

2 Trojan Horses

What Is A Trojan HorseAlthough Trojan horse programs are categorized as viruses they are not true viruses since they do not replicate But like viruses they are one of the most destructive of the Internet risks covered in How Do You Stay Safe On The Internet and are favored by crackers and spyware writers

How Do We Get InfectedTrojans are one of the sneakiest of the online risks They are often downloaded on the back of a free program (freeware) that has some value to the user -- a free game software program or music for instance

How Does A Trojan Infection Affect Us

A Trojan installed on a computer allows that PC to be entered via a backdoor by any remote user that has the access code to the Trojan

The remote attacker can enter the computer undetected when the user is online to access or destroy any information stored Alternatively the Trojan can be programmed to automatically send any information on our PCs back to the attacker This could include

Client or customer information or other business data

Credit card details

Passwords for access to your online bank ISP or web services

Information you would rather remain hidden

Email addresses which may be used for spamming

Childrens names photographs ages or other personal details held on the computer

Distributed Denial of Service (DDOS) attack on other computers via the victims computer

No wonder we ask how do you stay safe on the Internet

3 How Do You Stay Safe On The InternetRootkitsWhat Is A RootkitRootkits are not destructive in their own right but they are designed to conceal the presence of malicious programs on a computer

How Do We Get InfectedAs with any malware such as viruses worms Trojans and spyware rootkits get onto our computers by various means such as through spam attachments being opened on the back of free downloads or planted by crackers who have breached computer defenses

How Does A Rootkit Affect UsRootkits are there for one reason only to ensure that an intruder can access our system and take control without detection by defenses to guard privacy and security

One of the most common and worrying uses of rootkits which causes us to ask How Do You Stay Safe On The Internet is to launch spam and denial of service (DOS) attacks against other computers or networks Another use of

rootkits is to hide Trojans so an intruder can easily use it to extract data from your computer as mentioned above

4 Crackers And Hackers

What Is A HackerCrackerThe term hacker is a misused term We should really be referring to a cracker to describe those who break security on a computer system

The original term hacker refers to computer enthusiasts who enjoy learning everything about a computer system

How Do We Get AttackedCrackers run programs that scan computer ports over the Internet to work out which ports are accessible If our computer shows up in one of these scans the cracker may decide to enter our PC

Crackers favorite targets are the home and home office computers connected by broadband to the Internet because the connection is always open there is more opportunity to locate these computers with their scanners

Alternatively crackers may just exploit weaknesses that have not been patched in the computers operating system in order to gain entry As discussed above Trojans are another way crackers use to gain access to our PCs

How Does A Cracker Affect UsBesides the potentially valuable information they can obtain from our PCs such as that listed under Trojans these intruders also want our hard disk space and Internet connection With these resources they can use our computers to send out spam or attack other computers on the Internet and all this can be done without our knowledge Another reason why we should know how do you stay safe on the Internet

5 Spam -- Unsolicited Email

What Is SpamSpam is defined in Dictionarycom as Unsolicited e-mail often of a commercial nature sent indiscriminately to multiple mailing lists individuals or newsgroups junk e-mail

Spammers peddle pornography sexual aids diet pills and get-rich-quick schemes in fact anything that has a perceived value

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

First Virtual the first cyberbank opens

ATM (Asynchronous Transmission Mode 145Mbps) backbone is installed on NSFNETBackbones 145Mbps (ATM) NSFNET private interconnected backbones consisting mainly of 56Kbps 1544Mbps and 45Mpbs lines plus satellite and radio connections - Hosts 3864000

1995 The National Science Foundation announced that as of April 30 1995 it would no longer allow direct access to the NSF backbone The National Science Foundation contracted with four companies that would be providers of access to the NSF backbone (Merit) These companies would then sell connections to groups organizations and companies

$50 annual fee is imposed on domains excluding edu and gov domains which are still funded by the National Science FoundationBackbones 145Mbps (ATM) NSFNET (now private) private interconnected backbones consisting mainly of 56Kbps 1544Mbps 45Mpbs 155Mpbs lines in construction plus satellite and radio connections - Hosts 6642000

1996 Most Internet traffic is carried by backbones of independent ISPs including MCI ATampT Sprint UUnet BBN planet ANS and more

The Internet Society the group that controls the INTERNET researches new TCPIP technology that will be able to have more than the approximately 43 billion addresses currently available The problem that has arisen is that it is not known how both the old and the new addressing systems will be able to work at the same time during a transition period

Internet2 is established

(Backbone data below was valid in 1996 please seek other references for current backbone and host data as it is constantly expanded)Backbones 145Mbps (ATM) NSFNET (now private) private interconnected backbones consisting mainly of 56Kbps 1544Mbps 45Mpbsand 155Mpbs lines plus satellite and radio connections - Hosts over 15000000 and growing rapidly

The Present and The Future

A new technology recommendation called IPv6 is suggested to replace the current IPv4 technology IPv4 allows for fewer than 43 billion directly connected Internet devices problematic because the world population (as of 2009) is well over 65 billion (theoretically if ever human had a computer and mobile phone wed need 13 billion addresses which is something IPv6 can easily accomplish)

In 1999 a wireless technology called 80211b more commonly referred to as Wi-Fi is standardized Over the years that follow this technology begins appearing as a built-in feature of portable computers and many handheld devices

In 2005 the One Laptop Per Child project begins In an attempt to provide low cost education-designed laptops to children around the world for a low cost (US$100 per unit) this project helps spark the netbook industry Netbooks are small portable computers with extended battery life and built-in Wi-Fi connectivity

Multi-touch technology begins to appear in handheld devices tablet computers and netbooks This technology supplements traditional touch-screen technology by allowing advanced gesturing (several fingers moving on a screen instead of just one) Multi-touch technology is seen as a possible alternative to traditional keyboard and mouse (touchpad) systems

Read Bill Buxtons Overview and History of Multi-Touch Systems entitled Multi-Touch Systems that I Have Known and Loved

In December 2009 the first multi-touch website is reported

B2 Overview of InternetThe Internet is a global computer network made up of smaller computer networks

it hasbeen called a Network of NetworksThese smaller networks include1048707 Local Area Networks (like networked offices or computer labs and campus-wide

networks)1048707 Wide Area Networks (like city-wide networks)1048707 State and Regional Networks (including regional service providers and others)1048707 National and International Networks

There is no one inventor of the Internet The Internet was created in the 1960s as a huge network linking big university and government computers The science behind the Internet was invented during the Cold War when the United States was in competition against Russia for weapons and technology So the Internet is actually pretty oldmdasharound forty years Much of Internetrsquos initial development was supported by American governmental research and network development (beginning with the American militarys ARPANET in 1969)In fact email has been around since 1972 In 1989 that Tim Berners-Lee a scientist at the European Laboratory for Particle Physics in Geneva proposed the World Wide Web Now Internet Service Providers (ISPs) offer Internet access to their clients at costs ranging from Rs 150- per 6 months to hundreds of rupees per year depending on the types of service they offer

II What people do when surfing People usually get to surfing to internet to do things that are complicated

for them They do a short time for them while surfing depends from the user surfing is the very easiest thing to search for what you want to know

Surfing is one where you can get information access to an educational learning where you can also communicate for an entertainment or an Personal Information

Surfing is one of the easiest way of sharing files and document or any personal data

I1 Surfing is build for a network and made up of organization

i Communication ii Education

iii Business managements Commercial Company iv Government v Private Organization

vi Entertainment

I2 What are the uses of the Internet

There are three fundamental uses of the Internet Communication Information Retrieval Presentation of Information

Communication The Internet is used both for one-to-one communications (email and real-time chat

programs) and one-to-many

Information Retrieval The Internet allows access to public domain information bibliographic databases

libraries and entertainment services as well as to proprietary information services

Presentation of Information Any organization connected to the Internet can provide access to its own in-house

information (library catalogs faculty information etc) to millions of people world-wide Individuals can also develop and provide their own information packages via their own

home pages

II Terms and Web PoliciesObjectives

To know the resources of internet Navigate around the web using Internet Explorer To know what internet services we have To know what is the risk when your online Define the World Wide Web Explain the work of the Domain Name Service Explain the difference between IP address and domain name How to protect and stay safe online

A Internet Addresses

Every computer file of information and person on the Internet is identified by a unique address

A1 Computer AddressesComputer addresses are made up of three parts (or in some cases two parts) separated

by dots like this computer-nameinstitutiondomain

The computer name is a name given locally to identify a particular computer it is in some cases omitted from the address The institution name is the name (or an abbreviation) of the name of the school company or other institution housing the computer The domain name specifies either the type or the geographic location of the computer

A2 Domain NamesThere are several possible domain names including some that identify the type of institution and some that identify a geographical location They include

edu Educational institutioncom Commercial and profitable organizationsorg Non-profitable organizations

net Internet infrastructure and service providersgov Governmental agencydepartmentmil American military agencyint International organizationsus United Statesin Indiamy Malaysiaca Canadajp Japanbiz Businessaero Aeronautics

A3 Personal Addresses

A persons address (or their email address) places the users username (or login) and the symbol before the computer address For example a user whose username is creator who is accessing email from the yahoo server of United State Yahoo Website would have the following address creatoryahoocom

B Internet Services

B1 Internet Services

rdquoInternet servicesrdquo serve more sophisticated and multi-purpose purposes and increasingly make the Internet a truly useful information resource

B11 EmailIt is the Internets version of the postal service Using the Internet it provides the ability to send a message reply to a message send a file created in another program andor even send the same message to a group of people Some benefits of Email arebull Speed A message can be sent from Chennai to Australia in a matter of secondsbull Cost Emails are cheap You are usually only charged for the telephone call time (local call rate) for sending the message into the Internet and not the cost associated with transferring the message across the Internetbull Flexibility It is easy to send duplicates of your messages to other people or groups for the cost of a single messagebull Record keeping Messages sent and received can be easily stored for future referenceIn order to use Email you will need Internet access arranged through an InternetService Provider (ISP) who will allocate you one or a number of Email accounts To be able to retrieve and send mail from these addresses a user will need what is known as Email client software and your ISP usually provides this although nowadays most computers come with it pre-installed

B12 Mail Lists

These use email to support discussion groups on a wide range of specific subjectsOnce you are becoming a subscriber of a mailing list you will receive lot of emails related to the subject covered by the mailing list

B13 FTPFTP was the original Internet mechanism for the storage and retrieval of information There are still many FTP Sites around the Internet although many of them have been melded into the World Wide Web In computer science FTP stands for File Transfer Protocol which is a way of transferring files between computers A file can be anything -- a spreadsheet a word document a song or a picture When someone says Please FTP me that file for instance that means Please transfer that file from your computer to mine To FTP you usually need to download a special program or application You also usually need a password to be able to access or send information to someone elses computer

B14 GopherGopher was developed at the University of Minnesota primarily to support its own Campus Wide Information Server (CWIS) It provides access to information available either locally or elsewhere on the Internet by means of a simple series of uniformly designed menus

B15 Instant Messaging (IM)There are lots of other fun and useful IM features you can explore like group chats file transfers voice calls video conferencing and emoticons that reflect your mood

B16 IRCIRC stands for Internet Relay Chat It has been used in many countries around the world IRC is a multi-user chat system where people meet on channels (rooms virtual places usually with a certain topic of conversation) to talk in groups or privately There is no restriction to the number of people that can participate in a given discussion or the number of channels that can be formed on IRC

B17 NewsgroupsThe Internet has a place where we can gather question and discuss our experiences within a wide variety of topics Its called Usenet News Some users also call it Net NewsThink of Usenet News as a giant worldwide bulletin board Anyone can freely post something on this bulletin board Everyone else can read the posted items and add their own items These voluntary contributions and free exchange of information are the foundation of the Internet

B18 Voice over IPVoice over IP (Voice over Internet Protocol or VoIP) technology converts voice calls from analog to digital to be sent over digital data networks In Voice over IP or VoIP voice data and video all travel along the network

B19 World Wide Web (WWW)The newest information application on the Internet the WWW provides standardized access to Gopher FTP Telnet and more by means of home pages designed either by institutions or

b individuals By means of the HyperText Markup Language (HTML) it allows users to point at highlighted terms following links to whatever information interests them It is a multimedia environment allowing Internet users access to audio and video materials There are a number of client software packages (or browsers) including Lynx (a textonly browser) Netscape and Microsofts Internet Explorer (which are multimedia browsers)

C Types of Internet Connection

C1 Types of Internet connections

The options for providing user connectivity to the Internet are given below

1 Terminal DialupModem (Shell connection)1048707 Most common option1048707 User requirements limited to modem and communications software1048707 Text-only access1048707 Shell accounts were more popular before the advent of the Web A shell account lets

you use your computer much as if it were a virtual console associated with a remote computer You can type commands which are interpreted by the remote computer and view the resulting output on your computer Although a few web browsers such as Lynx can operate via a shell account they donrsquot generally support the highly graphical multimedia pages which web surfers have come to expect

2 SLIP (Serial Line Internet Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software SLIP software amp software for Internet

applications1048707 Multimedia access

3 PPP (Point-to-Point Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software PPP software amp software for Internet

applications1048707 Multimedia access1048707 While your computer is connected to the Internet you can use it to surf the Web with

your favorite browser If your ISP allows you can even run a web server providing pages that can be viewed by others around the world

4 ISDN (Integrated Services Digital Network)1048707 Most often used to connect remote telecommuters to office LANs1048707 Requires ISDN phone line access1048707 Faster than analog terminal dialupmodem service

1048707 User must have ISDN phone line ISDN card communications software TCP software amp SLIP or PPP software multimedia connectivity

5 DIAS1048707 The DIAS offers a wire-line solution for high speed symmetrical Internet access on the

existing telephone lines It provides an always on internet access that is permanently available at customers premises DIAS combines voice and internet data packets on a single twisted pair wire at subscriber premises that means you can use telephone and surf internet at the same time

6 Cable Modem1048707 The term ldquoCable Modemrdquo is quite new and refers to a modem that operates over the

ordinary cable TV network cables Basically you just connect the Cable Modem to the TV outlet for your cable TV and the cable TV operator connects a Cable Modem Termination System (CMTS) in his end (the Head-End)

1048707 Actually the term ldquoCable Modemrdquo is a bit misleading as a Cable Modem works more like a Local Area Network (LAN) interface than as a modem

1048707 In a cable TV system signals from the various channels are each given a 6-MHz slice of the cablersquos available bandwidth and then sent down the cable to your house When a cable company offers Internet access over the cable Internet information can use the same cables because the cable modem system puts downstream data ndash data sent from the Internet to an individual computer ndash into a 6-MHz channel On the cable the data looks just like a TV channel So Internet downstream data takes up the same amount of cable space as any single channel of programming Upstream data ndash information sent from an individual back to the Internet ndash requires even less of the cablersquos bandwidth just 2 MHz since the assumption is that most people download far more information than they upload

1048707 Putting both upstream and downstream data on the cable television system requires two types of equipment a cable modem on the customer end and a cable modem termination system (CMTS) at the cable providerrsquos end Between these two types of equipment all the computer networking security and management of Internet access over cable television is put into place

7 Digital Subscriber Line (DSL) connection1048707 DSL is a very high-speed connection that uses the same wires as a regular telephone

line1048707 Here are some advantages of DSL

1 You can leave your Internet connection open and still use the phone line for voice calls

2 The speed is much higher than a regular modem3 DSL doesnrsquot necessarily require new wiring it can use the phone line you

already have4 The company that offers DSL (eg BSNL) will usually provide the modem as

part of the installation1048707 But there are disadvantages

1 A DSL connection works better when you are closer to the providerrsquos central office

2 The service is not available everywhere1048707 Other types of DSL include

1 Asymmetric DSL (ADSL) line ndash The connection is faster for receiving data than it is for sending data over the Internet

2 Very high bit-rate DSL (VDSL) ndash This is a fast connection but works only over a short distance

3 Symmetric DSL (SDSL) ndash This connection used mainly by small businesses doesnrsquot allow you to use the phone at the same time but the speed of receiving and sending data is the same

4 Rate-adaptive DSL (RADSL) ndash This is a variation of ADSL but the modem can adjust the speed of the connection depending on the length and quality of the line

8 Direct Connection (Leased circuit)1048707 Most often used to connect sites within a specific organization such as a university or

business requires owning or leasing of cable (from 64 kbps to T-3) users typically connected via Ethernet LANs multimedia connectivity at its fastest

9 Satellite connections1048707 This connection allows you to download Internet files via a satellite connection This is

an efficient method for receiving large Web graphics and other items but you still need a modem connection for other features You must purchase the connection hardware as well as subscribe to the service

10 Wireless connections1048707 Pagers cellular phones and personal digital assistants (PDAs) now allow varying levels

of Internet access from notification of E-mail to limited Web connections Many of these services remain in the experimental stage The PPP connection is called as TCPIP connection or PSTN dial-up connection ISDN connection is called as ISDN dial-up connection Cable Modem DSL and Direct Connection are always-on connection The words ldquoconnectionrdquo and ldquoaccountrdquo related to Internet are interchangeable

D Computer Virus

The Internet just like the rest of the world is not a perfectly safe place to visit If you download files from the Internet there is a chance a very small chance but nonetheless a chance that your computer could become infected with a virus

Viruses are malicious programs that invade your computer They can cause many different kinds of damage such as deleting data files erasing programs or destroying

everything they find on your hard disk Not every virus causes damage some simply flash annoying messages

Different Types of Computer VirusesThere are Different Types of Computer Viruses could be classified in

(origin techniques types of files they infect where they hide the kind of damage they cause the type of operating system or platform they attack) etc Let us have a look at themhellip

Computer Virus is a kind of malicious software written intentionally to enter a computer without the userrsquos permission or knowledge with an ability to replicate itself thus continuing to spread Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system A virus should never be assumed harmless and left on a system Most common types of viruses are mentioned below

Resident VirusesThis type of virus is a permanent which dwells in the RAM memory From

there it can overcome and interrupt all of the operations executed by the system corrupting files and programs that are opened closed copied renamed etc

Examples include Randex CMJ Meve and MrKlunky

Direct Action VirusesThe main purpose of this virus is to replicate and take action when it is

executed When a specific condition is met the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXECBAT file PATH This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted

Overwrite VirusesVirus of this kind is characterized by the fact that it deletes the information

contained in the files that it infects rendering them partially or totally useless once they have been infected

The only way to clean a file infected by an overwrite virus is to delete the file completely thus losing the original content

Examples of this virus include Way TrjReboot Trivial88D

Boot Virus

This type of virus affects the boot sector of a floppy or hard disk This is a crucial part of a disk in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive

Examples of boot viruses include PolybootB AntiEXE

Macro VirusMacro viruses infect files that are created using certain applications or

programs that contain macros These mini-programs make it possible to automate series of operations so that they are performed as a single action thereby saving the user from having to carry them out one by one

Examples of macro viruses Relax MelissaA Bablas O97MY2K

Directory VirusDirectory viruses change the paths that indicate the location of a file By

executing a program (file with the extension EXE or COM) which has been infected by a virus you are unknowingly running the virus program while the original file and program have been previously moved by the virus

Once infected it becomes impossible to locate the original files

Polymorphic VirusPolymorphic viruses encrypt or encode themselves in a different way

(using different algorithms and encryption keys) every time they infect a system

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves

Examples include Elkern Marburg Satan Bug and Tuareg

File InfectorsThis type of virus infects programs or executable files (files with an EXE

or COM extension) When one of these programs is run directly or indirectly the virus is activated producing the damaging effects it is programmed to carry out The majority of existing viruses belong to this category and can be classified depending on the actions that they carry out

Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types They are known as companion viruses because once they get into the system they accompany the other files that already exist In other words in order to carry out their infection routines companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses)

Some examples include Stator Asimov1539 and Terrax1069

FAT VirusThe file allocation table or FAT is the part of a disk used to connect

information and is a vital part of the normal functioning of the computerThis type of virus attack can be especially dangerous by preventing access to certain sections of the disk where important files are stored Damage caused can result in information losses from individual files or even entire directories

WormsA worm is a program very similar to a virus it has the ability to self-

replicate and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses

Examples of worms include PSWBugbearB LovgateF TrileC SobigD Mapson

Trojans or Trojan HorsesAnother unsavory breed of malicious code are Trojans or Trojan horses

which unlike viruses do not reproduce by infecting other files nor do they self-replicate like worms

Logic BombsThey are not considered viruses because they do not replicate They are not

even programs in their own right but rather camouflaged segments of other programs

Their objective is to destroy data on the computer once certain conditions have been met Logic bombs go undetected until launched and the results can be destructive

E How Do You Stay Safe On The Internet

The first part of the answer to the question How do you stay safe on the Internet is know what the threats are that you and your computer are up against

Without this knowledge how are you going to know youve got everything covered off Do you just rely on what the security software vendors tell you to spend your money on

By being aware of what the risks are I suggest you will save yourself money and have more effective protection when it comes to the second part of the answer to the question How do you stay safe on the Internet selecting effective prevention and protection to guard privacy and online security

To help you decide what is necessary for your particular protection in The Three Levels Of Internet Risk Protection I talk about the safe practices that help protect your computer and the types of software to use -- from those that are absolutely essential for security to others which you may want to install to guard privacy to the level you desire

But back to this article How Do You Stay Safe On The Internet here Ill provide you with an introduction to each type of threat At the end of it youll have a good feel for the dangers on the Internet and how those threats can affect you your PC and your information be it personal financial family or business

There are ten of the most prevalent threats covered here Either go through them all or click on the links below for those you are particularly interested in

1 Viruses and Worms 2 Trojan Horses 3 Rootkits 4 Crackers and Hackers 5 Spam 6 Web Bugs 7 Child Security 8 Pop-UpUnder Ads 9 Tracking Cookies 10 Spyware

By the way Ive tried to keep the technical language simple but if you dont understand some of the terms check them out at Netlingo which provides definitions and explanations for all Net terminology

1 Viruses And Worms

What Is A VirusA virus is a man-made computer program that infects a file or program on our computers Each time the infected program is run the virus is also triggered It spreads itself by infecting other programs on the same computer

What Is A WormA worm is also a man-made program that replicates itself However unlike a virus it does not infect other program files on the computer Instead a worm spreads itself automatically to other computers through email over a network and via Internet Relay Chat (IRC)

How Do We Get InfectedViruses and worms can infect desktop computers laptops and network servers and reach our PCs from email web sites downloaded files and loadable media (eg floppy disks CD-ROMs and DVDs)

How Does A Virus Or Worm Infection Affect UsUnfortunately the effects of an infection are pretty unpleasant The virus or worm can

Disable the computer

Add modify or delete files or reformat the hard disk

Steal addresses held in our computer to send on virus-infected emails to our friends colleagues clients or customers

Send unsolicited bulk email (spam) to those in our mail address books and other users

2 Trojan Horses

What Is A Trojan HorseAlthough Trojan horse programs are categorized as viruses they are not true viruses since they do not replicate But like viruses they are one of the most destructive of the Internet risks covered in How Do You Stay Safe On The Internet and are favored by crackers and spyware writers

How Do We Get InfectedTrojans are one of the sneakiest of the online risks They are often downloaded on the back of a free program (freeware) that has some value to the user -- a free game software program or music for instance

How Does A Trojan Infection Affect Us

A Trojan installed on a computer allows that PC to be entered via a backdoor by any remote user that has the access code to the Trojan

The remote attacker can enter the computer undetected when the user is online to access or destroy any information stored Alternatively the Trojan can be programmed to automatically send any information on our PCs back to the attacker This could include

Client or customer information or other business data

Credit card details

Passwords for access to your online bank ISP or web services

Information you would rather remain hidden

Email addresses which may be used for spamming

Childrens names photographs ages or other personal details held on the computer

Distributed Denial of Service (DDOS) attack on other computers via the victims computer

No wonder we ask how do you stay safe on the Internet

3 How Do You Stay Safe On The InternetRootkitsWhat Is A RootkitRootkits are not destructive in their own right but they are designed to conceal the presence of malicious programs on a computer

How Do We Get InfectedAs with any malware such as viruses worms Trojans and spyware rootkits get onto our computers by various means such as through spam attachments being opened on the back of free downloads or planted by crackers who have breached computer defenses

How Does A Rootkit Affect UsRootkits are there for one reason only to ensure that an intruder can access our system and take control without detection by defenses to guard privacy and security

One of the most common and worrying uses of rootkits which causes us to ask How Do You Stay Safe On The Internet is to launch spam and denial of service (DOS) attacks against other computers or networks Another use of

rootkits is to hide Trojans so an intruder can easily use it to extract data from your computer as mentioned above

4 Crackers And Hackers

What Is A HackerCrackerThe term hacker is a misused term We should really be referring to a cracker to describe those who break security on a computer system

The original term hacker refers to computer enthusiasts who enjoy learning everything about a computer system

How Do We Get AttackedCrackers run programs that scan computer ports over the Internet to work out which ports are accessible If our computer shows up in one of these scans the cracker may decide to enter our PC

Crackers favorite targets are the home and home office computers connected by broadband to the Internet because the connection is always open there is more opportunity to locate these computers with their scanners

Alternatively crackers may just exploit weaknesses that have not been patched in the computers operating system in order to gain entry As discussed above Trojans are another way crackers use to gain access to our PCs

How Does A Cracker Affect UsBesides the potentially valuable information they can obtain from our PCs such as that listed under Trojans these intruders also want our hard disk space and Internet connection With these resources they can use our computers to send out spam or attack other computers on the Internet and all this can be done without our knowledge Another reason why we should know how do you stay safe on the Internet

5 Spam -- Unsolicited Email

What Is SpamSpam is defined in Dictionarycom as Unsolicited e-mail often of a commercial nature sent indiscriminately to multiple mailing lists individuals or newsgroups junk e-mail

Spammers peddle pornography sexual aids diet pills and get-rich-quick schemes in fact anything that has a perceived value

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

In 1999 a wireless technology called 80211b more commonly referred to as Wi-Fi is standardized Over the years that follow this technology begins appearing as a built-in feature of portable computers and many handheld devices

In 2005 the One Laptop Per Child project begins In an attempt to provide low cost education-designed laptops to children around the world for a low cost (US$100 per unit) this project helps spark the netbook industry Netbooks are small portable computers with extended battery life and built-in Wi-Fi connectivity

Multi-touch technology begins to appear in handheld devices tablet computers and netbooks This technology supplements traditional touch-screen technology by allowing advanced gesturing (several fingers moving on a screen instead of just one) Multi-touch technology is seen as a possible alternative to traditional keyboard and mouse (touchpad) systems

Read Bill Buxtons Overview and History of Multi-Touch Systems entitled Multi-Touch Systems that I Have Known and Loved

In December 2009 the first multi-touch website is reported

B2 Overview of InternetThe Internet is a global computer network made up of smaller computer networks

it hasbeen called a Network of NetworksThese smaller networks include1048707 Local Area Networks (like networked offices or computer labs and campus-wide

networks)1048707 Wide Area Networks (like city-wide networks)1048707 State and Regional Networks (including regional service providers and others)1048707 National and International Networks

There is no one inventor of the Internet The Internet was created in the 1960s as a huge network linking big university and government computers The science behind the Internet was invented during the Cold War when the United States was in competition against Russia for weapons and technology So the Internet is actually pretty oldmdasharound forty years Much of Internetrsquos initial development was supported by American governmental research and network development (beginning with the American militarys ARPANET in 1969)In fact email has been around since 1972 In 1989 that Tim Berners-Lee a scientist at the European Laboratory for Particle Physics in Geneva proposed the World Wide Web Now Internet Service Providers (ISPs) offer Internet access to their clients at costs ranging from Rs 150- per 6 months to hundreds of rupees per year depending on the types of service they offer

II What people do when surfing People usually get to surfing to internet to do things that are complicated

for them They do a short time for them while surfing depends from the user surfing is the very easiest thing to search for what you want to know

Surfing is one where you can get information access to an educational learning where you can also communicate for an entertainment or an Personal Information

Surfing is one of the easiest way of sharing files and document or any personal data

I1 Surfing is build for a network and made up of organization

i Communication ii Education

iii Business managements Commercial Company iv Government v Private Organization

vi Entertainment

I2 What are the uses of the Internet

There are three fundamental uses of the Internet Communication Information Retrieval Presentation of Information

Communication The Internet is used both for one-to-one communications (email and real-time chat

programs) and one-to-many

Information Retrieval The Internet allows access to public domain information bibliographic databases

libraries and entertainment services as well as to proprietary information services

Presentation of Information Any organization connected to the Internet can provide access to its own in-house

information (library catalogs faculty information etc) to millions of people world-wide Individuals can also develop and provide their own information packages via their own

home pages

II Terms and Web PoliciesObjectives

To know the resources of internet Navigate around the web using Internet Explorer To know what internet services we have To know what is the risk when your online Define the World Wide Web Explain the work of the Domain Name Service Explain the difference between IP address and domain name How to protect and stay safe online

A Internet Addresses

Every computer file of information and person on the Internet is identified by a unique address

A1 Computer AddressesComputer addresses are made up of three parts (or in some cases two parts) separated

by dots like this computer-nameinstitutiondomain

The computer name is a name given locally to identify a particular computer it is in some cases omitted from the address The institution name is the name (or an abbreviation) of the name of the school company or other institution housing the computer The domain name specifies either the type or the geographic location of the computer

A2 Domain NamesThere are several possible domain names including some that identify the type of institution and some that identify a geographical location They include

edu Educational institutioncom Commercial and profitable organizationsorg Non-profitable organizations

net Internet infrastructure and service providersgov Governmental agencydepartmentmil American military agencyint International organizationsus United Statesin Indiamy Malaysiaca Canadajp Japanbiz Businessaero Aeronautics

A3 Personal Addresses

A persons address (or their email address) places the users username (or login) and the symbol before the computer address For example a user whose username is creator who is accessing email from the yahoo server of United State Yahoo Website would have the following address creatoryahoocom

B Internet Services

B1 Internet Services

rdquoInternet servicesrdquo serve more sophisticated and multi-purpose purposes and increasingly make the Internet a truly useful information resource

B11 EmailIt is the Internets version of the postal service Using the Internet it provides the ability to send a message reply to a message send a file created in another program andor even send the same message to a group of people Some benefits of Email arebull Speed A message can be sent from Chennai to Australia in a matter of secondsbull Cost Emails are cheap You are usually only charged for the telephone call time (local call rate) for sending the message into the Internet and not the cost associated with transferring the message across the Internetbull Flexibility It is easy to send duplicates of your messages to other people or groups for the cost of a single messagebull Record keeping Messages sent and received can be easily stored for future referenceIn order to use Email you will need Internet access arranged through an InternetService Provider (ISP) who will allocate you one or a number of Email accounts To be able to retrieve and send mail from these addresses a user will need what is known as Email client software and your ISP usually provides this although nowadays most computers come with it pre-installed

B12 Mail Lists

These use email to support discussion groups on a wide range of specific subjectsOnce you are becoming a subscriber of a mailing list you will receive lot of emails related to the subject covered by the mailing list

B13 FTPFTP was the original Internet mechanism for the storage and retrieval of information There are still many FTP Sites around the Internet although many of them have been melded into the World Wide Web In computer science FTP stands for File Transfer Protocol which is a way of transferring files between computers A file can be anything -- a spreadsheet a word document a song or a picture When someone says Please FTP me that file for instance that means Please transfer that file from your computer to mine To FTP you usually need to download a special program or application You also usually need a password to be able to access or send information to someone elses computer

B14 GopherGopher was developed at the University of Minnesota primarily to support its own Campus Wide Information Server (CWIS) It provides access to information available either locally or elsewhere on the Internet by means of a simple series of uniformly designed menus

B15 Instant Messaging (IM)There are lots of other fun and useful IM features you can explore like group chats file transfers voice calls video conferencing and emoticons that reflect your mood

B16 IRCIRC stands for Internet Relay Chat It has been used in many countries around the world IRC is a multi-user chat system where people meet on channels (rooms virtual places usually with a certain topic of conversation) to talk in groups or privately There is no restriction to the number of people that can participate in a given discussion or the number of channels that can be formed on IRC

B17 NewsgroupsThe Internet has a place where we can gather question and discuss our experiences within a wide variety of topics Its called Usenet News Some users also call it Net NewsThink of Usenet News as a giant worldwide bulletin board Anyone can freely post something on this bulletin board Everyone else can read the posted items and add their own items These voluntary contributions and free exchange of information are the foundation of the Internet

B18 Voice over IPVoice over IP (Voice over Internet Protocol or VoIP) technology converts voice calls from analog to digital to be sent over digital data networks In Voice over IP or VoIP voice data and video all travel along the network

B19 World Wide Web (WWW)The newest information application on the Internet the WWW provides standardized access to Gopher FTP Telnet and more by means of home pages designed either by institutions or

b individuals By means of the HyperText Markup Language (HTML) it allows users to point at highlighted terms following links to whatever information interests them It is a multimedia environment allowing Internet users access to audio and video materials There are a number of client software packages (or browsers) including Lynx (a textonly browser) Netscape and Microsofts Internet Explorer (which are multimedia browsers)

C Types of Internet Connection

C1 Types of Internet connections

The options for providing user connectivity to the Internet are given below

1 Terminal DialupModem (Shell connection)1048707 Most common option1048707 User requirements limited to modem and communications software1048707 Text-only access1048707 Shell accounts were more popular before the advent of the Web A shell account lets

you use your computer much as if it were a virtual console associated with a remote computer You can type commands which are interpreted by the remote computer and view the resulting output on your computer Although a few web browsers such as Lynx can operate via a shell account they donrsquot generally support the highly graphical multimedia pages which web surfers have come to expect

2 SLIP (Serial Line Internet Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software SLIP software amp software for Internet

applications1048707 Multimedia access

3 PPP (Point-to-Point Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software PPP software amp software for Internet

applications1048707 Multimedia access1048707 While your computer is connected to the Internet you can use it to surf the Web with

your favorite browser If your ISP allows you can even run a web server providing pages that can be viewed by others around the world

4 ISDN (Integrated Services Digital Network)1048707 Most often used to connect remote telecommuters to office LANs1048707 Requires ISDN phone line access1048707 Faster than analog terminal dialupmodem service

1048707 User must have ISDN phone line ISDN card communications software TCP software amp SLIP or PPP software multimedia connectivity

5 DIAS1048707 The DIAS offers a wire-line solution for high speed symmetrical Internet access on the

existing telephone lines It provides an always on internet access that is permanently available at customers premises DIAS combines voice and internet data packets on a single twisted pair wire at subscriber premises that means you can use telephone and surf internet at the same time

6 Cable Modem1048707 The term ldquoCable Modemrdquo is quite new and refers to a modem that operates over the

ordinary cable TV network cables Basically you just connect the Cable Modem to the TV outlet for your cable TV and the cable TV operator connects a Cable Modem Termination System (CMTS) in his end (the Head-End)

1048707 Actually the term ldquoCable Modemrdquo is a bit misleading as a Cable Modem works more like a Local Area Network (LAN) interface than as a modem

1048707 In a cable TV system signals from the various channels are each given a 6-MHz slice of the cablersquos available bandwidth and then sent down the cable to your house When a cable company offers Internet access over the cable Internet information can use the same cables because the cable modem system puts downstream data ndash data sent from the Internet to an individual computer ndash into a 6-MHz channel On the cable the data looks just like a TV channel So Internet downstream data takes up the same amount of cable space as any single channel of programming Upstream data ndash information sent from an individual back to the Internet ndash requires even less of the cablersquos bandwidth just 2 MHz since the assumption is that most people download far more information than they upload

1048707 Putting both upstream and downstream data on the cable television system requires two types of equipment a cable modem on the customer end and a cable modem termination system (CMTS) at the cable providerrsquos end Between these two types of equipment all the computer networking security and management of Internet access over cable television is put into place

7 Digital Subscriber Line (DSL) connection1048707 DSL is a very high-speed connection that uses the same wires as a regular telephone

line1048707 Here are some advantages of DSL

1 You can leave your Internet connection open and still use the phone line for voice calls

2 The speed is much higher than a regular modem3 DSL doesnrsquot necessarily require new wiring it can use the phone line you

already have4 The company that offers DSL (eg BSNL) will usually provide the modem as

part of the installation1048707 But there are disadvantages

1 A DSL connection works better when you are closer to the providerrsquos central office

2 The service is not available everywhere1048707 Other types of DSL include

1 Asymmetric DSL (ADSL) line ndash The connection is faster for receiving data than it is for sending data over the Internet

2 Very high bit-rate DSL (VDSL) ndash This is a fast connection but works only over a short distance

3 Symmetric DSL (SDSL) ndash This connection used mainly by small businesses doesnrsquot allow you to use the phone at the same time but the speed of receiving and sending data is the same

4 Rate-adaptive DSL (RADSL) ndash This is a variation of ADSL but the modem can adjust the speed of the connection depending on the length and quality of the line

8 Direct Connection (Leased circuit)1048707 Most often used to connect sites within a specific organization such as a university or

business requires owning or leasing of cable (from 64 kbps to T-3) users typically connected via Ethernet LANs multimedia connectivity at its fastest

9 Satellite connections1048707 This connection allows you to download Internet files via a satellite connection This is

an efficient method for receiving large Web graphics and other items but you still need a modem connection for other features You must purchase the connection hardware as well as subscribe to the service

10 Wireless connections1048707 Pagers cellular phones and personal digital assistants (PDAs) now allow varying levels

of Internet access from notification of E-mail to limited Web connections Many of these services remain in the experimental stage The PPP connection is called as TCPIP connection or PSTN dial-up connection ISDN connection is called as ISDN dial-up connection Cable Modem DSL and Direct Connection are always-on connection The words ldquoconnectionrdquo and ldquoaccountrdquo related to Internet are interchangeable

D Computer Virus

The Internet just like the rest of the world is not a perfectly safe place to visit If you download files from the Internet there is a chance a very small chance but nonetheless a chance that your computer could become infected with a virus

Viruses are malicious programs that invade your computer They can cause many different kinds of damage such as deleting data files erasing programs or destroying

everything they find on your hard disk Not every virus causes damage some simply flash annoying messages

Different Types of Computer VirusesThere are Different Types of Computer Viruses could be classified in

(origin techniques types of files they infect where they hide the kind of damage they cause the type of operating system or platform they attack) etc Let us have a look at themhellip

Computer Virus is a kind of malicious software written intentionally to enter a computer without the userrsquos permission or knowledge with an ability to replicate itself thus continuing to spread Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system A virus should never be assumed harmless and left on a system Most common types of viruses are mentioned below

Resident VirusesThis type of virus is a permanent which dwells in the RAM memory From

there it can overcome and interrupt all of the operations executed by the system corrupting files and programs that are opened closed copied renamed etc

Examples include Randex CMJ Meve and MrKlunky

Direct Action VirusesThe main purpose of this virus is to replicate and take action when it is

executed When a specific condition is met the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXECBAT file PATH This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted

Overwrite VirusesVirus of this kind is characterized by the fact that it deletes the information

contained in the files that it infects rendering them partially or totally useless once they have been infected

The only way to clean a file infected by an overwrite virus is to delete the file completely thus losing the original content

Examples of this virus include Way TrjReboot Trivial88D

Boot Virus

This type of virus affects the boot sector of a floppy or hard disk This is a crucial part of a disk in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive

Examples of boot viruses include PolybootB AntiEXE

Macro VirusMacro viruses infect files that are created using certain applications or

programs that contain macros These mini-programs make it possible to automate series of operations so that they are performed as a single action thereby saving the user from having to carry them out one by one

Examples of macro viruses Relax MelissaA Bablas O97MY2K

Directory VirusDirectory viruses change the paths that indicate the location of a file By

executing a program (file with the extension EXE or COM) which has been infected by a virus you are unknowingly running the virus program while the original file and program have been previously moved by the virus

Once infected it becomes impossible to locate the original files

Polymorphic VirusPolymorphic viruses encrypt or encode themselves in a different way

(using different algorithms and encryption keys) every time they infect a system

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves

Examples include Elkern Marburg Satan Bug and Tuareg

File InfectorsThis type of virus infects programs or executable files (files with an EXE

or COM extension) When one of these programs is run directly or indirectly the virus is activated producing the damaging effects it is programmed to carry out The majority of existing viruses belong to this category and can be classified depending on the actions that they carry out

Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types They are known as companion viruses because once they get into the system they accompany the other files that already exist In other words in order to carry out their infection routines companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses)

Some examples include Stator Asimov1539 and Terrax1069

FAT VirusThe file allocation table or FAT is the part of a disk used to connect

information and is a vital part of the normal functioning of the computerThis type of virus attack can be especially dangerous by preventing access to certain sections of the disk where important files are stored Damage caused can result in information losses from individual files or even entire directories

WormsA worm is a program very similar to a virus it has the ability to self-

replicate and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses

Examples of worms include PSWBugbearB LovgateF TrileC SobigD Mapson

Trojans or Trojan HorsesAnother unsavory breed of malicious code are Trojans or Trojan horses

which unlike viruses do not reproduce by infecting other files nor do they self-replicate like worms

Logic BombsThey are not considered viruses because they do not replicate They are not

even programs in their own right but rather camouflaged segments of other programs

Their objective is to destroy data on the computer once certain conditions have been met Logic bombs go undetected until launched and the results can be destructive

E How Do You Stay Safe On The Internet

The first part of the answer to the question How do you stay safe on the Internet is know what the threats are that you and your computer are up against

Without this knowledge how are you going to know youve got everything covered off Do you just rely on what the security software vendors tell you to spend your money on

By being aware of what the risks are I suggest you will save yourself money and have more effective protection when it comes to the second part of the answer to the question How do you stay safe on the Internet selecting effective prevention and protection to guard privacy and online security

To help you decide what is necessary for your particular protection in The Three Levels Of Internet Risk Protection I talk about the safe practices that help protect your computer and the types of software to use -- from those that are absolutely essential for security to others which you may want to install to guard privacy to the level you desire

But back to this article How Do You Stay Safe On The Internet here Ill provide you with an introduction to each type of threat At the end of it youll have a good feel for the dangers on the Internet and how those threats can affect you your PC and your information be it personal financial family or business

There are ten of the most prevalent threats covered here Either go through them all or click on the links below for those you are particularly interested in

1 Viruses and Worms 2 Trojan Horses 3 Rootkits 4 Crackers and Hackers 5 Spam 6 Web Bugs 7 Child Security 8 Pop-UpUnder Ads 9 Tracking Cookies 10 Spyware

By the way Ive tried to keep the technical language simple but if you dont understand some of the terms check them out at Netlingo which provides definitions and explanations for all Net terminology

1 Viruses And Worms

What Is A VirusA virus is a man-made computer program that infects a file or program on our computers Each time the infected program is run the virus is also triggered It spreads itself by infecting other programs on the same computer

What Is A WormA worm is also a man-made program that replicates itself However unlike a virus it does not infect other program files on the computer Instead a worm spreads itself automatically to other computers through email over a network and via Internet Relay Chat (IRC)

How Do We Get InfectedViruses and worms can infect desktop computers laptops and network servers and reach our PCs from email web sites downloaded files and loadable media (eg floppy disks CD-ROMs and DVDs)

How Does A Virus Or Worm Infection Affect UsUnfortunately the effects of an infection are pretty unpleasant The virus or worm can

Disable the computer

Add modify or delete files or reformat the hard disk

Steal addresses held in our computer to send on virus-infected emails to our friends colleagues clients or customers

Send unsolicited bulk email (spam) to those in our mail address books and other users

2 Trojan Horses

What Is A Trojan HorseAlthough Trojan horse programs are categorized as viruses they are not true viruses since they do not replicate But like viruses they are one of the most destructive of the Internet risks covered in How Do You Stay Safe On The Internet and are favored by crackers and spyware writers

How Do We Get InfectedTrojans are one of the sneakiest of the online risks They are often downloaded on the back of a free program (freeware) that has some value to the user -- a free game software program or music for instance

How Does A Trojan Infection Affect Us

A Trojan installed on a computer allows that PC to be entered via a backdoor by any remote user that has the access code to the Trojan

The remote attacker can enter the computer undetected when the user is online to access or destroy any information stored Alternatively the Trojan can be programmed to automatically send any information on our PCs back to the attacker This could include

Client or customer information or other business data

Credit card details

Passwords for access to your online bank ISP or web services

Information you would rather remain hidden

Email addresses which may be used for spamming

Childrens names photographs ages or other personal details held on the computer

Distributed Denial of Service (DDOS) attack on other computers via the victims computer

No wonder we ask how do you stay safe on the Internet

3 How Do You Stay Safe On The InternetRootkitsWhat Is A RootkitRootkits are not destructive in their own right but they are designed to conceal the presence of malicious programs on a computer

How Do We Get InfectedAs with any malware such as viruses worms Trojans and spyware rootkits get onto our computers by various means such as through spam attachments being opened on the back of free downloads or planted by crackers who have breached computer defenses

How Does A Rootkit Affect UsRootkits are there for one reason only to ensure that an intruder can access our system and take control without detection by defenses to guard privacy and security

One of the most common and worrying uses of rootkits which causes us to ask How Do You Stay Safe On The Internet is to launch spam and denial of service (DOS) attacks against other computers or networks Another use of

rootkits is to hide Trojans so an intruder can easily use it to extract data from your computer as mentioned above

4 Crackers And Hackers

What Is A HackerCrackerThe term hacker is a misused term We should really be referring to a cracker to describe those who break security on a computer system

The original term hacker refers to computer enthusiasts who enjoy learning everything about a computer system

How Do We Get AttackedCrackers run programs that scan computer ports over the Internet to work out which ports are accessible If our computer shows up in one of these scans the cracker may decide to enter our PC

Crackers favorite targets are the home and home office computers connected by broadband to the Internet because the connection is always open there is more opportunity to locate these computers with their scanners

Alternatively crackers may just exploit weaknesses that have not been patched in the computers operating system in order to gain entry As discussed above Trojans are another way crackers use to gain access to our PCs

How Does A Cracker Affect UsBesides the potentially valuable information they can obtain from our PCs such as that listed under Trojans these intruders also want our hard disk space and Internet connection With these resources they can use our computers to send out spam or attack other computers on the Internet and all this can be done without our knowledge Another reason why we should know how do you stay safe on the Internet

5 Spam -- Unsolicited Email

What Is SpamSpam is defined in Dictionarycom as Unsolicited e-mail often of a commercial nature sent indiscriminately to multiple mailing lists individuals or newsgroups junk e-mail

Spammers peddle pornography sexual aids diet pills and get-rich-quick schemes in fact anything that has a perceived value

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

II What people do when surfing People usually get to surfing to internet to do things that are complicated

for them They do a short time for them while surfing depends from the user surfing is the very easiest thing to search for what you want to know

Surfing is one where you can get information access to an educational learning where you can also communicate for an entertainment or an Personal Information

Surfing is one of the easiest way of sharing files and document or any personal data

I1 Surfing is build for a network and made up of organization

i Communication ii Education

iii Business managements Commercial Company iv Government v Private Organization

vi Entertainment

I2 What are the uses of the Internet

There are three fundamental uses of the Internet Communication Information Retrieval Presentation of Information

Communication The Internet is used both for one-to-one communications (email and real-time chat

programs) and one-to-many

Information Retrieval The Internet allows access to public domain information bibliographic databases

libraries and entertainment services as well as to proprietary information services

Presentation of Information Any organization connected to the Internet can provide access to its own in-house

information (library catalogs faculty information etc) to millions of people world-wide Individuals can also develop and provide their own information packages via their own

home pages

II Terms and Web PoliciesObjectives

To know the resources of internet Navigate around the web using Internet Explorer To know what internet services we have To know what is the risk when your online Define the World Wide Web Explain the work of the Domain Name Service Explain the difference between IP address and domain name How to protect and stay safe online

A Internet Addresses

Every computer file of information and person on the Internet is identified by a unique address

A1 Computer AddressesComputer addresses are made up of three parts (or in some cases two parts) separated

by dots like this computer-nameinstitutiondomain

The computer name is a name given locally to identify a particular computer it is in some cases omitted from the address The institution name is the name (or an abbreviation) of the name of the school company or other institution housing the computer The domain name specifies either the type or the geographic location of the computer

A2 Domain NamesThere are several possible domain names including some that identify the type of institution and some that identify a geographical location They include

edu Educational institutioncom Commercial and profitable organizationsorg Non-profitable organizations

net Internet infrastructure and service providersgov Governmental agencydepartmentmil American military agencyint International organizationsus United Statesin Indiamy Malaysiaca Canadajp Japanbiz Businessaero Aeronautics

A3 Personal Addresses

A persons address (or their email address) places the users username (or login) and the symbol before the computer address For example a user whose username is creator who is accessing email from the yahoo server of United State Yahoo Website would have the following address creatoryahoocom

B Internet Services

B1 Internet Services

rdquoInternet servicesrdquo serve more sophisticated and multi-purpose purposes and increasingly make the Internet a truly useful information resource

B11 EmailIt is the Internets version of the postal service Using the Internet it provides the ability to send a message reply to a message send a file created in another program andor even send the same message to a group of people Some benefits of Email arebull Speed A message can be sent from Chennai to Australia in a matter of secondsbull Cost Emails are cheap You are usually only charged for the telephone call time (local call rate) for sending the message into the Internet and not the cost associated with transferring the message across the Internetbull Flexibility It is easy to send duplicates of your messages to other people or groups for the cost of a single messagebull Record keeping Messages sent and received can be easily stored for future referenceIn order to use Email you will need Internet access arranged through an InternetService Provider (ISP) who will allocate you one or a number of Email accounts To be able to retrieve and send mail from these addresses a user will need what is known as Email client software and your ISP usually provides this although nowadays most computers come with it pre-installed

B12 Mail Lists

These use email to support discussion groups on a wide range of specific subjectsOnce you are becoming a subscriber of a mailing list you will receive lot of emails related to the subject covered by the mailing list

B13 FTPFTP was the original Internet mechanism for the storage and retrieval of information There are still many FTP Sites around the Internet although many of them have been melded into the World Wide Web In computer science FTP stands for File Transfer Protocol which is a way of transferring files between computers A file can be anything -- a spreadsheet a word document a song or a picture When someone says Please FTP me that file for instance that means Please transfer that file from your computer to mine To FTP you usually need to download a special program or application You also usually need a password to be able to access or send information to someone elses computer

B14 GopherGopher was developed at the University of Minnesota primarily to support its own Campus Wide Information Server (CWIS) It provides access to information available either locally or elsewhere on the Internet by means of a simple series of uniformly designed menus

B15 Instant Messaging (IM)There are lots of other fun and useful IM features you can explore like group chats file transfers voice calls video conferencing and emoticons that reflect your mood

B16 IRCIRC stands for Internet Relay Chat It has been used in many countries around the world IRC is a multi-user chat system where people meet on channels (rooms virtual places usually with a certain topic of conversation) to talk in groups or privately There is no restriction to the number of people that can participate in a given discussion or the number of channels that can be formed on IRC

B17 NewsgroupsThe Internet has a place where we can gather question and discuss our experiences within a wide variety of topics Its called Usenet News Some users also call it Net NewsThink of Usenet News as a giant worldwide bulletin board Anyone can freely post something on this bulletin board Everyone else can read the posted items and add their own items These voluntary contributions and free exchange of information are the foundation of the Internet

B18 Voice over IPVoice over IP (Voice over Internet Protocol or VoIP) technology converts voice calls from analog to digital to be sent over digital data networks In Voice over IP or VoIP voice data and video all travel along the network

B19 World Wide Web (WWW)The newest information application on the Internet the WWW provides standardized access to Gopher FTP Telnet and more by means of home pages designed either by institutions or

b individuals By means of the HyperText Markup Language (HTML) it allows users to point at highlighted terms following links to whatever information interests them It is a multimedia environment allowing Internet users access to audio and video materials There are a number of client software packages (or browsers) including Lynx (a textonly browser) Netscape and Microsofts Internet Explorer (which are multimedia browsers)

C Types of Internet Connection

C1 Types of Internet connections

The options for providing user connectivity to the Internet are given below

1 Terminal DialupModem (Shell connection)1048707 Most common option1048707 User requirements limited to modem and communications software1048707 Text-only access1048707 Shell accounts were more popular before the advent of the Web A shell account lets

you use your computer much as if it were a virtual console associated with a remote computer You can type commands which are interpreted by the remote computer and view the resulting output on your computer Although a few web browsers such as Lynx can operate via a shell account they donrsquot generally support the highly graphical multimedia pages which web surfers have come to expect

2 SLIP (Serial Line Internet Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software SLIP software amp software for Internet

applications1048707 Multimedia access

3 PPP (Point-to-Point Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software PPP software amp software for Internet

applications1048707 Multimedia access1048707 While your computer is connected to the Internet you can use it to surf the Web with

your favorite browser If your ISP allows you can even run a web server providing pages that can be viewed by others around the world

4 ISDN (Integrated Services Digital Network)1048707 Most often used to connect remote telecommuters to office LANs1048707 Requires ISDN phone line access1048707 Faster than analog terminal dialupmodem service

1048707 User must have ISDN phone line ISDN card communications software TCP software amp SLIP or PPP software multimedia connectivity

5 DIAS1048707 The DIAS offers a wire-line solution for high speed symmetrical Internet access on the

existing telephone lines It provides an always on internet access that is permanently available at customers premises DIAS combines voice and internet data packets on a single twisted pair wire at subscriber premises that means you can use telephone and surf internet at the same time

6 Cable Modem1048707 The term ldquoCable Modemrdquo is quite new and refers to a modem that operates over the

ordinary cable TV network cables Basically you just connect the Cable Modem to the TV outlet for your cable TV and the cable TV operator connects a Cable Modem Termination System (CMTS) in his end (the Head-End)

1048707 Actually the term ldquoCable Modemrdquo is a bit misleading as a Cable Modem works more like a Local Area Network (LAN) interface than as a modem

1048707 In a cable TV system signals from the various channels are each given a 6-MHz slice of the cablersquos available bandwidth and then sent down the cable to your house When a cable company offers Internet access over the cable Internet information can use the same cables because the cable modem system puts downstream data ndash data sent from the Internet to an individual computer ndash into a 6-MHz channel On the cable the data looks just like a TV channel So Internet downstream data takes up the same amount of cable space as any single channel of programming Upstream data ndash information sent from an individual back to the Internet ndash requires even less of the cablersquos bandwidth just 2 MHz since the assumption is that most people download far more information than they upload

1048707 Putting both upstream and downstream data on the cable television system requires two types of equipment a cable modem on the customer end and a cable modem termination system (CMTS) at the cable providerrsquos end Between these two types of equipment all the computer networking security and management of Internet access over cable television is put into place

7 Digital Subscriber Line (DSL) connection1048707 DSL is a very high-speed connection that uses the same wires as a regular telephone

line1048707 Here are some advantages of DSL

1 You can leave your Internet connection open and still use the phone line for voice calls

2 The speed is much higher than a regular modem3 DSL doesnrsquot necessarily require new wiring it can use the phone line you

already have4 The company that offers DSL (eg BSNL) will usually provide the modem as

part of the installation1048707 But there are disadvantages

1 A DSL connection works better when you are closer to the providerrsquos central office

2 The service is not available everywhere1048707 Other types of DSL include

1 Asymmetric DSL (ADSL) line ndash The connection is faster for receiving data than it is for sending data over the Internet

2 Very high bit-rate DSL (VDSL) ndash This is a fast connection but works only over a short distance

3 Symmetric DSL (SDSL) ndash This connection used mainly by small businesses doesnrsquot allow you to use the phone at the same time but the speed of receiving and sending data is the same

4 Rate-adaptive DSL (RADSL) ndash This is a variation of ADSL but the modem can adjust the speed of the connection depending on the length and quality of the line

8 Direct Connection (Leased circuit)1048707 Most often used to connect sites within a specific organization such as a university or

business requires owning or leasing of cable (from 64 kbps to T-3) users typically connected via Ethernet LANs multimedia connectivity at its fastest

9 Satellite connections1048707 This connection allows you to download Internet files via a satellite connection This is

an efficient method for receiving large Web graphics and other items but you still need a modem connection for other features You must purchase the connection hardware as well as subscribe to the service

10 Wireless connections1048707 Pagers cellular phones and personal digital assistants (PDAs) now allow varying levels

of Internet access from notification of E-mail to limited Web connections Many of these services remain in the experimental stage The PPP connection is called as TCPIP connection or PSTN dial-up connection ISDN connection is called as ISDN dial-up connection Cable Modem DSL and Direct Connection are always-on connection The words ldquoconnectionrdquo and ldquoaccountrdquo related to Internet are interchangeable

D Computer Virus

The Internet just like the rest of the world is not a perfectly safe place to visit If you download files from the Internet there is a chance a very small chance but nonetheless a chance that your computer could become infected with a virus

Viruses are malicious programs that invade your computer They can cause many different kinds of damage such as deleting data files erasing programs or destroying

everything they find on your hard disk Not every virus causes damage some simply flash annoying messages

Different Types of Computer VirusesThere are Different Types of Computer Viruses could be classified in

(origin techniques types of files they infect where they hide the kind of damage they cause the type of operating system or platform they attack) etc Let us have a look at themhellip

Computer Virus is a kind of malicious software written intentionally to enter a computer without the userrsquos permission or knowledge with an ability to replicate itself thus continuing to spread Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system A virus should never be assumed harmless and left on a system Most common types of viruses are mentioned below

Resident VirusesThis type of virus is a permanent which dwells in the RAM memory From

there it can overcome and interrupt all of the operations executed by the system corrupting files and programs that are opened closed copied renamed etc

Examples include Randex CMJ Meve and MrKlunky

Direct Action VirusesThe main purpose of this virus is to replicate and take action when it is

executed When a specific condition is met the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXECBAT file PATH This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted

Overwrite VirusesVirus of this kind is characterized by the fact that it deletes the information

contained in the files that it infects rendering them partially or totally useless once they have been infected

The only way to clean a file infected by an overwrite virus is to delete the file completely thus losing the original content

Examples of this virus include Way TrjReboot Trivial88D

Boot Virus

This type of virus affects the boot sector of a floppy or hard disk This is a crucial part of a disk in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive

Examples of boot viruses include PolybootB AntiEXE

Macro VirusMacro viruses infect files that are created using certain applications or

programs that contain macros These mini-programs make it possible to automate series of operations so that they are performed as a single action thereby saving the user from having to carry them out one by one

Examples of macro viruses Relax MelissaA Bablas O97MY2K

Directory VirusDirectory viruses change the paths that indicate the location of a file By

executing a program (file with the extension EXE or COM) which has been infected by a virus you are unknowingly running the virus program while the original file and program have been previously moved by the virus

Once infected it becomes impossible to locate the original files

Polymorphic VirusPolymorphic viruses encrypt or encode themselves in a different way

(using different algorithms and encryption keys) every time they infect a system

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves

Examples include Elkern Marburg Satan Bug and Tuareg

File InfectorsThis type of virus infects programs or executable files (files with an EXE

or COM extension) When one of these programs is run directly or indirectly the virus is activated producing the damaging effects it is programmed to carry out The majority of existing viruses belong to this category and can be classified depending on the actions that they carry out

Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types They are known as companion viruses because once they get into the system they accompany the other files that already exist In other words in order to carry out their infection routines companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses)

Some examples include Stator Asimov1539 and Terrax1069

FAT VirusThe file allocation table or FAT is the part of a disk used to connect

information and is a vital part of the normal functioning of the computerThis type of virus attack can be especially dangerous by preventing access to certain sections of the disk where important files are stored Damage caused can result in information losses from individual files or even entire directories

WormsA worm is a program very similar to a virus it has the ability to self-

replicate and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses

Examples of worms include PSWBugbearB LovgateF TrileC SobigD Mapson

Trojans or Trojan HorsesAnother unsavory breed of malicious code are Trojans or Trojan horses

which unlike viruses do not reproduce by infecting other files nor do they self-replicate like worms

Logic BombsThey are not considered viruses because they do not replicate They are not

even programs in their own right but rather camouflaged segments of other programs

Their objective is to destroy data on the computer once certain conditions have been met Logic bombs go undetected until launched and the results can be destructive

E How Do You Stay Safe On The Internet

The first part of the answer to the question How do you stay safe on the Internet is know what the threats are that you and your computer are up against

Without this knowledge how are you going to know youve got everything covered off Do you just rely on what the security software vendors tell you to spend your money on

By being aware of what the risks are I suggest you will save yourself money and have more effective protection when it comes to the second part of the answer to the question How do you stay safe on the Internet selecting effective prevention and protection to guard privacy and online security

To help you decide what is necessary for your particular protection in The Three Levels Of Internet Risk Protection I talk about the safe practices that help protect your computer and the types of software to use -- from those that are absolutely essential for security to others which you may want to install to guard privacy to the level you desire

But back to this article How Do You Stay Safe On The Internet here Ill provide you with an introduction to each type of threat At the end of it youll have a good feel for the dangers on the Internet and how those threats can affect you your PC and your information be it personal financial family or business

There are ten of the most prevalent threats covered here Either go through them all or click on the links below for those you are particularly interested in

1 Viruses and Worms 2 Trojan Horses 3 Rootkits 4 Crackers and Hackers 5 Spam 6 Web Bugs 7 Child Security 8 Pop-UpUnder Ads 9 Tracking Cookies 10 Spyware

By the way Ive tried to keep the technical language simple but if you dont understand some of the terms check them out at Netlingo which provides definitions and explanations for all Net terminology

1 Viruses And Worms

What Is A VirusA virus is a man-made computer program that infects a file or program on our computers Each time the infected program is run the virus is also triggered It spreads itself by infecting other programs on the same computer

What Is A WormA worm is also a man-made program that replicates itself However unlike a virus it does not infect other program files on the computer Instead a worm spreads itself automatically to other computers through email over a network and via Internet Relay Chat (IRC)

How Do We Get InfectedViruses and worms can infect desktop computers laptops and network servers and reach our PCs from email web sites downloaded files and loadable media (eg floppy disks CD-ROMs and DVDs)

How Does A Virus Or Worm Infection Affect UsUnfortunately the effects of an infection are pretty unpleasant The virus or worm can

Disable the computer

Add modify or delete files or reformat the hard disk

Steal addresses held in our computer to send on virus-infected emails to our friends colleagues clients or customers

Send unsolicited bulk email (spam) to those in our mail address books and other users

2 Trojan Horses

What Is A Trojan HorseAlthough Trojan horse programs are categorized as viruses they are not true viruses since they do not replicate But like viruses they are one of the most destructive of the Internet risks covered in How Do You Stay Safe On The Internet and are favored by crackers and spyware writers

How Do We Get InfectedTrojans are one of the sneakiest of the online risks They are often downloaded on the back of a free program (freeware) that has some value to the user -- a free game software program or music for instance

How Does A Trojan Infection Affect Us

A Trojan installed on a computer allows that PC to be entered via a backdoor by any remote user that has the access code to the Trojan

The remote attacker can enter the computer undetected when the user is online to access or destroy any information stored Alternatively the Trojan can be programmed to automatically send any information on our PCs back to the attacker This could include

Client or customer information or other business data

Credit card details

Passwords for access to your online bank ISP or web services

Information you would rather remain hidden

Email addresses which may be used for spamming

Childrens names photographs ages or other personal details held on the computer

Distributed Denial of Service (DDOS) attack on other computers via the victims computer

No wonder we ask how do you stay safe on the Internet

3 How Do You Stay Safe On The InternetRootkitsWhat Is A RootkitRootkits are not destructive in their own right but they are designed to conceal the presence of malicious programs on a computer

How Do We Get InfectedAs with any malware such as viruses worms Trojans and spyware rootkits get onto our computers by various means such as through spam attachments being opened on the back of free downloads or planted by crackers who have breached computer defenses

How Does A Rootkit Affect UsRootkits are there for one reason only to ensure that an intruder can access our system and take control without detection by defenses to guard privacy and security

One of the most common and worrying uses of rootkits which causes us to ask How Do You Stay Safe On The Internet is to launch spam and denial of service (DOS) attacks against other computers or networks Another use of

rootkits is to hide Trojans so an intruder can easily use it to extract data from your computer as mentioned above

4 Crackers And Hackers

What Is A HackerCrackerThe term hacker is a misused term We should really be referring to a cracker to describe those who break security on a computer system

The original term hacker refers to computer enthusiasts who enjoy learning everything about a computer system

How Do We Get AttackedCrackers run programs that scan computer ports over the Internet to work out which ports are accessible If our computer shows up in one of these scans the cracker may decide to enter our PC

Crackers favorite targets are the home and home office computers connected by broadband to the Internet because the connection is always open there is more opportunity to locate these computers with their scanners

Alternatively crackers may just exploit weaknesses that have not been patched in the computers operating system in order to gain entry As discussed above Trojans are another way crackers use to gain access to our PCs

How Does A Cracker Affect UsBesides the potentially valuable information they can obtain from our PCs such as that listed under Trojans these intruders also want our hard disk space and Internet connection With these resources they can use our computers to send out spam or attack other computers on the Internet and all this can be done without our knowledge Another reason why we should know how do you stay safe on the Internet

5 Spam -- Unsolicited Email

What Is SpamSpam is defined in Dictionarycom as Unsolicited e-mail often of a commercial nature sent indiscriminately to multiple mailing lists individuals or newsgroups junk e-mail

Spammers peddle pornography sexual aids diet pills and get-rich-quick schemes in fact anything that has a perceived value

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

II Terms and Web PoliciesObjectives

To know the resources of internet Navigate around the web using Internet Explorer To know what internet services we have To know what is the risk when your online Define the World Wide Web Explain the work of the Domain Name Service Explain the difference between IP address and domain name How to protect and stay safe online

A Internet Addresses

Every computer file of information and person on the Internet is identified by a unique address

A1 Computer AddressesComputer addresses are made up of three parts (or in some cases two parts) separated

by dots like this computer-nameinstitutiondomain

The computer name is a name given locally to identify a particular computer it is in some cases omitted from the address The institution name is the name (or an abbreviation) of the name of the school company or other institution housing the computer The domain name specifies either the type or the geographic location of the computer

A2 Domain NamesThere are several possible domain names including some that identify the type of institution and some that identify a geographical location They include

edu Educational institutioncom Commercial and profitable organizationsorg Non-profitable organizations

net Internet infrastructure and service providersgov Governmental agencydepartmentmil American military agencyint International organizationsus United Statesin Indiamy Malaysiaca Canadajp Japanbiz Businessaero Aeronautics

A3 Personal Addresses

A persons address (or their email address) places the users username (or login) and the symbol before the computer address For example a user whose username is creator who is accessing email from the yahoo server of United State Yahoo Website would have the following address creatoryahoocom

B Internet Services

B1 Internet Services

rdquoInternet servicesrdquo serve more sophisticated and multi-purpose purposes and increasingly make the Internet a truly useful information resource

B11 EmailIt is the Internets version of the postal service Using the Internet it provides the ability to send a message reply to a message send a file created in another program andor even send the same message to a group of people Some benefits of Email arebull Speed A message can be sent from Chennai to Australia in a matter of secondsbull Cost Emails are cheap You are usually only charged for the telephone call time (local call rate) for sending the message into the Internet and not the cost associated with transferring the message across the Internetbull Flexibility It is easy to send duplicates of your messages to other people or groups for the cost of a single messagebull Record keeping Messages sent and received can be easily stored for future referenceIn order to use Email you will need Internet access arranged through an InternetService Provider (ISP) who will allocate you one or a number of Email accounts To be able to retrieve and send mail from these addresses a user will need what is known as Email client software and your ISP usually provides this although nowadays most computers come with it pre-installed

B12 Mail Lists

These use email to support discussion groups on a wide range of specific subjectsOnce you are becoming a subscriber of a mailing list you will receive lot of emails related to the subject covered by the mailing list

B13 FTPFTP was the original Internet mechanism for the storage and retrieval of information There are still many FTP Sites around the Internet although many of them have been melded into the World Wide Web In computer science FTP stands for File Transfer Protocol which is a way of transferring files between computers A file can be anything -- a spreadsheet a word document a song or a picture When someone says Please FTP me that file for instance that means Please transfer that file from your computer to mine To FTP you usually need to download a special program or application You also usually need a password to be able to access or send information to someone elses computer

B14 GopherGopher was developed at the University of Minnesota primarily to support its own Campus Wide Information Server (CWIS) It provides access to information available either locally or elsewhere on the Internet by means of a simple series of uniformly designed menus

B15 Instant Messaging (IM)There are lots of other fun and useful IM features you can explore like group chats file transfers voice calls video conferencing and emoticons that reflect your mood

B16 IRCIRC stands for Internet Relay Chat It has been used in many countries around the world IRC is a multi-user chat system where people meet on channels (rooms virtual places usually with a certain topic of conversation) to talk in groups or privately There is no restriction to the number of people that can participate in a given discussion or the number of channels that can be formed on IRC

B17 NewsgroupsThe Internet has a place where we can gather question and discuss our experiences within a wide variety of topics Its called Usenet News Some users also call it Net NewsThink of Usenet News as a giant worldwide bulletin board Anyone can freely post something on this bulletin board Everyone else can read the posted items and add their own items These voluntary contributions and free exchange of information are the foundation of the Internet

B18 Voice over IPVoice over IP (Voice over Internet Protocol or VoIP) technology converts voice calls from analog to digital to be sent over digital data networks In Voice over IP or VoIP voice data and video all travel along the network

B19 World Wide Web (WWW)The newest information application on the Internet the WWW provides standardized access to Gopher FTP Telnet and more by means of home pages designed either by institutions or

b individuals By means of the HyperText Markup Language (HTML) it allows users to point at highlighted terms following links to whatever information interests them It is a multimedia environment allowing Internet users access to audio and video materials There are a number of client software packages (or browsers) including Lynx (a textonly browser) Netscape and Microsofts Internet Explorer (which are multimedia browsers)

C Types of Internet Connection

C1 Types of Internet connections

The options for providing user connectivity to the Internet are given below

1 Terminal DialupModem (Shell connection)1048707 Most common option1048707 User requirements limited to modem and communications software1048707 Text-only access1048707 Shell accounts were more popular before the advent of the Web A shell account lets

you use your computer much as if it were a virtual console associated with a remote computer You can type commands which are interpreted by the remote computer and view the resulting output on your computer Although a few web browsers such as Lynx can operate via a shell account they donrsquot generally support the highly graphical multimedia pages which web surfers have come to expect

2 SLIP (Serial Line Internet Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software SLIP software amp software for Internet

applications1048707 Multimedia access

3 PPP (Point-to-Point Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software PPP software amp software for Internet

applications1048707 Multimedia access1048707 While your computer is connected to the Internet you can use it to surf the Web with

your favorite browser If your ISP allows you can even run a web server providing pages that can be viewed by others around the world

4 ISDN (Integrated Services Digital Network)1048707 Most often used to connect remote telecommuters to office LANs1048707 Requires ISDN phone line access1048707 Faster than analog terminal dialupmodem service

1048707 User must have ISDN phone line ISDN card communications software TCP software amp SLIP or PPP software multimedia connectivity

5 DIAS1048707 The DIAS offers a wire-line solution for high speed symmetrical Internet access on the

existing telephone lines It provides an always on internet access that is permanently available at customers premises DIAS combines voice and internet data packets on a single twisted pair wire at subscriber premises that means you can use telephone and surf internet at the same time

6 Cable Modem1048707 The term ldquoCable Modemrdquo is quite new and refers to a modem that operates over the

ordinary cable TV network cables Basically you just connect the Cable Modem to the TV outlet for your cable TV and the cable TV operator connects a Cable Modem Termination System (CMTS) in his end (the Head-End)

1048707 Actually the term ldquoCable Modemrdquo is a bit misleading as a Cable Modem works more like a Local Area Network (LAN) interface than as a modem

1048707 In a cable TV system signals from the various channels are each given a 6-MHz slice of the cablersquos available bandwidth and then sent down the cable to your house When a cable company offers Internet access over the cable Internet information can use the same cables because the cable modem system puts downstream data ndash data sent from the Internet to an individual computer ndash into a 6-MHz channel On the cable the data looks just like a TV channel So Internet downstream data takes up the same amount of cable space as any single channel of programming Upstream data ndash information sent from an individual back to the Internet ndash requires even less of the cablersquos bandwidth just 2 MHz since the assumption is that most people download far more information than they upload

1048707 Putting both upstream and downstream data on the cable television system requires two types of equipment a cable modem on the customer end and a cable modem termination system (CMTS) at the cable providerrsquos end Between these two types of equipment all the computer networking security and management of Internet access over cable television is put into place

7 Digital Subscriber Line (DSL) connection1048707 DSL is a very high-speed connection that uses the same wires as a regular telephone

line1048707 Here are some advantages of DSL

1 You can leave your Internet connection open and still use the phone line for voice calls

2 The speed is much higher than a regular modem3 DSL doesnrsquot necessarily require new wiring it can use the phone line you

already have4 The company that offers DSL (eg BSNL) will usually provide the modem as

part of the installation1048707 But there are disadvantages

1 A DSL connection works better when you are closer to the providerrsquos central office

2 The service is not available everywhere1048707 Other types of DSL include

1 Asymmetric DSL (ADSL) line ndash The connection is faster for receiving data than it is for sending data over the Internet

2 Very high bit-rate DSL (VDSL) ndash This is a fast connection but works only over a short distance

3 Symmetric DSL (SDSL) ndash This connection used mainly by small businesses doesnrsquot allow you to use the phone at the same time but the speed of receiving and sending data is the same

4 Rate-adaptive DSL (RADSL) ndash This is a variation of ADSL but the modem can adjust the speed of the connection depending on the length and quality of the line

8 Direct Connection (Leased circuit)1048707 Most often used to connect sites within a specific organization such as a university or

business requires owning or leasing of cable (from 64 kbps to T-3) users typically connected via Ethernet LANs multimedia connectivity at its fastest

9 Satellite connections1048707 This connection allows you to download Internet files via a satellite connection This is

an efficient method for receiving large Web graphics and other items but you still need a modem connection for other features You must purchase the connection hardware as well as subscribe to the service

10 Wireless connections1048707 Pagers cellular phones and personal digital assistants (PDAs) now allow varying levels

of Internet access from notification of E-mail to limited Web connections Many of these services remain in the experimental stage The PPP connection is called as TCPIP connection or PSTN dial-up connection ISDN connection is called as ISDN dial-up connection Cable Modem DSL and Direct Connection are always-on connection The words ldquoconnectionrdquo and ldquoaccountrdquo related to Internet are interchangeable

D Computer Virus

The Internet just like the rest of the world is not a perfectly safe place to visit If you download files from the Internet there is a chance a very small chance but nonetheless a chance that your computer could become infected with a virus

Viruses are malicious programs that invade your computer They can cause many different kinds of damage such as deleting data files erasing programs or destroying

everything they find on your hard disk Not every virus causes damage some simply flash annoying messages

Different Types of Computer VirusesThere are Different Types of Computer Viruses could be classified in

(origin techniques types of files they infect where they hide the kind of damage they cause the type of operating system or platform they attack) etc Let us have a look at themhellip

Computer Virus is a kind of malicious software written intentionally to enter a computer without the userrsquos permission or knowledge with an ability to replicate itself thus continuing to spread Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system A virus should never be assumed harmless and left on a system Most common types of viruses are mentioned below

Resident VirusesThis type of virus is a permanent which dwells in the RAM memory From

there it can overcome and interrupt all of the operations executed by the system corrupting files and programs that are opened closed copied renamed etc

Examples include Randex CMJ Meve and MrKlunky

Direct Action VirusesThe main purpose of this virus is to replicate and take action when it is

executed When a specific condition is met the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXECBAT file PATH This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted

Overwrite VirusesVirus of this kind is characterized by the fact that it deletes the information

contained in the files that it infects rendering them partially or totally useless once they have been infected

The only way to clean a file infected by an overwrite virus is to delete the file completely thus losing the original content

Examples of this virus include Way TrjReboot Trivial88D

Boot Virus

This type of virus affects the boot sector of a floppy or hard disk This is a crucial part of a disk in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive

Examples of boot viruses include PolybootB AntiEXE

Macro VirusMacro viruses infect files that are created using certain applications or

programs that contain macros These mini-programs make it possible to automate series of operations so that they are performed as a single action thereby saving the user from having to carry them out one by one

Examples of macro viruses Relax MelissaA Bablas O97MY2K

Directory VirusDirectory viruses change the paths that indicate the location of a file By

executing a program (file with the extension EXE or COM) which has been infected by a virus you are unknowingly running the virus program while the original file and program have been previously moved by the virus

Once infected it becomes impossible to locate the original files

Polymorphic VirusPolymorphic viruses encrypt or encode themselves in a different way

(using different algorithms and encryption keys) every time they infect a system

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves

Examples include Elkern Marburg Satan Bug and Tuareg

File InfectorsThis type of virus infects programs or executable files (files with an EXE

or COM extension) When one of these programs is run directly or indirectly the virus is activated producing the damaging effects it is programmed to carry out The majority of existing viruses belong to this category and can be classified depending on the actions that they carry out

Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types They are known as companion viruses because once they get into the system they accompany the other files that already exist In other words in order to carry out their infection routines companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses)

Some examples include Stator Asimov1539 and Terrax1069

FAT VirusThe file allocation table or FAT is the part of a disk used to connect

information and is a vital part of the normal functioning of the computerThis type of virus attack can be especially dangerous by preventing access to certain sections of the disk where important files are stored Damage caused can result in information losses from individual files or even entire directories

WormsA worm is a program very similar to a virus it has the ability to self-

replicate and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses

Examples of worms include PSWBugbearB LovgateF TrileC SobigD Mapson

Trojans or Trojan HorsesAnother unsavory breed of malicious code are Trojans or Trojan horses

which unlike viruses do not reproduce by infecting other files nor do they self-replicate like worms

Logic BombsThey are not considered viruses because they do not replicate They are not

even programs in their own right but rather camouflaged segments of other programs

Their objective is to destroy data on the computer once certain conditions have been met Logic bombs go undetected until launched and the results can be destructive

E How Do You Stay Safe On The Internet

The first part of the answer to the question How do you stay safe on the Internet is know what the threats are that you and your computer are up against

Without this knowledge how are you going to know youve got everything covered off Do you just rely on what the security software vendors tell you to spend your money on

By being aware of what the risks are I suggest you will save yourself money and have more effective protection when it comes to the second part of the answer to the question How do you stay safe on the Internet selecting effective prevention and protection to guard privacy and online security

To help you decide what is necessary for your particular protection in The Three Levels Of Internet Risk Protection I talk about the safe practices that help protect your computer and the types of software to use -- from those that are absolutely essential for security to others which you may want to install to guard privacy to the level you desire

But back to this article How Do You Stay Safe On The Internet here Ill provide you with an introduction to each type of threat At the end of it youll have a good feel for the dangers on the Internet and how those threats can affect you your PC and your information be it personal financial family or business

There are ten of the most prevalent threats covered here Either go through them all or click on the links below for those you are particularly interested in

1 Viruses and Worms 2 Trojan Horses 3 Rootkits 4 Crackers and Hackers 5 Spam 6 Web Bugs 7 Child Security 8 Pop-UpUnder Ads 9 Tracking Cookies 10 Spyware

By the way Ive tried to keep the technical language simple but if you dont understand some of the terms check them out at Netlingo which provides definitions and explanations for all Net terminology

1 Viruses And Worms

What Is A VirusA virus is a man-made computer program that infects a file or program on our computers Each time the infected program is run the virus is also triggered It spreads itself by infecting other programs on the same computer

What Is A WormA worm is also a man-made program that replicates itself However unlike a virus it does not infect other program files on the computer Instead a worm spreads itself automatically to other computers through email over a network and via Internet Relay Chat (IRC)

How Do We Get InfectedViruses and worms can infect desktop computers laptops and network servers and reach our PCs from email web sites downloaded files and loadable media (eg floppy disks CD-ROMs and DVDs)

How Does A Virus Or Worm Infection Affect UsUnfortunately the effects of an infection are pretty unpleasant The virus or worm can

Disable the computer

Add modify or delete files or reformat the hard disk

Steal addresses held in our computer to send on virus-infected emails to our friends colleagues clients or customers

Send unsolicited bulk email (spam) to those in our mail address books and other users

2 Trojan Horses

What Is A Trojan HorseAlthough Trojan horse programs are categorized as viruses they are not true viruses since they do not replicate But like viruses they are one of the most destructive of the Internet risks covered in How Do You Stay Safe On The Internet and are favored by crackers and spyware writers

How Do We Get InfectedTrojans are one of the sneakiest of the online risks They are often downloaded on the back of a free program (freeware) that has some value to the user -- a free game software program or music for instance

How Does A Trojan Infection Affect Us

A Trojan installed on a computer allows that PC to be entered via a backdoor by any remote user that has the access code to the Trojan

The remote attacker can enter the computer undetected when the user is online to access or destroy any information stored Alternatively the Trojan can be programmed to automatically send any information on our PCs back to the attacker This could include

Client or customer information or other business data

Credit card details

Passwords for access to your online bank ISP or web services

Information you would rather remain hidden

Email addresses which may be used for spamming

Childrens names photographs ages or other personal details held on the computer

Distributed Denial of Service (DDOS) attack on other computers via the victims computer

No wonder we ask how do you stay safe on the Internet

3 How Do You Stay Safe On The InternetRootkitsWhat Is A RootkitRootkits are not destructive in their own right but they are designed to conceal the presence of malicious programs on a computer

How Do We Get InfectedAs with any malware such as viruses worms Trojans and spyware rootkits get onto our computers by various means such as through spam attachments being opened on the back of free downloads or planted by crackers who have breached computer defenses

How Does A Rootkit Affect UsRootkits are there for one reason only to ensure that an intruder can access our system and take control without detection by defenses to guard privacy and security

One of the most common and worrying uses of rootkits which causes us to ask How Do You Stay Safe On The Internet is to launch spam and denial of service (DOS) attacks against other computers or networks Another use of

rootkits is to hide Trojans so an intruder can easily use it to extract data from your computer as mentioned above

4 Crackers And Hackers

What Is A HackerCrackerThe term hacker is a misused term We should really be referring to a cracker to describe those who break security on a computer system

The original term hacker refers to computer enthusiasts who enjoy learning everything about a computer system

How Do We Get AttackedCrackers run programs that scan computer ports over the Internet to work out which ports are accessible If our computer shows up in one of these scans the cracker may decide to enter our PC

Crackers favorite targets are the home and home office computers connected by broadband to the Internet because the connection is always open there is more opportunity to locate these computers with their scanners

Alternatively crackers may just exploit weaknesses that have not been patched in the computers operating system in order to gain entry As discussed above Trojans are another way crackers use to gain access to our PCs

How Does A Cracker Affect UsBesides the potentially valuable information they can obtain from our PCs such as that listed under Trojans these intruders also want our hard disk space and Internet connection With these resources they can use our computers to send out spam or attack other computers on the Internet and all this can be done without our knowledge Another reason why we should know how do you stay safe on the Internet

5 Spam -- Unsolicited Email

What Is SpamSpam is defined in Dictionarycom as Unsolicited e-mail often of a commercial nature sent indiscriminately to multiple mailing lists individuals or newsgroups junk e-mail

Spammers peddle pornography sexual aids diet pills and get-rich-quick schemes in fact anything that has a perceived value

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

net Internet infrastructure and service providersgov Governmental agencydepartmentmil American military agencyint International organizationsus United Statesin Indiamy Malaysiaca Canadajp Japanbiz Businessaero Aeronautics

A3 Personal Addresses

A persons address (or their email address) places the users username (or login) and the symbol before the computer address For example a user whose username is creator who is accessing email from the yahoo server of United State Yahoo Website would have the following address creatoryahoocom

B Internet Services

B1 Internet Services

rdquoInternet servicesrdquo serve more sophisticated and multi-purpose purposes and increasingly make the Internet a truly useful information resource

B11 EmailIt is the Internets version of the postal service Using the Internet it provides the ability to send a message reply to a message send a file created in another program andor even send the same message to a group of people Some benefits of Email arebull Speed A message can be sent from Chennai to Australia in a matter of secondsbull Cost Emails are cheap You are usually only charged for the telephone call time (local call rate) for sending the message into the Internet and not the cost associated with transferring the message across the Internetbull Flexibility It is easy to send duplicates of your messages to other people or groups for the cost of a single messagebull Record keeping Messages sent and received can be easily stored for future referenceIn order to use Email you will need Internet access arranged through an InternetService Provider (ISP) who will allocate you one or a number of Email accounts To be able to retrieve and send mail from these addresses a user will need what is known as Email client software and your ISP usually provides this although nowadays most computers come with it pre-installed

B12 Mail Lists

These use email to support discussion groups on a wide range of specific subjectsOnce you are becoming a subscriber of a mailing list you will receive lot of emails related to the subject covered by the mailing list

B13 FTPFTP was the original Internet mechanism for the storage and retrieval of information There are still many FTP Sites around the Internet although many of them have been melded into the World Wide Web In computer science FTP stands for File Transfer Protocol which is a way of transferring files between computers A file can be anything -- a spreadsheet a word document a song or a picture When someone says Please FTP me that file for instance that means Please transfer that file from your computer to mine To FTP you usually need to download a special program or application You also usually need a password to be able to access or send information to someone elses computer

B14 GopherGopher was developed at the University of Minnesota primarily to support its own Campus Wide Information Server (CWIS) It provides access to information available either locally or elsewhere on the Internet by means of a simple series of uniformly designed menus

B15 Instant Messaging (IM)There are lots of other fun and useful IM features you can explore like group chats file transfers voice calls video conferencing and emoticons that reflect your mood

B16 IRCIRC stands for Internet Relay Chat It has been used in many countries around the world IRC is a multi-user chat system where people meet on channels (rooms virtual places usually with a certain topic of conversation) to talk in groups or privately There is no restriction to the number of people that can participate in a given discussion or the number of channels that can be formed on IRC

B17 NewsgroupsThe Internet has a place where we can gather question and discuss our experiences within a wide variety of topics Its called Usenet News Some users also call it Net NewsThink of Usenet News as a giant worldwide bulletin board Anyone can freely post something on this bulletin board Everyone else can read the posted items and add their own items These voluntary contributions and free exchange of information are the foundation of the Internet

B18 Voice over IPVoice over IP (Voice over Internet Protocol or VoIP) technology converts voice calls from analog to digital to be sent over digital data networks In Voice over IP or VoIP voice data and video all travel along the network

B19 World Wide Web (WWW)The newest information application on the Internet the WWW provides standardized access to Gopher FTP Telnet and more by means of home pages designed either by institutions or

b individuals By means of the HyperText Markup Language (HTML) it allows users to point at highlighted terms following links to whatever information interests them It is a multimedia environment allowing Internet users access to audio and video materials There are a number of client software packages (or browsers) including Lynx (a textonly browser) Netscape and Microsofts Internet Explorer (which are multimedia browsers)

C Types of Internet Connection

C1 Types of Internet connections

The options for providing user connectivity to the Internet are given below

1 Terminal DialupModem (Shell connection)1048707 Most common option1048707 User requirements limited to modem and communications software1048707 Text-only access1048707 Shell accounts were more popular before the advent of the Web A shell account lets

you use your computer much as if it were a virtual console associated with a remote computer You can type commands which are interpreted by the remote computer and view the resulting output on your computer Although a few web browsers such as Lynx can operate via a shell account they donrsquot generally support the highly graphical multimedia pages which web surfers have come to expect

2 SLIP (Serial Line Internet Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software SLIP software amp software for Internet

applications1048707 Multimedia access

3 PPP (Point-to-Point Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software PPP software amp software for Internet

applications1048707 Multimedia access1048707 While your computer is connected to the Internet you can use it to surf the Web with

your favorite browser If your ISP allows you can even run a web server providing pages that can be viewed by others around the world

4 ISDN (Integrated Services Digital Network)1048707 Most often used to connect remote telecommuters to office LANs1048707 Requires ISDN phone line access1048707 Faster than analog terminal dialupmodem service

1048707 User must have ISDN phone line ISDN card communications software TCP software amp SLIP or PPP software multimedia connectivity

5 DIAS1048707 The DIAS offers a wire-line solution for high speed symmetrical Internet access on the

existing telephone lines It provides an always on internet access that is permanently available at customers premises DIAS combines voice and internet data packets on a single twisted pair wire at subscriber premises that means you can use telephone and surf internet at the same time

6 Cable Modem1048707 The term ldquoCable Modemrdquo is quite new and refers to a modem that operates over the

ordinary cable TV network cables Basically you just connect the Cable Modem to the TV outlet for your cable TV and the cable TV operator connects a Cable Modem Termination System (CMTS) in his end (the Head-End)

1048707 Actually the term ldquoCable Modemrdquo is a bit misleading as a Cable Modem works more like a Local Area Network (LAN) interface than as a modem

1048707 In a cable TV system signals from the various channels are each given a 6-MHz slice of the cablersquos available bandwidth and then sent down the cable to your house When a cable company offers Internet access over the cable Internet information can use the same cables because the cable modem system puts downstream data ndash data sent from the Internet to an individual computer ndash into a 6-MHz channel On the cable the data looks just like a TV channel So Internet downstream data takes up the same amount of cable space as any single channel of programming Upstream data ndash information sent from an individual back to the Internet ndash requires even less of the cablersquos bandwidth just 2 MHz since the assumption is that most people download far more information than they upload

1048707 Putting both upstream and downstream data on the cable television system requires two types of equipment a cable modem on the customer end and a cable modem termination system (CMTS) at the cable providerrsquos end Between these two types of equipment all the computer networking security and management of Internet access over cable television is put into place

7 Digital Subscriber Line (DSL) connection1048707 DSL is a very high-speed connection that uses the same wires as a regular telephone

line1048707 Here are some advantages of DSL

1 You can leave your Internet connection open and still use the phone line for voice calls

2 The speed is much higher than a regular modem3 DSL doesnrsquot necessarily require new wiring it can use the phone line you

already have4 The company that offers DSL (eg BSNL) will usually provide the modem as

part of the installation1048707 But there are disadvantages

1 A DSL connection works better when you are closer to the providerrsquos central office

2 The service is not available everywhere1048707 Other types of DSL include

1 Asymmetric DSL (ADSL) line ndash The connection is faster for receiving data than it is for sending data over the Internet

2 Very high bit-rate DSL (VDSL) ndash This is a fast connection but works only over a short distance

3 Symmetric DSL (SDSL) ndash This connection used mainly by small businesses doesnrsquot allow you to use the phone at the same time but the speed of receiving and sending data is the same

4 Rate-adaptive DSL (RADSL) ndash This is a variation of ADSL but the modem can adjust the speed of the connection depending on the length and quality of the line

8 Direct Connection (Leased circuit)1048707 Most often used to connect sites within a specific organization such as a university or

business requires owning or leasing of cable (from 64 kbps to T-3) users typically connected via Ethernet LANs multimedia connectivity at its fastest

9 Satellite connections1048707 This connection allows you to download Internet files via a satellite connection This is

an efficient method for receiving large Web graphics and other items but you still need a modem connection for other features You must purchase the connection hardware as well as subscribe to the service

10 Wireless connections1048707 Pagers cellular phones and personal digital assistants (PDAs) now allow varying levels

of Internet access from notification of E-mail to limited Web connections Many of these services remain in the experimental stage The PPP connection is called as TCPIP connection or PSTN dial-up connection ISDN connection is called as ISDN dial-up connection Cable Modem DSL and Direct Connection are always-on connection The words ldquoconnectionrdquo and ldquoaccountrdquo related to Internet are interchangeable

D Computer Virus

The Internet just like the rest of the world is not a perfectly safe place to visit If you download files from the Internet there is a chance a very small chance but nonetheless a chance that your computer could become infected with a virus

Viruses are malicious programs that invade your computer They can cause many different kinds of damage such as deleting data files erasing programs or destroying

everything they find on your hard disk Not every virus causes damage some simply flash annoying messages

Different Types of Computer VirusesThere are Different Types of Computer Viruses could be classified in

(origin techniques types of files they infect where they hide the kind of damage they cause the type of operating system or platform they attack) etc Let us have a look at themhellip

Computer Virus is a kind of malicious software written intentionally to enter a computer without the userrsquos permission or knowledge with an ability to replicate itself thus continuing to spread Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system A virus should never be assumed harmless and left on a system Most common types of viruses are mentioned below

Resident VirusesThis type of virus is a permanent which dwells in the RAM memory From

there it can overcome and interrupt all of the operations executed by the system corrupting files and programs that are opened closed copied renamed etc

Examples include Randex CMJ Meve and MrKlunky

Direct Action VirusesThe main purpose of this virus is to replicate and take action when it is

executed When a specific condition is met the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXECBAT file PATH This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted

Overwrite VirusesVirus of this kind is characterized by the fact that it deletes the information

contained in the files that it infects rendering them partially or totally useless once they have been infected

The only way to clean a file infected by an overwrite virus is to delete the file completely thus losing the original content

Examples of this virus include Way TrjReboot Trivial88D

Boot Virus

This type of virus affects the boot sector of a floppy or hard disk This is a crucial part of a disk in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive

Examples of boot viruses include PolybootB AntiEXE

Macro VirusMacro viruses infect files that are created using certain applications or

programs that contain macros These mini-programs make it possible to automate series of operations so that they are performed as a single action thereby saving the user from having to carry them out one by one

Examples of macro viruses Relax MelissaA Bablas O97MY2K

Directory VirusDirectory viruses change the paths that indicate the location of a file By

executing a program (file with the extension EXE or COM) which has been infected by a virus you are unknowingly running the virus program while the original file and program have been previously moved by the virus

Once infected it becomes impossible to locate the original files

Polymorphic VirusPolymorphic viruses encrypt or encode themselves in a different way

(using different algorithms and encryption keys) every time they infect a system

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves

Examples include Elkern Marburg Satan Bug and Tuareg

File InfectorsThis type of virus infects programs or executable files (files with an EXE

or COM extension) When one of these programs is run directly or indirectly the virus is activated producing the damaging effects it is programmed to carry out The majority of existing viruses belong to this category and can be classified depending on the actions that they carry out

Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types They are known as companion viruses because once they get into the system they accompany the other files that already exist In other words in order to carry out their infection routines companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses)

Some examples include Stator Asimov1539 and Terrax1069

FAT VirusThe file allocation table or FAT is the part of a disk used to connect

information and is a vital part of the normal functioning of the computerThis type of virus attack can be especially dangerous by preventing access to certain sections of the disk where important files are stored Damage caused can result in information losses from individual files or even entire directories

WormsA worm is a program very similar to a virus it has the ability to self-

replicate and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses

Examples of worms include PSWBugbearB LovgateF TrileC SobigD Mapson

Trojans or Trojan HorsesAnother unsavory breed of malicious code are Trojans or Trojan horses

which unlike viruses do not reproduce by infecting other files nor do they self-replicate like worms

Logic BombsThey are not considered viruses because they do not replicate They are not

even programs in their own right but rather camouflaged segments of other programs

Their objective is to destroy data on the computer once certain conditions have been met Logic bombs go undetected until launched and the results can be destructive

E How Do You Stay Safe On The Internet

The first part of the answer to the question How do you stay safe on the Internet is know what the threats are that you and your computer are up against

Without this knowledge how are you going to know youve got everything covered off Do you just rely on what the security software vendors tell you to spend your money on

By being aware of what the risks are I suggest you will save yourself money and have more effective protection when it comes to the second part of the answer to the question How do you stay safe on the Internet selecting effective prevention and protection to guard privacy and online security

To help you decide what is necessary for your particular protection in The Three Levels Of Internet Risk Protection I talk about the safe practices that help protect your computer and the types of software to use -- from those that are absolutely essential for security to others which you may want to install to guard privacy to the level you desire

But back to this article How Do You Stay Safe On The Internet here Ill provide you with an introduction to each type of threat At the end of it youll have a good feel for the dangers on the Internet and how those threats can affect you your PC and your information be it personal financial family or business

There are ten of the most prevalent threats covered here Either go through them all or click on the links below for those you are particularly interested in

1 Viruses and Worms 2 Trojan Horses 3 Rootkits 4 Crackers and Hackers 5 Spam 6 Web Bugs 7 Child Security 8 Pop-UpUnder Ads 9 Tracking Cookies 10 Spyware

By the way Ive tried to keep the technical language simple but if you dont understand some of the terms check them out at Netlingo which provides definitions and explanations for all Net terminology

1 Viruses And Worms

What Is A VirusA virus is a man-made computer program that infects a file or program on our computers Each time the infected program is run the virus is also triggered It spreads itself by infecting other programs on the same computer

What Is A WormA worm is also a man-made program that replicates itself However unlike a virus it does not infect other program files on the computer Instead a worm spreads itself automatically to other computers through email over a network and via Internet Relay Chat (IRC)

How Do We Get InfectedViruses and worms can infect desktop computers laptops and network servers and reach our PCs from email web sites downloaded files and loadable media (eg floppy disks CD-ROMs and DVDs)

How Does A Virus Or Worm Infection Affect UsUnfortunately the effects of an infection are pretty unpleasant The virus or worm can

Disable the computer

Add modify or delete files or reformat the hard disk

Steal addresses held in our computer to send on virus-infected emails to our friends colleagues clients or customers

Send unsolicited bulk email (spam) to those in our mail address books and other users

2 Trojan Horses

What Is A Trojan HorseAlthough Trojan horse programs are categorized as viruses they are not true viruses since they do not replicate But like viruses they are one of the most destructive of the Internet risks covered in How Do You Stay Safe On The Internet and are favored by crackers and spyware writers

How Do We Get InfectedTrojans are one of the sneakiest of the online risks They are often downloaded on the back of a free program (freeware) that has some value to the user -- a free game software program or music for instance

How Does A Trojan Infection Affect Us

A Trojan installed on a computer allows that PC to be entered via a backdoor by any remote user that has the access code to the Trojan

The remote attacker can enter the computer undetected when the user is online to access or destroy any information stored Alternatively the Trojan can be programmed to automatically send any information on our PCs back to the attacker This could include

Client or customer information or other business data

Credit card details

Passwords for access to your online bank ISP or web services

Information you would rather remain hidden

Email addresses which may be used for spamming

Childrens names photographs ages or other personal details held on the computer

Distributed Denial of Service (DDOS) attack on other computers via the victims computer

No wonder we ask how do you stay safe on the Internet

3 How Do You Stay Safe On The InternetRootkitsWhat Is A RootkitRootkits are not destructive in their own right but they are designed to conceal the presence of malicious programs on a computer

How Do We Get InfectedAs with any malware such as viruses worms Trojans and spyware rootkits get onto our computers by various means such as through spam attachments being opened on the back of free downloads or planted by crackers who have breached computer defenses

How Does A Rootkit Affect UsRootkits are there for one reason only to ensure that an intruder can access our system and take control without detection by defenses to guard privacy and security

One of the most common and worrying uses of rootkits which causes us to ask How Do You Stay Safe On The Internet is to launch spam and denial of service (DOS) attacks against other computers or networks Another use of

rootkits is to hide Trojans so an intruder can easily use it to extract data from your computer as mentioned above

4 Crackers And Hackers

What Is A HackerCrackerThe term hacker is a misused term We should really be referring to a cracker to describe those who break security on a computer system

The original term hacker refers to computer enthusiasts who enjoy learning everything about a computer system

How Do We Get AttackedCrackers run programs that scan computer ports over the Internet to work out which ports are accessible If our computer shows up in one of these scans the cracker may decide to enter our PC

Crackers favorite targets are the home and home office computers connected by broadband to the Internet because the connection is always open there is more opportunity to locate these computers with their scanners

Alternatively crackers may just exploit weaknesses that have not been patched in the computers operating system in order to gain entry As discussed above Trojans are another way crackers use to gain access to our PCs

How Does A Cracker Affect UsBesides the potentially valuable information they can obtain from our PCs such as that listed under Trojans these intruders also want our hard disk space and Internet connection With these resources they can use our computers to send out spam or attack other computers on the Internet and all this can be done without our knowledge Another reason why we should know how do you stay safe on the Internet

5 Spam -- Unsolicited Email

What Is SpamSpam is defined in Dictionarycom as Unsolicited e-mail often of a commercial nature sent indiscriminately to multiple mailing lists individuals or newsgroups junk e-mail

Spammers peddle pornography sexual aids diet pills and get-rich-quick schemes in fact anything that has a perceived value

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

These use email to support discussion groups on a wide range of specific subjectsOnce you are becoming a subscriber of a mailing list you will receive lot of emails related to the subject covered by the mailing list

B13 FTPFTP was the original Internet mechanism for the storage and retrieval of information There are still many FTP Sites around the Internet although many of them have been melded into the World Wide Web In computer science FTP stands for File Transfer Protocol which is a way of transferring files between computers A file can be anything -- a spreadsheet a word document a song or a picture When someone says Please FTP me that file for instance that means Please transfer that file from your computer to mine To FTP you usually need to download a special program or application You also usually need a password to be able to access or send information to someone elses computer

B14 GopherGopher was developed at the University of Minnesota primarily to support its own Campus Wide Information Server (CWIS) It provides access to information available either locally or elsewhere on the Internet by means of a simple series of uniformly designed menus

B15 Instant Messaging (IM)There are lots of other fun and useful IM features you can explore like group chats file transfers voice calls video conferencing and emoticons that reflect your mood

B16 IRCIRC stands for Internet Relay Chat It has been used in many countries around the world IRC is a multi-user chat system where people meet on channels (rooms virtual places usually with a certain topic of conversation) to talk in groups or privately There is no restriction to the number of people that can participate in a given discussion or the number of channels that can be formed on IRC

B17 NewsgroupsThe Internet has a place where we can gather question and discuss our experiences within a wide variety of topics Its called Usenet News Some users also call it Net NewsThink of Usenet News as a giant worldwide bulletin board Anyone can freely post something on this bulletin board Everyone else can read the posted items and add their own items These voluntary contributions and free exchange of information are the foundation of the Internet

B18 Voice over IPVoice over IP (Voice over Internet Protocol or VoIP) technology converts voice calls from analog to digital to be sent over digital data networks In Voice over IP or VoIP voice data and video all travel along the network

B19 World Wide Web (WWW)The newest information application on the Internet the WWW provides standardized access to Gopher FTP Telnet and more by means of home pages designed either by institutions or

b individuals By means of the HyperText Markup Language (HTML) it allows users to point at highlighted terms following links to whatever information interests them It is a multimedia environment allowing Internet users access to audio and video materials There are a number of client software packages (or browsers) including Lynx (a textonly browser) Netscape and Microsofts Internet Explorer (which are multimedia browsers)

C Types of Internet Connection

C1 Types of Internet connections

The options for providing user connectivity to the Internet are given below

1 Terminal DialupModem (Shell connection)1048707 Most common option1048707 User requirements limited to modem and communications software1048707 Text-only access1048707 Shell accounts were more popular before the advent of the Web A shell account lets

you use your computer much as if it were a virtual console associated with a remote computer You can type commands which are interpreted by the remote computer and view the resulting output on your computer Although a few web browsers such as Lynx can operate via a shell account they donrsquot generally support the highly graphical multimedia pages which web surfers have come to expect

2 SLIP (Serial Line Internet Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software SLIP software amp software for Internet

applications1048707 Multimedia access

3 PPP (Point-to-Point Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software PPP software amp software for Internet

applications1048707 Multimedia access1048707 While your computer is connected to the Internet you can use it to surf the Web with

your favorite browser If your ISP allows you can even run a web server providing pages that can be viewed by others around the world

4 ISDN (Integrated Services Digital Network)1048707 Most often used to connect remote telecommuters to office LANs1048707 Requires ISDN phone line access1048707 Faster than analog terminal dialupmodem service

1048707 User must have ISDN phone line ISDN card communications software TCP software amp SLIP or PPP software multimedia connectivity

5 DIAS1048707 The DIAS offers a wire-line solution for high speed symmetrical Internet access on the

existing telephone lines It provides an always on internet access that is permanently available at customers premises DIAS combines voice and internet data packets on a single twisted pair wire at subscriber premises that means you can use telephone and surf internet at the same time

6 Cable Modem1048707 The term ldquoCable Modemrdquo is quite new and refers to a modem that operates over the

ordinary cable TV network cables Basically you just connect the Cable Modem to the TV outlet for your cable TV and the cable TV operator connects a Cable Modem Termination System (CMTS) in his end (the Head-End)

1048707 Actually the term ldquoCable Modemrdquo is a bit misleading as a Cable Modem works more like a Local Area Network (LAN) interface than as a modem

1048707 In a cable TV system signals from the various channels are each given a 6-MHz slice of the cablersquos available bandwidth and then sent down the cable to your house When a cable company offers Internet access over the cable Internet information can use the same cables because the cable modem system puts downstream data ndash data sent from the Internet to an individual computer ndash into a 6-MHz channel On the cable the data looks just like a TV channel So Internet downstream data takes up the same amount of cable space as any single channel of programming Upstream data ndash information sent from an individual back to the Internet ndash requires even less of the cablersquos bandwidth just 2 MHz since the assumption is that most people download far more information than they upload

1048707 Putting both upstream and downstream data on the cable television system requires two types of equipment a cable modem on the customer end and a cable modem termination system (CMTS) at the cable providerrsquos end Between these two types of equipment all the computer networking security and management of Internet access over cable television is put into place

7 Digital Subscriber Line (DSL) connection1048707 DSL is a very high-speed connection that uses the same wires as a regular telephone

line1048707 Here are some advantages of DSL

1 You can leave your Internet connection open and still use the phone line for voice calls

2 The speed is much higher than a regular modem3 DSL doesnrsquot necessarily require new wiring it can use the phone line you

already have4 The company that offers DSL (eg BSNL) will usually provide the modem as

part of the installation1048707 But there are disadvantages

1 A DSL connection works better when you are closer to the providerrsquos central office

2 The service is not available everywhere1048707 Other types of DSL include

1 Asymmetric DSL (ADSL) line ndash The connection is faster for receiving data than it is for sending data over the Internet

2 Very high bit-rate DSL (VDSL) ndash This is a fast connection but works only over a short distance

3 Symmetric DSL (SDSL) ndash This connection used mainly by small businesses doesnrsquot allow you to use the phone at the same time but the speed of receiving and sending data is the same

4 Rate-adaptive DSL (RADSL) ndash This is a variation of ADSL but the modem can adjust the speed of the connection depending on the length and quality of the line

8 Direct Connection (Leased circuit)1048707 Most often used to connect sites within a specific organization such as a university or

business requires owning or leasing of cable (from 64 kbps to T-3) users typically connected via Ethernet LANs multimedia connectivity at its fastest

9 Satellite connections1048707 This connection allows you to download Internet files via a satellite connection This is

an efficient method for receiving large Web graphics and other items but you still need a modem connection for other features You must purchase the connection hardware as well as subscribe to the service

10 Wireless connections1048707 Pagers cellular phones and personal digital assistants (PDAs) now allow varying levels

of Internet access from notification of E-mail to limited Web connections Many of these services remain in the experimental stage The PPP connection is called as TCPIP connection or PSTN dial-up connection ISDN connection is called as ISDN dial-up connection Cable Modem DSL and Direct Connection are always-on connection The words ldquoconnectionrdquo and ldquoaccountrdquo related to Internet are interchangeable

D Computer Virus

The Internet just like the rest of the world is not a perfectly safe place to visit If you download files from the Internet there is a chance a very small chance but nonetheless a chance that your computer could become infected with a virus

Viruses are malicious programs that invade your computer They can cause many different kinds of damage such as deleting data files erasing programs or destroying

everything they find on your hard disk Not every virus causes damage some simply flash annoying messages

Different Types of Computer VirusesThere are Different Types of Computer Viruses could be classified in

(origin techniques types of files they infect where they hide the kind of damage they cause the type of operating system or platform they attack) etc Let us have a look at themhellip

Computer Virus is a kind of malicious software written intentionally to enter a computer without the userrsquos permission or knowledge with an ability to replicate itself thus continuing to spread Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system A virus should never be assumed harmless and left on a system Most common types of viruses are mentioned below

Resident VirusesThis type of virus is a permanent which dwells in the RAM memory From

there it can overcome and interrupt all of the operations executed by the system corrupting files and programs that are opened closed copied renamed etc

Examples include Randex CMJ Meve and MrKlunky

Direct Action VirusesThe main purpose of this virus is to replicate and take action when it is

executed When a specific condition is met the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXECBAT file PATH This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted

Overwrite VirusesVirus of this kind is characterized by the fact that it deletes the information

contained in the files that it infects rendering them partially or totally useless once they have been infected

The only way to clean a file infected by an overwrite virus is to delete the file completely thus losing the original content

Examples of this virus include Way TrjReboot Trivial88D

Boot Virus

This type of virus affects the boot sector of a floppy or hard disk This is a crucial part of a disk in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive

Examples of boot viruses include PolybootB AntiEXE

Macro VirusMacro viruses infect files that are created using certain applications or

programs that contain macros These mini-programs make it possible to automate series of operations so that they are performed as a single action thereby saving the user from having to carry them out one by one

Examples of macro viruses Relax MelissaA Bablas O97MY2K

Directory VirusDirectory viruses change the paths that indicate the location of a file By

executing a program (file with the extension EXE or COM) which has been infected by a virus you are unknowingly running the virus program while the original file and program have been previously moved by the virus

Once infected it becomes impossible to locate the original files

Polymorphic VirusPolymorphic viruses encrypt or encode themselves in a different way

(using different algorithms and encryption keys) every time they infect a system

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves

Examples include Elkern Marburg Satan Bug and Tuareg

File InfectorsThis type of virus infects programs or executable files (files with an EXE

or COM extension) When one of these programs is run directly or indirectly the virus is activated producing the damaging effects it is programmed to carry out The majority of existing viruses belong to this category and can be classified depending on the actions that they carry out

Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types They are known as companion viruses because once they get into the system they accompany the other files that already exist In other words in order to carry out their infection routines companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses)

Some examples include Stator Asimov1539 and Terrax1069

FAT VirusThe file allocation table or FAT is the part of a disk used to connect

information and is a vital part of the normal functioning of the computerThis type of virus attack can be especially dangerous by preventing access to certain sections of the disk where important files are stored Damage caused can result in information losses from individual files or even entire directories

WormsA worm is a program very similar to a virus it has the ability to self-

replicate and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses

Examples of worms include PSWBugbearB LovgateF TrileC SobigD Mapson

Trojans or Trojan HorsesAnother unsavory breed of malicious code are Trojans or Trojan horses

which unlike viruses do not reproduce by infecting other files nor do they self-replicate like worms

Logic BombsThey are not considered viruses because they do not replicate They are not

even programs in their own right but rather camouflaged segments of other programs

Their objective is to destroy data on the computer once certain conditions have been met Logic bombs go undetected until launched and the results can be destructive

E How Do You Stay Safe On The Internet

The first part of the answer to the question How do you stay safe on the Internet is know what the threats are that you and your computer are up against

Without this knowledge how are you going to know youve got everything covered off Do you just rely on what the security software vendors tell you to spend your money on

By being aware of what the risks are I suggest you will save yourself money and have more effective protection when it comes to the second part of the answer to the question How do you stay safe on the Internet selecting effective prevention and protection to guard privacy and online security

To help you decide what is necessary for your particular protection in The Three Levels Of Internet Risk Protection I talk about the safe practices that help protect your computer and the types of software to use -- from those that are absolutely essential for security to others which you may want to install to guard privacy to the level you desire

But back to this article How Do You Stay Safe On The Internet here Ill provide you with an introduction to each type of threat At the end of it youll have a good feel for the dangers on the Internet and how those threats can affect you your PC and your information be it personal financial family or business

There are ten of the most prevalent threats covered here Either go through them all or click on the links below for those you are particularly interested in

1 Viruses and Worms 2 Trojan Horses 3 Rootkits 4 Crackers and Hackers 5 Spam 6 Web Bugs 7 Child Security 8 Pop-UpUnder Ads 9 Tracking Cookies 10 Spyware

By the way Ive tried to keep the technical language simple but if you dont understand some of the terms check them out at Netlingo which provides definitions and explanations for all Net terminology

1 Viruses And Worms

What Is A VirusA virus is a man-made computer program that infects a file or program on our computers Each time the infected program is run the virus is also triggered It spreads itself by infecting other programs on the same computer

What Is A WormA worm is also a man-made program that replicates itself However unlike a virus it does not infect other program files on the computer Instead a worm spreads itself automatically to other computers through email over a network and via Internet Relay Chat (IRC)

How Do We Get InfectedViruses and worms can infect desktop computers laptops and network servers and reach our PCs from email web sites downloaded files and loadable media (eg floppy disks CD-ROMs and DVDs)

How Does A Virus Or Worm Infection Affect UsUnfortunately the effects of an infection are pretty unpleasant The virus or worm can

Disable the computer

Add modify or delete files or reformat the hard disk

Steal addresses held in our computer to send on virus-infected emails to our friends colleagues clients or customers

Send unsolicited bulk email (spam) to those in our mail address books and other users

2 Trojan Horses

What Is A Trojan HorseAlthough Trojan horse programs are categorized as viruses they are not true viruses since they do not replicate But like viruses they are one of the most destructive of the Internet risks covered in How Do You Stay Safe On The Internet and are favored by crackers and spyware writers

How Do We Get InfectedTrojans are one of the sneakiest of the online risks They are often downloaded on the back of a free program (freeware) that has some value to the user -- a free game software program or music for instance

How Does A Trojan Infection Affect Us

A Trojan installed on a computer allows that PC to be entered via a backdoor by any remote user that has the access code to the Trojan

The remote attacker can enter the computer undetected when the user is online to access or destroy any information stored Alternatively the Trojan can be programmed to automatically send any information on our PCs back to the attacker This could include

Client or customer information or other business data

Credit card details

Passwords for access to your online bank ISP or web services

Information you would rather remain hidden

Email addresses which may be used for spamming

Childrens names photographs ages or other personal details held on the computer

Distributed Denial of Service (DDOS) attack on other computers via the victims computer

No wonder we ask how do you stay safe on the Internet

3 How Do You Stay Safe On The InternetRootkitsWhat Is A RootkitRootkits are not destructive in their own right but they are designed to conceal the presence of malicious programs on a computer

How Do We Get InfectedAs with any malware such as viruses worms Trojans and spyware rootkits get onto our computers by various means such as through spam attachments being opened on the back of free downloads or planted by crackers who have breached computer defenses

How Does A Rootkit Affect UsRootkits are there for one reason only to ensure that an intruder can access our system and take control without detection by defenses to guard privacy and security

One of the most common and worrying uses of rootkits which causes us to ask How Do You Stay Safe On The Internet is to launch spam and denial of service (DOS) attacks against other computers or networks Another use of

rootkits is to hide Trojans so an intruder can easily use it to extract data from your computer as mentioned above

4 Crackers And Hackers

What Is A HackerCrackerThe term hacker is a misused term We should really be referring to a cracker to describe those who break security on a computer system

The original term hacker refers to computer enthusiasts who enjoy learning everything about a computer system

How Do We Get AttackedCrackers run programs that scan computer ports over the Internet to work out which ports are accessible If our computer shows up in one of these scans the cracker may decide to enter our PC

Crackers favorite targets are the home and home office computers connected by broadband to the Internet because the connection is always open there is more opportunity to locate these computers with their scanners

Alternatively crackers may just exploit weaknesses that have not been patched in the computers operating system in order to gain entry As discussed above Trojans are another way crackers use to gain access to our PCs

How Does A Cracker Affect UsBesides the potentially valuable information they can obtain from our PCs such as that listed under Trojans these intruders also want our hard disk space and Internet connection With these resources they can use our computers to send out spam or attack other computers on the Internet and all this can be done without our knowledge Another reason why we should know how do you stay safe on the Internet

5 Spam -- Unsolicited Email

What Is SpamSpam is defined in Dictionarycom as Unsolicited e-mail often of a commercial nature sent indiscriminately to multiple mailing lists individuals or newsgroups junk e-mail

Spammers peddle pornography sexual aids diet pills and get-rich-quick schemes in fact anything that has a perceived value

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

b individuals By means of the HyperText Markup Language (HTML) it allows users to point at highlighted terms following links to whatever information interests them It is a multimedia environment allowing Internet users access to audio and video materials There are a number of client software packages (or browsers) including Lynx (a textonly browser) Netscape and Microsofts Internet Explorer (which are multimedia browsers)

C Types of Internet Connection

C1 Types of Internet connections

The options for providing user connectivity to the Internet are given below

1 Terminal DialupModem (Shell connection)1048707 Most common option1048707 User requirements limited to modem and communications software1048707 Text-only access1048707 Shell accounts were more popular before the advent of the Web A shell account lets

you use your computer much as if it were a virtual console associated with a remote computer You can type commands which are interpreted by the remote computer and view the resulting output on your computer Although a few web browsers such as Lynx can operate via a shell account they donrsquot generally support the highly graphical multimedia pages which web surfers have come to expect

2 SLIP (Serial Line Internet Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software SLIP software amp software for Internet

applications1048707 Multimedia access

3 PPP (Point-to-Point Protocol)1048707 Computer is treated as though it were directly connected for the period it is online1048707 Utilizes telephone lines1048707 User must have modem TCP software PPP software amp software for Internet

applications1048707 Multimedia access1048707 While your computer is connected to the Internet you can use it to surf the Web with

your favorite browser If your ISP allows you can even run a web server providing pages that can be viewed by others around the world

4 ISDN (Integrated Services Digital Network)1048707 Most often used to connect remote telecommuters to office LANs1048707 Requires ISDN phone line access1048707 Faster than analog terminal dialupmodem service

1048707 User must have ISDN phone line ISDN card communications software TCP software amp SLIP or PPP software multimedia connectivity

5 DIAS1048707 The DIAS offers a wire-line solution for high speed symmetrical Internet access on the

existing telephone lines It provides an always on internet access that is permanently available at customers premises DIAS combines voice and internet data packets on a single twisted pair wire at subscriber premises that means you can use telephone and surf internet at the same time

6 Cable Modem1048707 The term ldquoCable Modemrdquo is quite new and refers to a modem that operates over the

ordinary cable TV network cables Basically you just connect the Cable Modem to the TV outlet for your cable TV and the cable TV operator connects a Cable Modem Termination System (CMTS) in his end (the Head-End)

1048707 Actually the term ldquoCable Modemrdquo is a bit misleading as a Cable Modem works more like a Local Area Network (LAN) interface than as a modem

1048707 In a cable TV system signals from the various channels are each given a 6-MHz slice of the cablersquos available bandwidth and then sent down the cable to your house When a cable company offers Internet access over the cable Internet information can use the same cables because the cable modem system puts downstream data ndash data sent from the Internet to an individual computer ndash into a 6-MHz channel On the cable the data looks just like a TV channel So Internet downstream data takes up the same amount of cable space as any single channel of programming Upstream data ndash information sent from an individual back to the Internet ndash requires even less of the cablersquos bandwidth just 2 MHz since the assumption is that most people download far more information than they upload

1048707 Putting both upstream and downstream data on the cable television system requires two types of equipment a cable modem on the customer end and a cable modem termination system (CMTS) at the cable providerrsquos end Between these two types of equipment all the computer networking security and management of Internet access over cable television is put into place

7 Digital Subscriber Line (DSL) connection1048707 DSL is a very high-speed connection that uses the same wires as a regular telephone

line1048707 Here are some advantages of DSL

1 You can leave your Internet connection open and still use the phone line for voice calls

2 The speed is much higher than a regular modem3 DSL doesnrsquot necessarily require new wiring it can use the phone line you

already have4 The company that offers DSL (eg BSNL) will usually provide the modem as

part of the installation1048707 But there are disadvantages

1 A DSL connection works better when you are closer to the providerrsquos central office

2 The service is not available everywhere1048707 Other types of DSL include

1 Asymmetric DSL (ADSL) line ndash The connection is faster for receiving data than it is for sending data over the Internet

2 Very high bit-rate DSL (VDSL) ndash This is a fast connection but works only over a short distance

3 Symmetric DSL (SDSL) ndash This connection used mainly by small businesses doesnrsquot allow you to use the phone at the same time but the speed of receiving and sending data is the same

4 Rate-adaptive DSL (RADSL) ndash This is a variation of ADSL but the modem can adjust the speed of the connection depending on the length and quality of the line

8 Direct Connection (Leased circuit)1048707 Most often used to connect sites within a specific organization such as a university or

business requires owning or leasing of cable (from 64 kbps to T-3) users typically connected via Ethernet LANs multimedia connectivity at its fastest

9 Satellite connections1048707 This connection allows you to download Internet files via a satellite connection This is

an efficient method for receiving large Web graphics and other items but you still need a modem connection for other features You must purchase the connection hardware as well as subscribe to the service

10 Wireless connections1048707 Pagers cellular phones and personal digital assistants (PDAs) now allow varying levels

of Internet access from notification of E-mail to limited Web connections Many of these services remain in the experimental stage The PPP connection is called as TCPIP connection or PSTN dial-up connection ISDN connection is called as ISDN dial-up connection Cable Modem DSL and Direct Connection are always-on connection The words ldquoconnectionrdquo and ldquoaccountrdquo related to Internet are interchangeable

D Computer Virus

The Internet just like the rest of the world is not a perfectly safe place to visit If you download files from the Internet there is a chance a very small chance but nonetheless a chance that your computer could become infected with a virus

Viruses are malicious programs that invade your computer They can cause many different kinds of damage such as deleting data files erasing programs or destroying

everything they find on your hard disk Not every virus causes damage some simply flash annoying messages

Different Types of Computer VirusesThere are Different Types of Computer Viruses could be classified in

(origin techniques types of files they infect where they hide the kind of damage they cause the type of operating system or platform they attack) etc Let us have a look at themhellip

Computer Virus is a kind of malicious software written intentionally to enter a computer without the userrsquos permission or knowledge with an ability to replicate itself thus continuing to spread Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system A virus should never be assumed harmless and left on a system Most common types of viruses are mentioned below

Resident VirusesThis type of virus is a permanent which dwells in the RAM memory From

there it can overcome and interrupt all of the operations executed by the system corrupting files and programs that are opened closed copied renamed etc

Examples include Randex CMJ Meve and MrKlunky

Direct Action VirusesThe main purpose of this virus is to replicate and take action when it is

executed When a specific condition is met the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXECBAT file PATH This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted

Overwrite VirusesVirus of this kind is characterized by the fact that it deletes the information

contained in the files that it infects rendering them partially or totally useless once they have been infected

The only way to clean a file infected by an overwrite virus is to delete the file completely thus losing the original content

Examples of this virus include Way TrjReboot Trivial88D

Boot Virus

This type of virus affects the boot sector of a floppy or hard disk This is a crucial part of a disk in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive

Examples of boot viruses include PolybootB AntiEXE

Macro VirusMacro viruses infect files that are created using certain applications or

programs that contain macros These mini-programs make it possible to automate series of operations so that they are performed as a single action thereby saving the user from having to carry them out one by one

Examples of macro viruses Relax MelissaA Bablas O97MY2K

Directory VirusDirectory viruses change the paths that indicate the location of a file By

executing a program (file with the extension EXE or COM) which has been infected by a virus you are unknowingly running the virus program while the original file and program have been previously moved by the virus

Once infected it becomes impossible to locate the original files

Polymorphic VirusPolymorphic viruses encrypt or encode themselves in a different way

(using different algorithms and encryption keys) every time they infect a system

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves

Examples include Elkern Marburg Satan Bug and Tuareg

File InfectorsThis type of virus infects programs or executable files (files with an EXE

or COM extension) When one of these programs is run directly or indirectly the virus is activated producing the damaging effects it is programmed to carry out The majority of existing viruses belong to this category and can be classified depending on the actions that they carry out

Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types They are known as companion viruses because once they get into the system they accompany the other files that already exist In other words in order to carry out their infection routines companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses)

Some examples include Stator Asimov1539 and Terrax1069

FAT VirusThe file allocation table or FAT is the part of a disk used to connect

information and is a vital part of the normal functioning of the computerThis type of virus attack can be especially dangerous by preventing access to certain sections of the disk where important files are stored Damage caused can result in information losses from individual files or even entire directories

WormsA worm is a program very similar to a virus it has the ability to self-

replicate and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses

Examples of worms include PSWBugbearB LovgateF TrileC SobigD Mapson

Trojans or Trojan HorsesAnother unsavory breed of malicious code are Trojans or Trojan horses

which unlike viruses do not reproduce by infecting other files nor do they self-replicate like worms

Logic BombsThey are not considered viruses because they do not replicate They are not

even programs in their own right but rather camouflaged segments of other programs

Their objective is to destroy data on the computer once certain conditions have been met Logic bombs go undetected until launched and the results can be destructive

E How Do You Stay Safe On The Internet

The first part of the answer to the question How do you stay safe on the Internet is know what the threats are that you and your computer are up against

Without this knowledge how are you going to know youve got everything covered off Do you just rely on what the security software vendors tell you to spend your money on

By being aware of what the risks are I suggest you will save yourself money and have more effective protection when it comes to the second part of the answer to the question How do you stay safe on the Internet selecting effective prevention and protection to guard privacy and online security

To help you decide what is necessary for your particular protection in The Three Levels Of Internet Risk Protection I talk about the safe practices that help protect your computer and the types of software to use -- from those that are absolutely essential for security to others which you may want to install to guard privacy to the level you desire

But back to this article How Do You Stay Safe On The Internet here Ill provide you with an introduction to each type of threat At the end of it youll have a good feel for the dangers on the Internet and how those threats can affect you your PC and your information be it personal financial family or business

There are ten of the most prevalent threats covered here Either go through them all or click on the links below for those you are particularly interested in

1 Viruses and Worms 2 Trojan Horses 3 Rootkits 4 Crackers and Hackers 5 Spam 6 Web Bugs 7 Child Security 8 Pop-UpUnder Ads 9 Tracking Cookies 10 Spyware

By the way Ive tried to keep the technical language simple but if you dont understand some of the terms check them out at Netlingo which provides definitions and explanations for all Net terminology

1 Viruses And Worms

What Is A VirusA virus is a man-made computer program that infects a file or program on our computers Each time the infected program is run the virus is also triggered It spreads itself by infecting other programs on the same computer

What Is A WormA worm is also a man-made program that replicates itself However unlike a virus it does not infect other program files on the computer Instead a worm spreads itself automatically to other computers through email over a network and via Internet Relay Chat (IRC)

How Do We Get InfectedViruses and worms can infect desktop computers laptops and network servers and reach our PCs from email web sites downloaded files and loadable media (eg floppy disks CD-ROMs and DVDs)

How Does A Virus Or Worm Infection Affect UsUnfortunately the effects of an infection are pretty unpleasant The virus or worm can

Disable the computer

Add modify or delete files or reformat the hard disk

Steal addresses held in our computer to send on virus-infected emails to our friends colleagues clients or customers

Send unsolicited bulk email (spam) to those in our mail address books and other users

2 Trojan Horses

What Is A Trojan HorseAlthough Trojan horse programs are categorized as viruses they are not true viruses since they do not replicate But like viruses they are one of the most destructive of the Internet risks covered in How Do You Stay Safe On The Internet and are favored by crackers and spyware writers

How Do We Get InfectedTrojans are one of the sneakiest of the online risks They are often downloaded on the back of a free program (freeware) that has some value to the user -- a free game software program or music for instance

How Does A Trojan Infection Affect Us

A Trojan installed on a computer allows that PC to be entered via a backdoor by any remote user that has the access code to the Trojan

The remote attacker can enter the computer undetected when the user is online to access or destroy any information stored Alternatively the Trojan can be programmed to automatically send any information on our PCs back to the attacker This could include

Client or customer information or other business data

Credit card details

Passwords for access to your online bank ISP or web services

Information you would rather remain hidden

Email addresses which may be used for spamming

Childrens names photographs ages or other personal details held on the computer

Distributed Denial of Service (DDOS) attack on other computers via the victims computer

No wonder we ask how do you stay safe on the Internet

3 How Do You Stay Safe On The InternetRootkitsWhat Is A RootkitRootkits are not destructive in their own right but they are designed to conceal the presence of malicious programs on a computer

How Do We Get InfectedAs with any malware such as viruses worms Trojans and spyware rootkits get onto our computers by various means such as through spam attachments being opened on the back of free downloads or planted by crackers who have breached computer defenses

How Does A Rootkit Affect UsRootkits are there for one reason only to ensure that an intruder can access our system and take control without detection by defenses to guard privacy and security

One of the most common and worrying uses of rootkits which causes us to ask How Do You Stay Safe On The Internet is to launch spam and denial of service (DOS) attacks against other computers or networks Another use of

rootkits is to hide Trojans so an intruder can easily use it to extract data from your computer as mentioned above

4 Crackers And Hackers

What Is A HackerCrackerThe term hacker is a misused term We should really be referring to a cracker to describe those who break security on a computer system

The original term hacker refers to computer enthusiasts who enjoy learning everything about a computer system

How Do We Get AttackedCrackers run programs that scan computer ports over the Internet to work out which ports are accessible If our computer shows up in one of these scans the cracker may decide to enter our PC

Crackers favorite targets are the home and home office computers connected by broadband to the Internet because the connection is always open there is more opportunity to locate these computers with their scanners

Alternatively crackers may just exploit weaknesses that have not been patched in the computers operating system in order to gain entry As discussed above Trojans are another way crackers use to gain access to our PCs

How Does A Cracker Affect UsBesides the potentially valuable information they can obtain from our PCs such as that listed under Trojans these intruders also want our hard disk space and Internet connection With these resources they can use our computers to send out spam or attack other computers on the Internet and all this can be done without our knowledge Another reason why we should know how do you stay safe on the Internet

5 Spam -- Unsolicited Email

What Is SpamSpam is defined in Dictionarycom as Unsolicited e-mail often of a commercial nature sent indiscriminately to multiple mailing lists individuals or newsgroups junk e-mail

Spammers peddle pornography sexual aids diet pills and get-rich-quick schemes in fact anything that has a perceived value

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

1048707 User must have ISDN phone line ISDN card communications software TCP software amp SLIP or PPP software multimedia connectivity

5 DIAS1048707 The DIAS offers a wire-line solution for high speed symmetrical Internet access on the

existing telephone lines It provides an always on internet access that is permanently available at customers premises DIAS combines voice and internet data packets on a single twisted pair wire at subscriber premises that means you can use telephone and surf internet at the same time

6 Cable Modem1048707 The term ldquoCable Modemrdquo is quite new and refers to a modem that operates over the

ordinary cable TV network cables Basically you just connect the Cable Modem to the TV outlet for your cable TV and the cable TV operator connects a Cable Modem Termination System (CMTS) in his end (the Head-End)

1048707 Actually the term ldquoCable Modemrdquo is a bit misleading as a Cable Modem works more like a Local Area Network (LAN) interface than as a modem

1048707 In a cable TV system signals from the various channels are each given a 6-MHz slice of the cablersquos available bandwidth and then sent down the cable to your house When a cable company offers Internet access over the cable Internet information can use the same cables because the cable modem system puts downstream data ndash data sent from the Internet to an individual computer ndash into a 6-MHz channel On the cable the data looks just like a TV channel So Internet downstream data takes up the same amount of cable space as any single channel of programming Upstream data ndash information sent from an individual back to the Internet ndash requires even less of the cablersquos bandwidth just 2 MHz since the assumption is that most people download far more information than they upload

1048707 Putting both upstream and downstream data on the cable television system requires two types of equipment a cable modem on the customer end and a cable modem termination system (CMTS) at the cable providerrsquos end Between these two types of equipment all the computer networking security and management of Internet access over cable television is put into place

7 Digital Subscriber Line (DSL) connection1048707 DSL is a very high-speed connection that uses the same wires as a regular telephone

line1048707 Here are some advantages of DSL

1 You can leave your Internet connection open and still use the phone line for voice calls

2 The speed is much higher than a regular modem3 DSL doesnrsquot necessarily require new wiring it can use the phone line you

already have4 The company that offers DSL (eg BSNL) will usually provide the modem as

part of the installation1048707 But there are disadvantages

1 A DSL connection works better when you are closer to the providerrsquos central office

2 The service is not available everywhere1048707 Other types of DSL include

1 Asymmetric DSL (ADSL) line ndash The connection is faster for receiving data than it is for sending data over the Internet

2 Very high bit-rate DSL (VDSL) ndash This is a fast connection but works only over a short distance

3 Symmetric DSL (SDSL) ndash This connection used mainly by small businesses doesnrsquot allow you to use the phone at the same time but the speed of receiving and sending data is the same

4 Rate-adaptive DSL (RADSL) ndash This is a variation of ADSL but the modem can adjust the speed of the connection depending on the length and quality of the line

8 Direct Connection (Leased circuit)1048707 Most often used to connect sites within a specific organization such as a university or

business requires owning or leasing of cable (from 64 kbps to T-3) users typically connected via Ethernet LANs multimedia connectivity at its fastest

9 Satellite connections1048707 This connection allows you to download Internet files via a satellite connection This is

an efficient method for receiving large Web graphics and other items but you still need a modem connection for other features You must purchase the connection hardware as well as subscribe to the service

10 Wireless connections1048707 Pagers cellular phones and personal digital assistants (PDAs) now allow varying levels

of Internet access from notification of E-mail to limited Web connections Many of these services remain in the experimental stage The PPP connection is called as TCPIP connection or PSTN dial-up connection ISDN connection is called as ISDN dial-up connection Cable Modem DSL and Direct Connection are always-on connection The words ldquoconnectionrdquo and ldquoaccountrdquo related to Internet are interchangeable

D Computer Virus

The Internet just like the rest of the world is not a perfectly safe place to visit If you download files from the Internet there is a chance a very small chance but nonetheless a chance that your computer could become infected with a virus

Viruses are malicious programs that invade your computer They can cause many different kinds of damage such as deleting data files erasing programs or destroying

everything they find on your hard disk Not every virus causes damage some simply flash annoying messages

Different Types of Computer VirusesThere are Different Types of Computer Viruses could be classified in

(origin techniques types of files they infect where they hide the kind of damage they cause the type of operating system or platform they attack) etc Let us have a look at themhellip

Computer Virus is a kind of malicious software written intentionally to enter a computer without the userrsquos permission or knowledge with an ability to replicate itself thus continuing to spread Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system A virus should never be assumed harmless and left on a system Most common types of viruses are mentioned below

Resident VirusesThis type of virus is a permanent which dwells in the RAM memory From

there it can overcome and interrupt all of the operations executed by the system corrupting files and programs that are opened closed copied renamed etc

Examples include Randex CMJ Meve and MrKlunky

Direct Action VirusesThe main purpose of this virus is to replicate and take action when it is

executed When a specific condition is met the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXECBAT file PATH This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted

Overwrite VirusesVirus of this kind is characterized by the fact that it deletes the information

contained in the files that it infects rendering them partially or totally useless once they have been infected

The only way to clean a file infected by an overwrite virus is to delete the file completely thus losing the original content

Examples of this virus include Way TrjReboot Trivial88D

Boot Virus

This type of virus affects the boot sector of a floppy or hard disk This is a crucial part of a disk in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive

Examples of boot viruses include PolybootB AntiEXE

Macro VirusMacro viruses infect files that are created using certain applications or

programs that contain macros These mini-programs make it possible to automate series of operations so that they are performed as a single action thereby saving the user from having to carry them out one by one

Examples of macro viruses Relax MelissaA Bablas O97MY2K

Directory VirusDirectory viruses change the paths that indicate the location of a file By

executing a program (file with the extension EXE or COM) which has been infected by a virus you are unknowingly running the virus program while the original file and program have been previously moved by the virus

Once infected it becomes impossible to locate the original files

Polymorphic VirusPolymorphic viruses encrypt or encode themselves in a different way

(using different algorithms and encryption keys) every time they infect a system

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves

Examples include Elkern Marburg Satan Bug and Tuareg

File InfectorsThis type of virus infects programs or executable files (files with an EXE

or COM extension) When one of these programs is run directly or indirectly the virus is activated producing the damaging effects it is programmed to carry out The majority of existing viruses belong to this category and can be classified depending on the actions that they carry out

Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types They are known as companion viruses because once they get into the system they accompany the other files that already exist In other words in order to carry out their infection routines companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses)

Some examples include Stator Asimov1539 and Terrax1069

FAT VirusThe file allocation table or FAT is the part of a disk used to connect

information and is a vital part of the normal functioning of the computerThis type of virus attack can be especially dangerous by preventing access to certain sections of the disk where important files are stored Damage caused can result in information losses from individual files or even entire directories

WormsA worm is a program very similar to a virus it has the ability to self-

replicate and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses

Examples of worms include PSWBugbearB LovgateF TrileC SobigD Mapson

Trojans or Trojan HorsesAnother unsavory breed of malicious code are Trojans or Trojan horses

which unlike viruses do not reproduce by infecting other files nor do they self-replicate like worms

Logic BombsThey are not considered viruses because they do not replicate They are not

even programs in their own right but rather camouflaged segments of other programs

Their objective is to destroy data on the computer once certain conditions have been met Logic bombs go undetected until launched and the results can be destructive

E How Do You Stay Safe On The Internet

The first part of the answer to the question How do you stay safe on the Internet is know what the threats are that you and your computer are up against

Without this knowledge how are you going to know youve got everything covered off Do you just rely on what the security software vendors tell you to spend your money on

By being aware of what the risks are I suggest you will save yourself money and have more effective protection when it comes to the second part of the answer to the question How do you stay safe on the Internet selecting effective prevention and protection to guard privacy and online security

To help you decide what is necessary for your particular protection in The Three Levels Of Internet Risk Protection I talk about the safe practices that help protect your computer and the types of software to use -- from those that are absolutely essential for security to others which you may want to install to guard privacy to the level you desire

But back to this article How Do You Stay Safe On The Internet here Ill provide you with an introduction to each type of threat At the end of it youll have a good feel for the dangers on the Internet and how those threats can affect you your PC and your information be it personal financial family or business

There are ten of the most prevalent threats covered here Either go through them all or click on the links below for those you are particularly interested in

1 Viruses and Worms 2 Trojan Horses 3 Rootkits 4 Crackers and Hackers 5 Spam 6 Web Bugs 7 Child Security 8 Pop-UpUnder Ads 9 Tracking Cookies 10 Spyware

By the way Ive tried to keep the technical language simple but if you dont understand some of the terms check them out at Netlingo which provides definitions and explanations for all Net terminology

1 Viruses And Worms

What Is A VirusA virus is a man-made computer program that infects a file or program on our computers Each time the infected program is run the virus is also triggered It spreads itself by infecting other programs on the same computer

What Is A WormA worm is also a man-made program that replicates itself However unlike a virus it does not infect other program files on the computer Instead a worm spreads itself automatically to other computers through email over a network and via Internet Relay Chat (IRC)

How Do We Get InfectedViruses and worms can infect desktop computers laptops and network servers and reach our PCs from email web sites downloaded files and loadable media (eg floppy disks CD-ROMs and DVDs)

How Does A Virus Or Worm Infection Affect UsUnfortunately the effects of an infection are pretty unpleasant The virus or worm can

Disable the computer

Add modify or delete files or reformat the hard disk

Steal addresses held in our computer to send on virus-infected emails to our friends colleagues clients or customers

Send unsolicited bulk email (spam) to those in our mail address books and other users

2 Trojan Horses

What Is A Trojan HorseAlthough Trojan horse programs are categorized as viruses they are not true viruses since they do not replicate But like viruses they are one of the most destructive of the Internet risks covered in How Do You Stay Safe On The Internet and are favored by crackers and spyware writers

How Do We Get InfectedTrojans are one of the sneakiest of the online risks They are often downloaded on the back of a free program (freeware) that has some value to the user -- a free game software program or music for instance

How Does A Trojan Infection Affect Us

A Trojan installed on a computer allows that PC to be entered via a backdoor by any remote user that has the access code to the Trojan

The remote attacker can enter the computer undetected when the user is online to access or destroy any information stored Alternatively the Trojan can be programmed to automatically send any information on our PCs back to the attacker This could include

Client or customer information or other business data

Credit card details

Passwords for access to your online bank ISP or web services

Information you would rather remain hidden

Email addresses which may be used for spamming

Childrens names photographs ages or other personal details held on the computer

Distributed Denial of Service (DDOS) attack on other computers via the victims computer

No wonder we ask how do you stay safe on the Internet

3 How Do You Stay Safe On The InternetRootkitsWhat Is A RootkitRootkits are not destructive in their own right but they are designed to conceal the presence of malicious programs on a computer

How Do We Get InfectedAs with any malware such as viruses worms Trojans and spyware rootkits get onto our computers by various means such as through spam attachments being opened on the back of free downloads or planted by crackers who have breached computer defenses

How Does A Rootkit Affect UsRootkits are there for one reason only to ensure that an intruder can access our system and take control without detection by defenses to guard privacy and security

One of the most common and worrying uses of rootkits which causes us to ask How Do You Stay Safe On The Internet is to launch spam and denial of service (DOS) attacks against other computers or networks Another use of

rootkits is to hide Trojans so an intruder can easily use it to extract data from your computer as mentioned above

4 Crackers And Hackers

What Is A HackerCrackerThe term hacker is a misused term We should really be referring to a cracker to describe those who break security on a computer system

The original term hacker refers to computer enthusiasts who enjoy learning everything about a computer system

How Do We Get AttackedCrackers run programs that scan computer ports over the Internet to work out which ports are accessible If our computer shows up in one of these scans the cracker may decide to enter our PC

Crackers favorite targets are the home and home office computers connected by broadband to the Internet because the connection is always open there is more opportunity to locate these computers with their scanners

Alternatively crackers may just exploit weaknesses that have not been patched in the computers operating system in order to gain entry As discussed above Trojans are another way crackers use to gain access to our PCs

How Does A Cracker Affect UsBesides the potentially valuable information they can obtain from our PCs such as that listed under Trojans these intruders also want our hard disk space and Internet connection With these resources they can use our computers to send out spam or attack other computers on the Internet and all this can be done without our knowledge Another reason why we should know how do you stay safe on the Internet

5 Spam -- Unsolicited Email

What Is SpamSpam is defined in Dictionarycom as Unsolicited e-mail often of a commercial nature sent indiscriminately to multiple mailing lists individuals or newsgroups junk e-mail

Spammers peddle pornography sexual aids diet pills and get-rich-quick schemes in fact anything that has a perceived value

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

1 A DSL connection works better when you are closer to the providerrsquos central office

2 The service is not available everywhere1048707 Other types of DSL include

1 Asymmetric DSL (ADSL) line ndash The connection is faster for receiving data than it is for sending data over the Internet

2 Very high bit-rate DSL (VDSL) ndash This is a fast connection but works only over a short distance

3 Symmetric DSL (SDSL) ndash This connection used mainly by small businesses doesnrsquot allow you to use the phone at the same time but the speed of receiving and sending data is the same

4 Rate-adaptive DSL (RADSL) ndash This is a variation of ADSL but the modem can adjust the speed of the connection depending on the length and quality of the line

8 Direct Connection (Leased circuit)1048707 Most often used to connect sites within a specific organization such as a university or

business requires owning or leasing of cable (from 64 kbps to T-3) users typically connected via Ethernet LANs multimedia connectivity at its fastest

9 Satellite connections1048707 This connection allows you to download Internet files via a satellite connection This is

an efficient method for receiving large Web graphics and other items but you still need a modem connection for other features You must purchase the connection hardware as well as subscribe to the service

10 Wireless connections1048707 Pagers cellular phones and personal digital assistants (PDAs) now allow varying levels

of Internet access from notification of E-mail to limited Web connections Many of these services remain in the experimental stage The PPP connection is called as TCPIP connection or PSTN dial-up connection ISDN connection is called as ISDN dial-up connection Cable Modem DSL and Direct Connection are always-on connection The words ldquoconnectionrdquo and ldquoaccountrdquo related to Internet are interchangeable

D Computer Virus

The Internet just like the rest of the world is not a perfectly safe place to visit If you download files from the Internet there is a chance a very small chance but nonetheless a chance that your computer could become infected with a virus

Viruses are malicious programs that invade your computer They can cause many different kinds of damage such as deleting data files erasing programs or destroying

everything they find on your hard disk Not every virus causes damage some simply flash annoying messages

Different Types of Computer VirusesThere are Different Types of Computer Viruses could be classified in

(origin techniques types of files they infect where they hide the kind of damage they cause the type of operating system or platform they attack) etc Let us have a look at themhellip

Computer Virus is a kind of malicious software written intentionally to enter a computer without the userrsquos permission or knowledge with an ability to replicate itself thus continuing to spread Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system A virus should never be assumed harmless and left on a system Most common types of viruses are mentioned below

Resident VirusesThis type of virus is a permanent which dwells in the RAM memory From

there it can overcome and interrupt all of the operations executed by the system corrupting files and programs that are opened closed copied renamed etc

Examples include Randex CMJ Meve and MrKlunky

Direct Action VirusesThe main purpose of this virus is to replicate and take action when it is

executed When a specific condition is met the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXECBAT file PATH This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted

Overwrite VirusesVirus of this kind is characterized by the fact that it deletes the information

contained in the files that it infects rendering them partially or totally useless once they have been infected

The only way to clean a file infected by an overwrite virus is to delete the file completely thus losing the original content

Examples of this virus include Way TrjReboot Trivial88D

Boot Virus

This type of virus affects the boot sector of a floppy or hard disk This is a crucial part of a disk in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive

Examples of boot viruses include PolybootB AntiEXE

Macro VirusMacro viruses infect files that are created using certain applications or

programs that contain macros These mini-programs make it possible to automate series of operations so that they are performed as a single action thereby saving the user from having to carry them out one by one

Examples of macro viruses Relax MelissaA Bablas O97MY2K

Directory VirusDirectory viruses change the paths that indicate the location of a file By

executing a program (file with the extension EXE or COM) which has been infected by a virus you are unknowingly running the virus program while the original file and program have been previously moved by the virus

Once infected it becomes impossible to locate the original files

Polymorphic VirusPolymorphic viruses encrypt or encode themselves in a different way

(using different algorithms and encryption keys) every time they infect a system

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves

Examples include Elkern Marburg Satan Bug and Tuareg

File InfectorsThis type of virus infects programs or executable files (files with an EXE

or COM extension) When one of these programs is run directly or indirectly the virus is activated producing the damaging effects it is programmed to carry out The majority of existing viruses belong to this category and can be classified depending on the actions that they carry out

Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types They are known as companion viruses because once they get into the system they accompany the other files that already exist In other words in order to carry out their infection routines companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses)

Some examples include Stator Asimov1539 and Terrax1069

FAT VirusThe file allocation table or FAT is the part of a disk used to connect

information and is a vital part of the normal functioning of the computerThis type of virus attack can be especially dangerous by preventing access to certain sections of the disk where important files are stored Damage caused can result in information losses from individual files or even entire directories

WormsA worm is a program very similar to a virus it has the ability to self-

replicate and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses

Examples of worms include PSWBugbearB LovgateF TrileC SobigD Mapson

Trojans or Trojan HorsesAnother unsavory breed of malicious code are Trojans or Trojan horses

which unlike viruses do not reproduce by infecting other files nor do they self-replicate like worms

Logic BombsThey are not considered viruses because they do not replicate They are not

even programs in their own right but rather camouflaged segments of other programs

Their objective is to destroy data on the computer once certain conditions have been met Logic bombs go undetected until launched and the results can be destructive

E How Do You Stay Safe On The Internet

The first part of the answer to the question How do you stay safe on the Internet is know what the threats are that you and your computer are up against

Without this knowledge how are you going to know youve got everything covered off Do you just rely on what the security software vendors tell you to spend your money on

By being aware of what the risks are I suggest you will save yourself money and have more effective protection when it comes to the second part of the answer to the question How do you stay safe on the Internet selecting effective prevention and protection to guard privacy and online security

To help you decide what is necessary for your particular protection in The Three Levels Of Internet Risk Protection I talk about the safe practices that help protect your computer and the types of software to use -- from those that are absolutely essential for security to others which you may want to install to guard privacy to the level you desire

But back to this article How Do You Stay Safe On The Internet here Ill provide you with an introduction to each type of threat At the end of it youll have a good feel for the dangers on the Internet and how those threats can affect you your PC and your information be it personal financial family or business

There are ten of the most prevalent threats covered here Either go through them all or click on the links below for those you are particularly interested in

1 Viruses and Worms 2 Trojan Horses 3 Rootkits 4 Crackers and Hackers 5 Spam 6 Web Bugs 7 Child Security 8 Pop-UpUnder Ads 9 Tracking Cookies 10 Spyware

By the way Ive tried to keep the technical language simple but if you dont understand some of the terms check them out at Netlingo which provides definitions and explanations for all Net terminology

1 Viruses And Worms

What Is A VirusA virus is a man-made computer program that infects a file or program on our computers Each time the infected program is run the virus is also triggered It spreads itself by infecting other programs on the same computer

What Is A WormA worm is also a man-made program that replicates itself However unlike a virus it does not infect other program files on the computer Instead a worm spreads itself automatically to other computers through email over a network and via Internet Relay Chat (IRC)

How Do We Get InfectedViruses and worms can infect desktop computers laptops and network servers and reach our PCs from email web sites downloaded files and loadable media (eg floppy disks CD-ROMs and DVDs)

How Does A Virus Or Worm Infection Affect UsUnfortunately the effects of an infection are pretty unpleasant The virus or worm can

Disable the computer

Add modify or delete files or reformat the hard disk

Steal addresses held in our computer to send on virus-infected emails to our friends colleagues clients or customers

Send unsolicited bulk email (spam) to those in our mail address books and other users

2 Trojan Horses

What Is A Trojan HorseAlthough Trojan horse programs are categorized as viruses they are not true viruses since they do not replicate But like viruses they are one of the most destructive of the Internet risks covered in How Do You Stay Safe On The Internet and are favored by crackers and spyware writers

How Do We Get InfectedTrojans are one of the sneakiest of the online risks They are often downloaded on the back of a free program (freeware) that has some value to the user -- a free game software program or music for instance

How Does A Trojan Infection Affect Us

A Trojan installed on a computer allows that PC to be entered via a backdoor by any remote user that has the access code to the Trojan

The remote attacker can enter the computer undetected when the user is online to access or destroy any information stored Alternatively the Trojan can be programmed to automatically send any information on our PCs back to the attacker This could include

Client or customer information or other business data

Credit card details

Passwords for access to your online bank ISP or web services

Information you would rather remain hidden

Email addresses which may be used for spamming

Childrens names photographs ages or other personal details held on the computer

Distributed Denial of Service (DDOS) attack on other computers via the victims computer

No wonder we ask how do you stay safe on the Internet

3 How Do You Stay Safe On The InternetRootkitsWhat Is A RootkitRootkits are not destructive in their own right but they are designed to conceal the presence of malicious programs on a computer

How Do We Get InfectedAs with any malware such as viruses worms Trojans and spyware rootkits get onto our computers by various means such as through spam attachments being opened on the back of free downloads or planted by crackers who have breached computer defenses

How Does A Rootkit Affect UsRootkits are there for one reason only to ensure that an intruder can access our system and take control without detection by defenses to guard privacy and security

One of the most common and worrying uses of rootkits which causes us to ask How Do You Stay Safe On The Internet is to launch spam and denial of service (DOS) attacks against other computers or networks Another use of

rootkits is to hide Trojans so an intruder can easily use it to extract data from your computer as mentioned above

4 Crackers And Hackers

What Is A HackerCrackerThe term hacker is a misused term We should really be referring to a cracker to describe those who break security on a computer system

The original term hacker refers to computer enthusiasts who enjoy learning everything about a computer system

How Do We Get AttackedCrackers run programs that scan computer ports over the Internet to work out which ports are accessible If our computer shows up in one of these scans the cracker may decide to enter our PC

Crackers favorite targets are the home and home office computers connected by broadband to the Internet because the connection is always open there is more opportunity to locate these computers with their scanners

Alternatively crackers may just exploit weaknesses that have not been patched in the computers operating system in order to gain entry As discussed above Trojans are another way crackers use to gain access to our PCs

How Does A Cracker Affect UsBesides the potentially valuable information they can obtain from our PCs such as that listed under Trojans these intruders also want our hard disk space and Internet connection With these resources they can use our computers to send out spam or attack other computers on the Internet and all this can be done without our knowledge Another reason why we should know how do you stay safe on the Internet

5 Spam -- Unsolicited Email

What Is SpamSpam is defined in Dictionarycom as Unsolicited e-mail often of a commercial nature sent indiscriminately to multiple mailing lists individuals or newsgroups junk e-mail

Spammers peddle pornography sexual aids diet pills and get-rich-quick schemes in fact anything that has a perceived value

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

everything they find on your hard disk Not every virus causes damage some simply flash annoying messages

Different Types of Computer VirusesThere are Different Types of Computer Viruses could be classified in

(origin techniques types of files they infect where they hide the kind of damage they cause the type of operating system or platform they attack) etc Let us have a look at themhellip

Computer Virus is a kind of malicious software written intentionally to enter a computer without the userrsquos permission or knowledge with an ability to replicate itself thus continuing to spread Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system A virus should never be assumed harmless and left on a system Most common types of viruses are mentioned below

Resident VirusesThis type of virus is a permanent which dwells in the RAM memory From

there it can overcome and interrupt all of the operations executed by the system corrupting files and programs that are opened closed copied renamed etc

Examples include Randex CMJ Meve and MrKlunky

Direct Action VirusesThe main purpose of this virus is to replicate and take action when it is

executed When a specific condition is met the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXECBAT file PATH This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted

Overwrite VirusesVirus of this kind is characterized by the fact that it deletes the information

contained in the files that it infects rendering them partially or totally useless once they have been infected

The only way to clean a file infected by an overwrite virus is to delete the file completely thus losing the original content

Examples of this virus include Way TrjReboot Trivial88D

Boot Virus

This type of virus affects the boot sector of a floppy or hard disk This is a crucial part of a disk in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive

Examples of boot viruses include PolybootB AntiEXE

Macro VirusMacro viruses infect files that are created using certain applications or

programs that contain macros These mini-programs make it possible to automate series of operations so that they are performed as a single action thereby saving the user from having to carry them out one by one

Examples of macro viruses Relax MelissaA Bablas O97MY2K

Directory VirusDirectory viruses change the paths that indicate the location of a file By

executing a program (file with the extension EXE or COM) which has been infected by a virus you are unknowingly running the virus program while the original file and program have been previously moved by the virus

Once infected it becomes impossible to locate the original files

Polymorphic VirusPolymorphic viruses encrypt or encode themselves in a different way

(using different algorithms and encryption keys) every time they infect a system

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves

Examples include Elkern Marburg Satan Bug and Tuareg

File InfectorsThis type of virus infects programs or executable files (files with an EXE

or COM extension) When one of these programs is run directly or indirectly the virus is activated producing the damaging effects it is programmed to carry out The majority of existing viruses belong to this category and can be classified depending on the actions that they carry out

Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types They are known as companion viruses because once they get into the system they accompany the other files that already exist In other words in order to carry out their infection routines companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses)

Some examples include Stator Asimov1539 and Terrax1069

FAT VirusThe file allocation table or FAT is the part of a disk used to connect

information and is a vital part of the normal functioning of the computerThis type of virus attack can be especially dangerous by preventing access to certain sections of the disk where important files are stored Damage caused can result in information losses from individual files or even entire directories

WormsA worm is a program very similar to a virus it has the ability to self-

replicate and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses

Examples of worms include PSWBugbearB LovgateF TrileC SobigD Mapson

Trojans or Trojan HorsesAnother unsavory breed of malicious code are Trojans or Trojan horses

which unlike viruses do not reproduce by infecting other files nor do they self-replicate like worms

Logic BombsThey are not considered viruses because they do not replicate They are not

even programs in their own right but rather camouflaged segments of other programs

Their objective is to destroy data on the computer once certain conditions have been met Logic bombs go undetected until launched and the results can be destructive

E How Do You Stay Safe On The Internet

The first part of the answer to the question How do you stay safe on the Internet is know what the threats are that you and your computer are up against

Without this knowledge how are you going to know youve got everything covered off Do you just rely on what the security software vendors tell you to spend your money on

By being aware of what the risks are I suggest you will save yourself money and have more effective protection when it comes to the second part of the answer to the question How do you stay safe on the Internet selecting effective prevention and protection to guard privacy and online security

To help you decide what is necessary for your particular protection in The Three Levels Of Internet Risk Protection I talk about the safe practices that help protect your computer and the types of software to use -- from those that are absolutely essential for security to others which you may want to install to guard privacy to the level you desire

But back to this article How Do You Stay Safe On The Internet here Ill provide you with an introduction to each type of threat At the end of it youll have a good feel for the dangers on the Internet and how those threats can affect you your PC and your information be it personal financial family or business

There are ten of the most prevalent threats covered here Either go through them all or click on the links below for those you are particularly interested in

1 Viruses and Worms 2 Trojan Horses 3 Rootkits 4 Crackers and Hackers 5 Spam 6 Web Bugs 7 Child Security 8 Pop-UpUnder Ads 9 Tracking Cookies 10 Spyware

By the way Ive tried to keep the technical language simple but if you dont understand some of the terms check them out at Netlingo which provides definitions and explanations for all Net terminology

1 Viruses And Worms

What Is A VirusA virus is a man-made computer program that infects a file or program on our computers Each time the infected program is run the virus is also triggered It spreads itself by infecting other programs on the same computer

What Is A WormA worm is also a man-made program that replicates itself However unlike a virus it does not infect other program files on the computer Instead a worm spreads itself automatically to other computers through email over a network and via Internet Relay Chat (IRC)

How Do We Get InfectedViruses and worms can infect desktop computers laptops and network servers and reach our PCs from email web sites downloaded files and loadable media (eg floppy disks CD-ROMs and DVDs)

How Does A Virus Or Worm Infection Affect UsUnfortunately the effects of an infection are pretty unpleasant The virus or worm can

Disable the computer

Add modify or delete files or reformat the hard disk

Steal addresses held in our computer to send on virus-infected emails to our friends colleagues clients or customers

Send unsolicited bulk email (spam) to those in our mail address books and other users

2 Trojan Horses

What Is A Trojan HorseAlthough Trojan horse programs are categorized as viruses they are not true viruses since they do not replicate But like viruses they are one of the most destructive of the Internet risks covered in How Do You Stay Safe On The Internet and are favored by crackers and spyware writers

How Do We Get InfectedTrojans are one of the sneakiest of the online risks They are often downloaded on the back of a free program (freeware) that has some value to the user -- a free game software program or music for instance

How Does A Trojan Infection Affect Us

A Trojan installed on a computer allows that PC to be entered via a backdoor by any remote user that has the access code to the Trojan

The remote attacker can enter the computer undetected when the user is online to access or destroy any information stored Alternatively the Trojan can be programmed to automatically send any information on our PCs back to the attacker This could include

Client or customer information or other business data

Credit card details

Passwords for access to your online bank ISP or web services

Information you would rather remain hidden

Email addresses which may be used for spamming

Childrens names photographs ages or other personal details held on the computer

Distributed Denial of Service (DDOS) attack on other computers via the victims computer

No wonder we ask how do you stay safe on the Internet

3 How Do You Stay Safe On The InternetRootkitsWhat Is A RootkitRootkits are not destructive in their own right but they are designed to conceal the presence of malicious programs on a computer

How Do We Get InfectedAs with any malware such as viruses worms Trojans and spyware rootkits get onto our computers by various means such as through spam attachments being opened on the back of free downloads or planted by crackers who have breached computer defenses

How Does A Rootkit Affect UsRootkits are there for one reason only to ensure that an intruder can access our system and take control without detection by defenses to guard privacy and security

One of the most common and worrying uses of rootkits which causes us to ask How Do You Stay Safe On The Internet is to launch spam and denial of service (DOS) attacks against other computers or networks Another use of

rootkits is to hide Trojans so an intruder can easily use it to extract data from your computer as mentioned above

4 Crackers And Hackers

What Is A HackerCrackerThe term hacker is a misused term We should really be referring to a cracker to describe those who break security on a computer system

The original term hacker refers to computer enthusiasts who enjoy learning everything about a computer system

How Do We Get AttackedCrackers run programs that scan computer ports over the Internet to work out which ports are accessible If our computer shows up in one of these scans the cracker may decide to enter our PC

Crackers favorite targets are the home and home office computers connected by broadband to the Internet because the connection is always open there is more opportunity to locate these computers with their scanners

Alternatively crackers may just exploit weaknesses that have not been patched in the computers operating system in order to gain entry As discussed above Trojans are another way crackers use to gain access to our PCs

How Does A Cracker Affect UsBesides the potentially valuable information they can obtain from our PCs such as that listed under Trojans these intruders also want our hard disk space and Internet connection With these resources they can use our computers to send out spam or attack other computers on the Internet and all this can be done without our knowledge Another reason why we should know how do you stay safe on the Internet

5 Spam -- Unsolicited Email

What Is SpamSpam is defined in Dictionarycom as Unsolicited e-mail often of a commercial nature sent indiscriminately to multiple mailing lists individuals or newsgroups junk e-mail

Spammers peddle pornography sexual aids diet pills and get-rich-quick schemes in fact anything that has a perceived value

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

This type of virus affects the boot sector of a floppy or hard disk This is a crucial part of a disk in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive

Examples of boot viruses include PolybootB AntiEXE

Macro VirusMacro viruses infect files that are created using certain applications or

programs that contain macros These mini-programs make it possible to automate series of operations so that they are performed as a single action thereby saving the user from having to carry them out one by one

Examples of macro viruses Relax MelissaA Bablas O97MY2K

Directory VirusDirectory viruses change the paths that indicate the location of a file By

executing a program (file with the extension EXE or COM) which has been infected by a virus you are unknowingly running the virus program while the original file and program have been previously moved by the virus

Once infected it becomes impossible to locate the original files

Polymorphic VirusPolymorphic viruses encrypt or encode themselves in a different way

(using different algorithms and encryption keys) every time they infect a system

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves

Examples include Elkern Marburg Satan Bug and Tuareg

File InfectorsThis type of virus infects programs or executable files (files with an EXE

or COM extension) When one of these programs is run directly or indirectly the virus is activated producing the damaging effects it is programmed to carry out The majority of existing viruses belong to this category and can be classified depending on the actions that they carry out

Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types They are known as companion viruses because once they get into the system they accompany the other files that already exist In other words in order to carry out their infection routines companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses)

Some examples include Stator Asimov1539 and Terrax1069

FAT VirusThe file allocation table or FAT is the part of a disk used to connect

information and is a vital part of the normal functioning of the computerThis type of virus attack can be especially dangerous by preventing access to certain sections of the disk where important files are stored Damage caused can result in information losses from individual files or even entire directories

WormsA worm is a program very similar to a virus it has the ability to self-

replicate and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses

Examples of worms include PSWBugbearB LovgateF TrileC SobigD Mapson

Trojans or Trojan HorsesAnother unsavory breed of malicious code are Trojans or Trojan horses

which unlike viruses do not reproduce by infecting other files nor do they self-replicate like worms

Logic BombsThey are not considered viruses because they do not replicate They are not

even programs in their own right but rather camouflaged segments of other programs

Their objective is to destroy data on the computer once certain conditions have been met Logic bombs go undetected until launched and the results can be destructive

E How Do You Stay Safe On The Internet

The first part of the answer to the question How do you stay safe on the Internet is know what the threats are that you and your computer are up against

Without this knowledge how are you going to know youve got everything covered off Do you just rely on what the security software vendors tell you to spend your money on

By being aware of what the risks are I suggest you will save yourself money and have more effective protection when it comes to the second part of the answer to the question How do you stay safe on the Internet selecting effective prevention and protection to guard privacy and online security

To help you decide what is necessary for your particular protection in The Three Levels Of Internet Risk Protection I talk about the safe practices that help protect your computer and the types of software to use -- from those that are absolutely essential for security to others which you may want to install to guard privacy to the level you desire

But back to this article How Do You Stay Safe On The Internet here Ill provide you with an introduction to each type of threat At the end of it youll have a good feel for the dangers on the Internet and how those threats can affect you your PC and your information be it personal financial family or business

There are ten of the most prevalent threats covered here Either go through them all or click on the links below for those you are particularly interested in

1 Viruses and Worms 2 Trojan Horses 3 Rootkits 4 Crackers and Hackers 5 Spam 6 Web Bugs 7 Child Security 8 Pop-UpUnder Ads 9 Tracking Cookies 10 Spyware

By the way Ive tried to keep the technical language simple but if you dont understand some of the terms check them out at Netlingo which provides definitions and explanations for all Net terminology

1 Viruses And Worms

What Is A VirusA virus is a man-made computer program that infects a file or program on our computers Each time the infected program is run the virus is also triggered It spreads itself by infecting other programs on the same computer

What Is A WormA worm is also a man-made program that replicates itself However unlike a virus it does not infect other program files on the computer Instead a worm spreads itself automatically to other computers through email over a network and via Internet Relay Chat (IRC)

How Do We Get InfectedViruses and worms can infect desktop computers laptops and network servers and reach our PCs from email web sites downloaded files and loadable media (eg floppy disks CD-ROMs and DVDs)

How Does A Virus Or Worm Infection Affect UsUnfortunately the effects of an infection are pretty unpleasant The virus or worm can

Disable the computer

Add modify or delete files or reformat the hard disk

Steal addresses held in our computer to send on virus-infected emails to our friends colleagues clients or customers

Send unsolicited bulk email (spam) to those in our mail address books and other users

2 Trojan Horses

What Is A Trojan HorseAlthough Trojan horse programs are categorized as viruses they are not true viruses since they do not replicate But like viruses they are one of the most destructive of the Internet risks covered in How Do You Stay Safe On The Internet and are favored by crackers and spyware writers

How Do We Get InfectedTrojans are one of the sneakiest of the online risks They are often downloaded on the back of a free program (freeware) that has some value to the user -- a free game software program or music for instance

How Does A Trojan Infection Affect Us

A Trojan installed on a computer allows that PC to be entered via a backdoor by any remote user that has the access code to the Trojan

The remote attacker can enter the computer undetected when the user is online to access or destroy any information stored Alternatively the Trojan can be programmed to automatically send any information on our PCs back to the attacker This could include

Client or customer information or other business data

Credit card details

Passwords for access to your online bank ISP or web services

Information you would rather remain hidden

Email addresses which may be used for spamming

Childrens names photographs ages or other personal details held on the computer

Distributed Denial of Service (DDOS) attack on other computers via the victims computer

No wonder we ask how do you stay safe on the Internet

3 How Do You Stay Safe On The InternetRootkitsWhat Is A RootkitRootkits are not destructive in their own right but they are designed to conceal the presence of malicious programs on a computer

How Do We Get InfectedAs with any malware such as viruses worms Trojans and spyware rootkits get onto our computers by various means such as through spam attachments being opened on the back of free downloads or planted by crackers who have breached computer defenses

How Does A Rootkit Affect UsRootkits are there for one reason only to ensure that an intruder can access our system and take control without detection by defenses to guard privacy and security

One of the most common and worrying uses of rootkits which causes us to ask How Do You Stay Safe On The Internet is to launch spam and denial of service (DOS) attacks against other computers or networks Another use of

rootkits is to hide Trojans so an intruder can easily use it to extract data from your computer as mentioned above

4 Crackers And Hackers

What Is A HackerCrackerThe term hacker is a misused term We should really be referring to a cracker to describe those who break security on a computer system

The original term hacker refers to computer enthusiasts who enjoy learning everything about a computer system

How Do We Get AttackedCrackers run programs that scan computer ports over the Internet to work out which ports are accessible If our computer shows up in one of these scans the cracker may decide to enter our PC

Crackers favorite targets are the home and home office computers connected by broadband to the Internet because the connection is always open there is more opportunity to locate these computers with their scanners

Alternatively crackers may just exploit weaknesses that have not been patched in the computers operating system in order to gain entry As discussed above Trojans are another way crackers use to gain access to our PCs

How Does A Cracker Affect UsBesides the potentially valuable information they can obtain from our PCs such as that listed under Trojans these intruders also want our hard disk space and Internet connection With these resources they can use our computers to send out spam or attack other computers on the Internet and all this can be done without our knowledge Another reason why we should know how do you stay safe on the Internet

5 Spam -- Unsolicited Email

What Is SpamSpam is defined in Dictionarycom as Unsolicited e-mail often of a commercial nature sent indiscriminately to multiple mailing lists individuals or newsgroups junk e-mail

Spammers peddle pornography sexual aids diet pills and get-rich-quick schemes in fact anything that has a perceived value

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

Companion viruses can be considered file infector viruses like resident or direct action types They are known as companion viruses because once they get into the system they accompany the other files that already exist In other words in order to carry out their infection routines companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses)

Some examples include Stator Asimov1539 and Terrax1069

FAT VirusThe file allocation table or FAT is the part of a disk used to connect

information and is a vital part of the normal functioning of the computerThis type of virus attack can be especially dangerous by preventing access to certain sections of the disk where important files are stored Damage caused can result in information losses from individual files or even entire directories

WormsA worm is a program very similar to a virus it has the ability to self-

replicate and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses

Examples of worms include PSWBugbearB LovgateF TrileC SobigD Mapson

Trojans or Trojan HorsesAnother unsavory breed of malicious code are Trojans or Trojan horses

which unlike viruses do not reproduce by infecting other files nor do they self-replicate like worms

Logic BombsThey are not considered viruses because they do not replicate They are not

even programs in their own right but rather camouflaged segments of other programs

Their objective is to destroy data on the computer once certain conditions have been met Logic bombs go undetected until launched and the results can be destructive

E How Do You Stay Safe On The Internet

The first part of the answer to the question How do you stay safe on the Internet is know what the threats are that you and your computer are up against

Without this knowledge how are you going to know youve got everything covered off Do you just rely on what the security software vendors tell you to spend your money on

By being aware of what the risks are I suggest you will save yourself money and have more effective protection when it comes to the second part of the answer to the question How do you stay safe on the Internet selecting effective prevention and protection to guard privacy and online security

To help you decide what is necessary for your particular protection in The Three Levels Of Internet Risk Protection I talk about the safe practices that help protect your computer and the types of software to use -- from those that are absolutely essential for security to others which you may want to install to guard privacy to the level you desire

But back to this article How Do You Stay Safe On The Internet here Ill provide you with an introduction to each type of threat At the end of it youll have a good feel for the dangers on the Internet and how those threats can affect you your PC and your information be it personal financial family or business

There are ten of the most prevalent threats covered here Either go through them all or click on the links below for those you are particularly interested in

1 Viruses and Worms 2 Trojan Horses 3 Rootkits 4 Crackers and Hackers 5 Spam 6 Web Bugs 7 Child Security 8 Pop-UpUnder Ads 9 Tracking Cookies 10 Spyware

By the way Ive tried to keep the technical language simple but if you dont understand some of the terms check them out at Netlingo which provides definitions and explanations for all Net terminology

1 Viruses And Worms

What Is A VirusA virus is a man-made computer program that infects a file or program on our computers Each time the infected program is run the virus is also triggered It spreads itself by infecting other programs on the same computer

What Is A WormA worm is also a man-made program that replicates itself However unlike a virus it does not infect other program files on the computer Instead a worm spreads itself automatically to other computers through email over a network and via Internet Relay Chat (IRC)

How Do We Get InfectedViruses and worms can infect desktop computers laptops and network servers and reach our PCs from email web sites downloaded files and loadable media (eg floppy disks CD-ROMs and DVDs)

How Does A Virus Or Worm Infection Affect UsUnfortunately the effects of an infection are pretty unpleasant The virus or worm can

Disable the computer

Add modify or delete files or reformat the hard disk

Steal addresses held in our computer to send on virus-infected emails to our friends colleagues clients or customers

Send unsolicited bulk email (spam) to those in our mail address books and other users

2 Trojan Horses

What Is A Trojan HorseAlthough Trojan horse programs are categorized as viruses they are not true viruses since they do not replicate But like viruses they are one of the most destructive of the Internet risks covered in How Do You Stay Safe On The Internet and are favored by crackers and spyware writers

How Do We Get InfectedTrojans are one of the sneakiest of the online risks They are often downloaded on the back of a free program (freeware) that has some value to the user -- a free game software program or music for instance

How Does A Trojan Infection Affect Us

A Trojan installed on a computer allows that PC to be entered via a backdoor by any remote user that has the access code to the Trojan

The remote attacker can enter the computer undetected when the user is online to access or destroy any information stored Alternatively the Trojan can be programmed to automatically send any information on our PCs back to the attacker This could include

Client or customer information or other business data

Credit card details

Passwords for access to your online bank ISP or web services

Information you would rather remain hidden

Email addresses which may be used for spamming

Childrens names photographs ages or other personal details held on the computer

Distributed Denial of Service (DDOS) attack on other computers via the victims computer

No wonder we ask how do you stay safe on the Internet

3 How Do You Stay Safe On The InternetRootkitsWhat Is A RootkitRootkits are not destructive in their own right but they are designed to conceal the presence of malicious programs on a computer

How Do We Get InfectedAs with any malware such as viruses worms Trojans and spyware rootkits get onto our computers by various means such as through spam attachments being opened on the back of free downloads or planted by crackers who have breached computer defenses

How Does A Rootkit Affect UsRootkits are there for one reason only to ensure that an intruder can access our system and take control without detection by defenses to guard privacy and security

One of the most common and worrying uses of rootkits which causes us to ask How Do You Stay Safe On The Internet is to launch spam and denial of service (DOS) attacks against other computers or networks Another use of

rootkits is to hide Trojans so an intruder can easily use it to extract data from your computer as mentioned above

4 Crackers And Hackers

What Is A HackerCrackerThe term hacker is a misused term We should really be referring to a cracker to describe those who break security on a computer system

The original term hacker refers to computer enthusiasts who enjoy learning everything about a computer system

How Do We Get AttackedCrackers run programs that scan computer ports over the Internet to work out which ports are accessible If our computer shows up in one of these scans the cracker may decide to enter our PC

Crackers favorite targets are the home and home office computers connected by broadband to the Internet because the connection is always open there is more opportunity to locate these computers with their scanners

Alternatively crackers may just exploit weaknesses that have not been patched in the computers operating system in order to gain entry As discussed above Trojans are another way crackers use to gain access to our PCs

How Does A Cracker Affect UsBesides the potentially valuable information they can obtain from our PCs such as that listed under Trojans these intruders also want our hard disk space and Internet connection With these resources they can use our computers to send out spam or attack other computers on the Internet and all this can be done without our knowledge Another reason why we should know how do you stay safe on the Internet

5 Spam -- Unsolicited Email

What Is SpamSpam is defined in Dictionarycom as Unsolicited e-mail often of a commercial nature sent indiscriminately to multiple mailing lists individuals or newsgroups junk e-mail

Spammers peddle pornography sexual aids diet pills and get-rich-quick schemes in fact anything that has a perceived value

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

The first part of the answer to the question How do you stay safe on the Internet is know what the threats are that you and your computer are up against

Without this knowledge how are you going to know youve got everything covered off Do you just rely on what the security software vendors tell you to spend your money on

By being aware of what the risks are I suggest you will save yourself money and have more effective protection when it comes to the second part of the answer to the question How do you stay safe on the Internet selecting effective prevention and protection to guard privacy and online security

To help you decide what is necessary for your particular protection in The Three Levels Of Internet Risk Protection I talk about the safe practices that help protect your computer and the types of software to use -- from those that are absolutely essential for security to others which you may want to install to guard privacy to the level you desire

But back to this article How Do You Stay Safe On The Internet here Ill provide you with an introduction to each type of threat At the end of it youll have a good feel for the dangers on the Internet and how those threats can affect you your PC and your information be it personal financial family or business

There are ten of the most prevalent threats covered here Either go through them all or click on the links below for those you are particularly interested in

1 Viruses and Worms 2 Trojan Horses 3 Rootkits 4 Crackers and Hackers 5 Spam 6 Web Bugs 7 Child Security 8 Pop-UpUnder Ads 9 Tracking Cookies 10 Spyware

By the way Ive tried to keep the technical language simple but if you dont understand some of the terms check them out at Netlingo which provides definitions and explanations for all Net terminology

1 Viruses And Worms

What Is A VirusA virus is a man-made computer program that infects a file or program on our computers Each time the infected program is run the virus is also triggered It spreads itself by infecting other programs on the same computer

What Is A WormA worm is also a man-made program that replicates itself However unlike a virus it does not infect other program files on the computer Instead a worm spreads itself automatically to other computers through email over a network and via Internet Relay Chat (IRC)

How Do We Get InfectedViruses and worms can infect desktop computers laptops and network servers and reach our PCs from email web sites downloaded files and loadable media (eg floppy disks CD-ROMs and DVDs)

How Does A Virus Or Worm Infection Affect UsUnfortunately the effects of an infection are pretty unpleasant The virus or worm can

Disable the computer

Add modify or delete files or reformat the hard disk

Steal addresses held in our computer to send on virus-infected emails to our friends colleagues clients or customers

Send unsolicited bulk email (spam) to those in our mail address books and other users

2 Trojan Horses

What Is A Trojan HorseAlthough Trojan horse programs are categorized as viruses they are not true viruses since they do not replicate But like viruses they are one of the most destructive of the Internet risks covered in How Do You Stay Safe On The Internet and are favored by crackers and spyware writers

How Do We Get InfectedTrojans are one of the sneakiest of the online risks They are often downloaded on the back of a free program (freeware) that has some value to the user -- a free game software program or music for instance

How Does A Trojan Infection Affect Us

A Trojan installed on a computer allows that PC to be entered via a backdoor by any remote user that has the access code to the Trojan

The remote attacker can enter the computer undetected when the user is online to access or destroy any information stored Alternatively the Trojan can be programmed to automatically send any information on our PCs back to the attacker This could include

Client or customer information or other business data

Credit card details

Passwords for access to your online bank ISP or web services

Information you would rather remain hidden

Email addresses which may be used for spamming

Childrens names photographs ages or other personal details held on the computer

Distributed Denial of Service (DDOS) attack on other computers via the victims computer

No wonder we ask how do you stay safe on the Internet

3 How Do You Stay Safe On The InternetRootkitsWhat Is A RootkitRootkits are not destructive in their own right but they are designed to conceal the presence of malicious programs on a computer

How Do We Get InfectedAs with any malware such as viruses worms Trojans and spyware rootkits get onto our computers by various means such as through spam attachments being opened on the back of free downloads or planted by crackers who have breached computer defenses

How Does A Rootkit Affect UsRootkits are there for one reason only to ensure that an intruder can access our system and take control without detection by defenses to guard privacy and security

One of the most common and worrying uses of rootkits which causes us to ask How Do You Stay Safe On The Internet is to launch spam and denial of service (DOS) attacks against other computers or networks Another use of

rootkits is to hide Trojans so an intruder can easily use it to extract data from your computer as mentioned above

4 Crackers And Hackers

What Is A HackerCrackerThe term hacker is a misused term We should really be referring to a cracker to describe those who break security on a computer system

The original term hacker refers to computer enthusiasts who enjoy learning everything about a computer system

How Do We Get AttackedCrackers run programs that scan computer ports over the Internet to work out which ports are accessible If our computer shows up in one of these scans the cracker may decide to enter our PC

Crackers favorite targets are the home and home office computers connected by broadband to the Internet because the connection is always open there is more opportunity to locate these computers with their scanners

Alternatively crackers may just exploit weaknesses that have not been patched in the computers operating system in order to gain entry As discussed above Trojans are another way crackers use to gain access to our PCs

How Does A Cracker Affect UsBesides the potentially valuable information they can obtain from our PCs such as that listed under Trojans these intruders also want our hard disk space and Internet connection With these resources they can use our computers to send out spam or attack other computers on the Internet and all this can be done without our knowledge Another reason why we should know how do you stay safe on the Internet

5 Spam -- Unsolicited Email

What Is SpamSpam is defined in Dictionarycom as Unsolicited e-mail often of a commercial nature sent indiscriminately to multiple mailing lists individuals or newsgroups junk e-mail

Spammers peddle pornography sexual aids diet pills and get-rich-quick schemes in fact anything that has a perceived value

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

What Is A VirusA virus is a man-made computer program that infects a file or program on our computers Each time the infected program is run the virus is also triggered It spreads itself by infecting other programs on the same computer

What Is A WormA worm is also a man-made program that replicates itself However unlike a virus it does not infect other program files on the computer Instead a worm spreads itself automatically to other computers through email over a network and via Internet Relay Chat (IRC)

How Do We Get InfectedViruses and worms can infect desktop computers laptops and network servers and reach our PCs from email web sites downloaded files and loadable media (eg floppy disks CD-ROMs and DVDs)

How Does A Virus Or Worm Infection Affect UsUnfortunately the effects of an infection are pretty unpleasant The virus or worm can

Disable the computer

Add modify or delete files or reformat the hard disk

Steal addresses held in our computer to send on virus-infected emails to our friends colleagues clients or customers

Send unsolicited bulk email (spam) to those in our mail address books and other users

2 Trojan Horses

What Is A Trojan HorseAlthough Trojan horse programs are categorized as viruses they are not true viruses since they do not replicate But like viruses they are one of the most destructive of the Internet risks covered in How Do You Stay Safe On The Internet and are favored by crackers and spyware writers

How Do We Get InfectedTrojans are one of the sneakiest of the online risks They are often downloaded on the back of a free program (freeware) that has some value to the user -- a free game software program or music for instance

How Does A Trojan Infection Affect Us

A Trojan installed on a computer allows that PC to be entered via a backdoor by any remote user that has the access code to the Trojan

The remote attacker can enter the computer undetected when the user is online to access or destroy any information stored Alternatively the Trojan can be programmed to automatically send any information on our PCs back to the attacker This could include

Client or customer information or other business data

Credit card details

Passwords for access to your online bank ISP or web services

Information you would rather remain hidden

Email addresses which may be used for spamming

Childrens names photographs ages or other personal details held on the computer

Distributed Denial of Service (DDOS) attack on other computers via the victims computer

No wonder we ask how do you stay safe on the Internet

3 How Do You Stay Safe On The InternetRootkitsWhat Is A RootkitRootkits are not destructive in their own right but they are designed to conceal the presence of malicious programs on a computer

How Do We Get InfectedAs with any malware such as viruses worms Trojans and spyware rootkits get onto our computers by various means such as through spam attachments being opened on the back of free downloads or planted by crackers who have breached computer defenses

How Does A Rootkit Affect UsRootkits are there for one reason only to ensure that an intruder can access our system and take control without detection by defenses to guard privacy and security

One of the most common and worrying uses of rootkits which causes us to ask How Do You Stay Safe On The Internet is to launch spam and denial of service (DOS) attacks against other computers or networks Another use of

rootkits is to hide Trojans so an intruder can easily use it to extract data from your computer as mentioned above

4 Crackers And Hackers

What Is A HackerCrackerThe term hacker is a misused term We should really be referring to a cracker to describe those who break security on a computer system

The original term hacker refers to computer enthusiasts who enjoy learning everything about a computer system

How Do We Get AttackedCrackers run programs that scan computer ports over the Internet to work out which ports are accessible If our computer shows up in one of these scans the cracker may decide to enter our PC

Crackers favorite targets are the home and home office computers connected by broadband to the Internet because the connection is always open there is more opportunity to locate these computers with their scanners

Alternatively crackers may just exploit weaknesses that have not been patched in the computers operating system in order to gain entry As discussed above Trojans are another way crackers use to gain access to our PCs

How Does A Cracker Affect UsBesides the potentially valuable information they can obtain from our PCs such as that listed under Trojans these intruders also want our hard disk space and Internet connection With these resources they can use our computers to send out spam or attack other computers on the Internet and all this can be done without our knowledge Another reason why we should know how do you stay safe on the Internet

5 Spam -- Unsolicited Email

What Is SpamSpam is defined in Dictionarycom as Unsolicited e-mail often of a commercial nature sent indiscriminately to multiple mailing lists individuals or newsgroups junk e-mail

Spammers peddle pornography sexual aids diet pills and get-rich-quick schemes in fact anything that has a perceived value

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

A Trojan installed on a computer allows that PC to be entered via a backdoor by any remote user that has the access code to the Trojan

The remote attacker can enter the computer undetected when the user is online to access or destroy any information stored Alternatively the Trojan can be programmed to automatically send any information on our PCs back to the attacker This could include

Client or customer information or other business data

Credit card details

Passwords for access to your online bank ISP or web services

Information you would rather remain hidden

Email addresses which may be used for spamming

Childrens names photographs ages or other personal details held on the computer

Distributed Denial of Service (DDOS) attack on other computers via the victims computer

No wonder we ask how do you stay safe on the Internet

3 How Do You Stay Safe On The InternetRootkitsWhat Is A RootkitRootkits are not destructive in their own right but they are designed to conceal the presence of malicious programs on a computer

How Do We Get InfectedAs with any malware such as viruses worms Trojans and spyware rootkits get onto our computers by various means such as through spam attachments being opened on the back of free downloads or planted by crackers who have breached computer defenses

How Does A Rootkit Affect UsRootkits are there for one reason only to ensure that an intruder can access our system and take control without detection by defenses to guard privacy and security

One of the most common and worrying uses of rootkits which causes us to ask How Do You Stay Safe On The Internet is to launch spam and denial of service (DOS) attacks against other computers or networks Another use of

rootkits is to hide Trojans so an intruder can easily use it to extract data from your computer as mentioned above

4 Crackers And Hackers

What Is A HackerCrackerThe term hacker is a misused term We should really be referring to a cracker to describe those who break security on a computer system

The original term hacker refers to computer enthusiasts who enjoy learning everything about a computer system

How Do We Get AttackedCrackers run programs that scan computer ports over the Internet to work out which ports are accessible If our computer shows up in one of these scans the cracker may decide to enter our PC

Crackers favorite targets are the home and home office computers connected by broadband to the Internet because the connection is always open there is more opportunity to locate these computers with their scanners

Alternatively crackers may just exploit weaknesses that have not been patched in the computers operating system in order to gain entry As discussed above Trojans are another way crackers use to gain access to our PCs

How Does A Cracker Affect UsBesides the potentially valuable information they can obtain from our PCs such as that listed under Trojans these intruders also want our hard disk space and Internet connection With these resources they can use our computers to send out spam or attack other computers on the Internet and all this can be done without our knowledge Another reason why we should know how do you stay safe on the Internet

5 Spam -- Unsolicited Email

What Is SpamSpam is defined in Dictionarycom as Unsolicited e-mail often of a commercial nature sent indiscriminately to multiple mailing lists individuals or newsgroups junk e-mail

Spammers peddle pornography sexual aids diet pills and get-rich-quick schemes in fact anything that has a perceived value

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

rootkits is to hide Trojans so an intruder can easily use it to extract data from your computer as mentioned above

4 Crackers And Hackers

What Is A HackerCrackerThe term hacker is a misused term We should really be referring to a cracker to describe those who break security on a computer system

The original term hacker refers to computer enthusiasts who enjoy learning everything about a computer system

How Do We Get AttackedCrackers run programs that scan computer ports over the Internet to work out which ports are accessible If our computer shows up in one of these scans the cracker may decide to enter our PC

Crackers favorite targets are the home and home office computers connected by broadband to the Internet because the connection is always open there is more opportunity to locate these computers with their scanners

Alternatively crackers may just exploit weaknesses that have not been patched in the computers operating system in order to gain entry As discussed above Trojans are another way crackers use to gain access to our PCs

How Does A Cracker Affect UsBesides the potentially valuable information they can obtain from our PCs such as that listed under Trojans these intruders also want our hard disk space and Internet connection With these resources they can use our computers to send out spam or attack other computers on the Internet and all this can be done without our knowledge Another reason why we should know how do you stay safe on the Internet

5 Spam -- Unsolicited Email

What Is SpamSpam is defined in Dictionarycom as Unsolicited e-mail often of a commercial nature sent indiscriminately to multiple mailing lists individuals or newsgroups junk e-mail

Spammers peddle pornography sexual aids diet pills and get-rich-quick schemes in fact anything that has a perceived value

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

Spam is no longer just a frustration nuisance and time-waster it has now become a major Internet security risk to those of us who want to know how do you stay safe on the Internet

How Does Spam Attack UsThere are many ways spammers obtain our email address and this results in the spam bombardment most of us suffer

However much of this spam has malicious code or malware incorporated into it We can trigger this malware just by opening the email or even previewing it in our email program

How Does Spam Affect UsIf youre not quite convinced that spam is dangerous consider the following

80 percent of spam e-mail messages originate from home computers They have been secretly taken over by spammers and are known as zombie PCs Spammers and cybercriminals can control thousands of these zombies which together form a bot network

Identity theft and fraud and phishing via spam email is growing in frequency

95 percent of viruses are sent through email

Spam is often used to deliver spyware

6 Web Bugs

What Is A Web BugIt is an image file usually 1x1 pixel hidden on a web page or in an HTML e-mail and will be of interest to those who ask How Do You Stay Safe On The Internet

How Do We Get InfectedLike most malware we do not know when a web bug is present They are usually downloaded in spam and they can be on any webpage we visit

How Do Web Bugs Affect UsA web bug tells a spammer when an e-mail has been opened and marketers what advertisements and web pages we have viewed

The bugs can discover key details about our system that are very useful to hackers They also transmit the IP (Internet Protocol) address of all readers of an e-mail to a spammer

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

7 Child Security

Some form of parental control is required to prevent children being funneled to inappropriate web sites and predators on the Net such as in chat rooms -- it was as a result of the mounting concern about how do you stay safe on the Internet particularly kids that MSN decided to close its chat rooms

There are also the risks of spam sent to kids Not only are there the malware risks but a survey showed that more than 80 percent of children said they receive inappropriate spam every day Half of those admitted that they felt uncomfortable and offended when seeing them and just didnt know how do you stay safe on the Internet

Despite these concerns many parents are unclear where to go to get advice about keeping their children safe online

8 Pop-UpUnder And Banner Ads

What Are PopUpUnder And Banner AdA pop-up ad appears as a separate window on top of the web page we are viewing whereas pop-under ads appear under the page being viewed becoming visible when the web page is cancelled A banner ad is immediately on view on a web page and can be animated or stationary

What Is The RiskPopupsundersbanners can be an annoyance by interfering with our viewing pleasure However some of these ads can also be a serious threat as they can carry Trojans spyware or browser hijackers Unfortunately we cant see which ads have hidden malicious code to decide how do you stay safe on the Internet

The malicious code is generally activated by clicking on the ad the malware being installed on our computer through vulnerabilities in our browser and a process known as a drive-by-download

9 Tracking Cookies

What Are Tracking CookiesWhen we browse web sites the web server for the web site sends a cookie to our web browser (eg Internet Explorer) which it then stores on our computer hard drive

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

Cookies are small text files containing information that identifies each user When you move to another page or return to the site at a later time the web server asks your browser for the cookie so it can recognize who you are

How Cookies Can Affect UsCookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing

Multiple sites may read from the same cookie and share the information or they can sell it on without the knowledge or consent of the user

Although not a serious security threat cookies are a privacy risk

10 Spyware

What Is SpywareSpyware has surpassed viruses as the number one computer Internet security risks facing us today Most estimates report that 80-90 percent of computers already have been infiltrated by spyware

Spyware is software that is installed on our hard drive to gather information about us and our computer habits It then transmits it through our Internet connection to a third party usually without our knowledge or consent

There are two categories of spyware surveillance or monitoring spyware and advertising spyware or adware

How Does Spyware Infect UsSpyware is often downloaded through freeware and shareware and the P2P (peer-to-peer) file sharing programs like Kazaa Imesh and Bearshare

More aggressive forms of spyware can install themselves through drive-by downloads where an invasive program is invisibly downloaded to your computer It can be initiated by simply visiting a Web site or viewing an HTML e-mail message

How Does Spyware Affect UsSurveillance or monitoring spyware can scan our hard drive and search programs for sensitive information like credit card bank information and personal details

It can change our browsers home page scan browser history for web sites visited and monitor various aspects of our computer and Internet activity The information is then transmitted to the attacker

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

More and more companies are installing spyware to watch us at work to check that we are not using the company network to surf prohibited sites or spending too much time dealing with personal email

Advertising spyware logs information such as our name and passwords our browsing and Internet usage habits online purchases and email addresses And of course it downloads advertisements lots and lots of advertisements

How Do You Stay Safe On The InternetWhat Next

Having read through the computer Internet security risks youll now know some of the many dangers youre facing as soon as you go online

Unfortunately the home and home office computer is particularly vulnerable to attacks from these threats By looking at the second article on this subject How Do You Stay Safe On The InternetWhy The HomeOffice PC Is Susceptible youll appreciate why we home users are such attractive targets

If youre wondering what protection is critical to insulate your PC against these risks the answers are provided in How To Choose Your Computer Internet Protection In 3 Easy Steps

There youll see how to decide what protection is right for your PC usage and habits

Alternatively if you already know the risks you want to protect against just click on the appropriate button on the navbar at the top left of this page

F Firewall and Protection FIREWALL

Security software that can actively block unauthorized entities from gaining access to internal resources such as systems servers databases and networks A firewall may also act to prevent internal users from accessing unauthorized external resources A firewall is installed in a communications router server or some other device that physically andor logically is a first point of access into a networked system A packet-filtering firewall examines all data packets forwarding or dropping individual packets based on predefined rules that specify where a packet is permitted to go in consideration of both the authenticated identification of the user and the originating address of the request A proxy firewall acts as an intermediary for user access requests by setting up a second connection to the resource The proxy then decides if the message or file is safe A stateful inspection firewall examines packets notes the port numbers that

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

they use for each connection and shuts down those ports once the connection is terminated See also authentication authorization proxy firewall and security

ANTI-VIRUSAn antivirus is different than an antiviral which is medicine used

kill a virus or suppress it Notice the similarities In both instances theres something parasitic at work that needs a counter agent

i Different Kind of AntiVirus Kaspersky Norton Avira McCafee AVG NOD32 Panda Avast BitDefender

III Introduction Environments of web Browser

Objectives To Explore the Web Browser Environments To know what is important What is important about internet How to access through Internet

A The Environments ndash Browser menu

1 Different Types of Web Browser Explorer

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

Firefox Internet

Explorer Google

Chrome Opera Safari Seamonkey Camino Amaya

Flock NetSurf Netscape Konqueror Icab Cyberdog Amaya Lynx WorldWideWeb

2 The BrowserAs you surf the Web you will come across

sites that state This site is best viewed withhellip and then name a particular browser Many will even provide a link to a site where you can download the specified browser Sites make these recommendations because some browsers use special protocols allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML) Chief among these browsers are Netscape Navigator Microsoft Internet Explorer Opera and Mozilla Firefox

21 How Does The Internet Work

Computer on the internet communicate with others using a set of protocols known as TCPIP or Transmission Control ProtocolInternet Protocol A protocol is a standing format for transferring data between two devices TCPIP is the agreed on Internatinoal Standard for transmitting the IP Protocol work with the addressing schame It allows you to enter an address and sends it to another computer from there the TCP takes over returning to our Postal Service Analog

When we access another computer on the internet we are accessing it VIA a number However we donrsquot have to remember or we just need to type in the domain name identities of a site on the internet browser

Ex Domain Name

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

wwwmicrosoftcom

22 What Can I Do On The Internet

a E-mail (electronic-mail) ndash The internet enables us to send and relieve messages (Email) all over the world To use electronic mail all we need is a computer modem a network connection and an email account

b Information ndash You can access any information an any subject through the internet That is why internet is now a very important for research works and educational purposes

c Group Discussion ndash We can meet people around the globe with similar taste and preferences common topics of interest can discussed subjects such as music region politics sports etchellip can be an interesting way to meet some new friends

d Entertainment ndash The internet offers thousands of sites where you can watch your favorite celebrities or listening for music play You can also watch your favorite movie online or look for a current movies reviews

e News ndash New from CNN NBC ABS-CBN or from your national newspaper can be accessed through the internet

f Online Shopping ndash Ordering desired goods and services on the internet in the comforts of our home We need donrsquot need to shops outside for foods appliances or other things that you need can be easily bought through the internet

g Free Program (Software) ndash You can download thousands of shareware freeware from the internet

shareware ndash the termrsquos shareware and postcard where refers to small software application or utilities created by non-profit developer Itrsquos usually unable free of charge for a trial period after the trial

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

period the user is expected to pay small fee for continuous use of the program

h Chat ndash A form of realtime electronic communications where participants type what they want to say and itrsquos repeated on the screen of all other participants in the same chat Internet relay chat or IRC is an internet protocol for chat and there are many other chat systems services like DELPHI Other commonly used chat system are Ichat and ICQ

i Cookies ndash bits of information that a web site stores on your computerrsquos hard drive in most cases this data helps the site ldquorememberrdquo useful things about your computer from a session such as a particular color configuration such as the type of computer you have and the browsesrs that you use it can also record the number of times that you visit the site and the time that you spend However donrsquot worry too much about security or loss of privacy cookies cannot tell the website yoursquod registered or email address unless you specifically configure for a remember

j Cyberspace ndash A term coined by cyberpunk science fiction author by William Gibson in this Novel Neuromancer It represents the totality of all connected computer networks and their contents in a future cored It has become a slang term for the internet and the information in it

3 How To Accessing Internet Connection and Open How to open IE

Steps by step procedure

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be connected

1 Connecting through a (LAN) Local Area Network connecting to the internet using a Network Interface Card (NIC ndash This is a

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

peripheral component inside your computer that allows your computer to get on the network)

2 A direct connection is made from the Local Area Network to a high speed connection line most likely Leased Line from the Local Telephone Company

3 For the home user the most common type of internet connection is with a modem and a telephone line

4 Internet Telephone Connection or Dial-Up Connection a connection that allows the user to connect using only an internal modem modem and a connection through telephone wire witch it give an 56kbps Of speedSo that people choose ISDN Integrated Services Digital Network or DSL Digital Subscriber Line and an additional hardware that allows data transmission for a greater speed than a connection of telephone dialing

5 Another High-speed option is the cable modem This type of modem also connects to your computer but it uses a network interface card instead of using a telephone line as a transmission media to connect to the ISP Coaxial Cable that is used and same cable that used from the television

6 Finally way of connection to the internet is using your television and web tv most web tv products consist of setup box that connects to your telephone line and television it makes a connection to the internet Via your telephone service and then converts the downloaded web pages to a format that can be displayed on your tv

Steps Getting Connected to the internet

1 Locate an internet services provider (ISP) or any online service Their service is primarily an internet connection

2 Once you find an ISP you must install some type of telecommunications software this software enables your computer to connect to another computer most likely your isp or online service company will provide this software

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

3 You will need to install a software application called a web browser in order to surf the web the web is one component of the internet two of the popular browser are Netscapersquos Navigator and Microsoftrsquos Internet Exporer

Yoursquove been contracted with your ISP and yoursquove installed your softwareYou need give some instruction to your computer to dial a Local Telephone Number or any certain procedure to connect you to your ISPrsquos computer which connects you to line of internet

Opening The IE

1 From the desktop double click the icon (another procedure) click start button from the

taskbar then click ldquoAll Programsrdquo then look for the icon Internet Explorer

4 The Environment

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

Parts of Internet Explorer 71 Title Bar ndash the head name of the browser2 Address Bar ndash where you can encode the domain of its website3 Menu Bar ndash A menu bar is a horizontal strip that contains lists of

available menus for a certain program4 Tab Page ndash One of the features added to Internet Explorer 7 was

the support of tabbed browsing already available in many other web browsers With tabbed browsing you can view multiple websites inside one browser window uncluttering your Windows Taskbar and desktop

5 New Tab Button ndash Viewing a new tab for opening a new website6 Toolbar ndash A row or column of on-screen buttons used to activate

functions in the application7 Yahoo Toolbar ndash An easiest way to make one click navigation at

yahoo website8 Back Button ndash an history button to get from its history linked

necessary page9 Forward Button ndash to go forward when you get back on its

browsing page10 Search Web ndash a text box where you can encode your keyword for

your searched 11 Refresh Button ndash to refresh the webpage for a failure or

discontinuously to the page of the browser 12 Stop Button ndash to stop what you were doing on the working

browser13 Scroll Bar ndash A vertical bar on the right side of a window or a

horizontal bar at the bottom of a window that is used to move the window contents up and down or left and right

14 Minimize Button ndash to hide the explorer on its task bar15 Restore Button ndash to get back the explorer on its previous state16 Exit Button ndash to exit the certain browser

4 Activities that can do while or after surfing

a) How to Copy or Save Image Using Internet Browser1 Right mouse click (PC) on on of the images below until a

dialog box appears2 If you are using Internet Explorer select Download image to

disk Or select Save this image as3 A box pops up asking you where you want to save the image to

Navigate to the folder in which you want to keep your images4 Usually youll want to rename the image giving it a name that

will make sense to you a few months down the line In the Save image as box change the name of the picture to the

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

name you have chosen If you intend to use the image on a web page make sure there are no spaces in the name you choose

5 You are using a PC Windows it will automatically insert this extension for you

6 Click on the save button You now have an identical copy

b) Print Web Pages

To print in Internet ExplorerGo to ldquoFilerdquo in the browser menu and choose any of the available

commands

1 Page Setup - to select paper source orientation paper size etc when printing

2 Print - for printing the web page immediately3 Print Preview - to get a preview of what the printout will look

like before printing

c) Save Book Mark Favorite Website

For Firefox 1 Click Bookmarks Menu then 2 Click Bookmark This Page (a window dialog will appear) 3 Type the name of the bookmark then press Done

For Internet Explorer 1 (Adding to Favorites) Click Favorites Menu then 2 Click Add to Favorites (a window dialog will appear) 3 Type the name then press Done

d) Define Search Engine and a subject Guide

The only rules in search engine are to encode your exact keyword or information you want to search

e) Save Favorite Website on a storage diskInternet Explorer1 For Internet Explorer click on the File menu2 Click on Save As3 In the Save as type field drop down the list and choose Web

Archive (Single File)

This will compile the entire web page and all of its other elements as a single file

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

Firefox1 Right click on the desired web page2 Select the Save page as or use short cut Ctrl + S3 In the Save as type field drop down the list and choose Web

page Complete

VI Using Web Browser Manage User

A Using Web Browser 1 Website

a Internet Addressesi World Wide Web

Internet system for worldwide hypertext linking of multimedia documents making the relationship of information that is common between documents easily accessible and completely independent of physical location

ii Domain Name and Extension Name

DomainA domain name is an identification label that

defines a realm of administrative autonomy authority or control on the Internet based on the Domain Name System (DNS)

Domain names are used in various networking contexts and application-specific naming and addressing purposes They are organized in subordinate levels (subdomains) of the DNS root domain which is nameless The first-level set of domain names are the top-level domains (TLDs) including the generic top-level domains (gTLDs) such as the prominent domains com net and org and the country code top-level domains (ccTLDs) Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet run web sites or create other publicly accessible Internet resources The registration of these domain

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

names is usually administered by domain name registrars who sell their services to the public

Extension Name

Domain name extensions ndash What are they

Domain name extensions have become a big business Over the last few years a large number of registries have opened up and there are now over 300 extensions to choose from (and this number is set to increase)

But before you rush in and buy a name with any old extension take a step back and ask yourself if it can truly serve your business or plans

If you want to sell bikes in Australia then Bikesau might seem like a good name to have But unless the extension is widely known and accepted in the Australian market this extension will not do you any favours

The problem is that when most people think of a site they think Com Net Org and so your site and hence business could be quickly forgotten

2 Creating an Accounti Creating E-mail Account (yahoo google etc)

Step by steps procedure

Instructions Things Youll Need A computer Internet access

1 Step 1 Go to wwwyahoocom

2 Step 2Click on Mail Click on Sign Up Follow the registration instructions You will receive a registration confirmation email Confirm your registration

3 Step 3

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

Congratulations You are now ready to send and recieve email

3 Uploading and Downloadingii Upload a File

To upload is to transfer content - such as videos or photos - from your personal computer to an internet server

Instructions and Rules uploading a file

1 Find a site that will allow you to upload your file to their server There are many websites designed for this purpose and no one is best for all users and all files In deciding which one to use consider

wwwdownloadcom What type of files will they accept For

example most sites dont allow porn while others specialize in it

Almost all have maximum file sizes Do they have enough bandwidth How much do they charge for the service

Most are free but watch out for advertising How long will they keep uploaded files Is their privacy policy acceptable

2 Click on browse

3 Find and select the file you want to upload

4 Click on upload file

ii Downloading a FileTo download is to transfer content - such as

videos or photos - from the internet through your personal computer

Question What does the term ldquodownloadrdquo mean and how do I do it

Answer When you download something you are transferring data from another computer to your computer usually over the internet

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

Say you are a solitaire player and have decided that you would like to have a variety of solitaire games to play on your computer You browse the internet and find a free program called 123 Free Solitaire 2009 (By the way Irsquove seen reviews that indicate that itrsquos great for solitaire addicts) The site says to lsquoDownload hererdquo (or something equivalent to that) You click on the button because you would like to transfer the game from the web site to your computer you would like to download it After you click on the lsquoDownload hererdquo button a box will pop up that looks like this

Here you have three options as to what you would like to do once the file has been completely downloaded You may click on Save and 123 Free Solitaire 2009 will be downloaded (and saved) to your computer Option 2 If you donrsquot want to save it (maybe you just want to try it and not take up any space on your computer) click on Run to download and install the game If you have suddenly decided that you never want to play cards again click on Cancel and the download will automatically be stopped

Essentially when you download something you receive whatever it is you are downloading (in this case itrsquos the solitaire game)

On the flip-side if you would like to upload something you are going to transfer - or give - something from your computer to someone elsersquos

How to download computer files programs and software This question may seem easy for many

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

computer savvy people who have downloaded computer programs before However for the beginner computer user they may need to know how to download They may also need to know why they should download a program to their computer This article will tell the beginners how to download software from a computer disk and programs from the internet Downloading a file or program to your computer will allow you to use the program such as a computer game or software program Many online game rooms ask computer users to download the game to their computers to be able to access the game anytime

Instructions Procedure and Rules before DownloadThings Youll Need

Time Patience Computer disk Computer Internet

1 Step 1 Insert the software disk into your computer If you

have just purchased a personal computer (PC) game and you have the computer disk you need to insert it into the disc compartment of your computer Your computer will recognize the disk and start running the program Follow the guided messages that may appear on your computer screen

2 Step 2 Click the download file link If you are

downloading a file or program from the internet you will need to click on the Download button or link that appears on your computer screen A download box may appear on your screen asking you if you want to run the program from current location or save the program

3 Step 3 Choose the save option This will allow you to

save the program so that you can later use it after the download is complete Be observant on what file name you saved it as and which folder it is located If you dont get a pop up box asking you these options dont worry

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

because some internet browsers save the download automatically

4 Step 4 Click run program If you are ready to access the

software or program you just installed on your computer click run and the downloaded program should open for you Many downloaded software programs will make a shortcut icon on your desktop so that you will have easy access to the program later

iii Buffering

Preloading data into a reserved area of memory (the buffer) In streaming audio or video from the Internet buffering refers to downloading a certain amount of data before starting to play the music or movie Having an advance supply of audio samples or video frames in memory at all times prevents disruption if there are momentary delays in transmission while the material is being played Even a live broadcast would have a few seconds of delay built in

Buffering Over the Internet

If a network is fast enough to keep up with playback buffering is not necessary However this is not the case over the Internet where packets can traverse numerous routers from source to destination and delays can be introduced at any juncture See double buffering buffer and buffer flush

The message means 70 of a reserved area in memory is filled at that moment When it reaches 100 the software (Windows Media Player in this example) will start playing the video

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

4 OSI Layer

Session ObjectivesAt the end of this session you will be able to

Define the OSI physical layer List the Service and functions of the physical layer Describe the connection types used by the layer Identify various physical topologies used by this

layer Understand the types of signaling Define multiplexing

OSI Physical layerThe physical layer implementations co-ordinate the

rules for transmitting bits The layer defines

Physical Network structures Mechanical and electrical specifications for

using the transmission medium Bit transmission encoding and timing rules

Services and FunctionsThe services offered by the physical layer are

It provides a physical connection between systems via a transmission medium

A unique point of attachment to the transmission medium is provided to the service user

It delivers bits in the order in which they were submitted to the layer

It notifies the data link layer of any fault in transmission

It provides for different qualities of service through different transmission media

There is no distinction in this layer between connection oriented and connectionless mode of service The connection is configured only after a particular service has been created

Physical layer services are grouped into the following classes

Topology Point-to-point multi-end-point

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

Type of Transmission Synchronous or Asynchronous

Mode of operation Duplex Half-Duplex Simplex

The important functions to be performed by this layer are

It controls the physical link during activation and deactivation phases

It performs either synchronous or asynchronous transmission of bits

It performs management activities related to this layer

OSI Model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) in 1977

Seven layers

ApplicationProvides user interface such as file transfer (FTP) electronicmail(SMTP) remote login(TelnetSSHrlogin) WWW(http)etc

PresentationPresentation Layer Formatpresentationsyntax of data

SessionSession Layer Dialog Disciplinemdashfull duplex or half duplex Recoverymdashcheck pointing mechanisms

TransportTransport Layer Connection oriented and connectionless service Reliable delivery of data SequencingOrdering of delivery Avoid duplication

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

NetworkNetwork Access Layer Exchange of data between end system and network Destination address provision Routing functions across multiple networks

Data LinkData Link Layer Error detection and correction Flow control

PhysicalPhysical LayerPhysical interface between data transmission device (egcomputer) and transmission medium or network Characteristics of transmission mediumbull Mechanicalmdashconnector typebull Electricalmdashsignal levelsbull Functionalmdashfunction of individual cuircitsbull Proceduralmdashsequence of events data rates etc

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

VII TERMS and TERMINOLOGIES

INTERNET - is a worldwide collection of computer networks that links together millions of computers

INTERNET SERVICE PROVIDER(ISP) ndash is a company that has a permanent connection to the Internet backbone and utilizes high- or medium speed data lines to allow individuals and companies to connect to the backbone for access to the Internet

Application Layer - performs the functions of file transfer e-mail etc (see OSI Model)

Architecture - how a system is designed includes how the components are connected to and operate with each other

ASCII (American Standard Code for Information Interchange) - relates a number from 0 to 255 in the binary (base 2) form to keyboard characters

Bandwidth - expressed in a range of frequencies using hertz as the unit of measurement also called analog capacity

Baseband - describes signals and systems whose range of frequency is measured from 0 to a maximum band-width or highest signal frequency sometimes used as a noun for a band of frequencies starting at 0

Bit - contraction of the expression ldquobinary digitrdquo smallest unit of data in a computer

Bps (bits per second) - common measure of data speed for computer modems and transmission carriers

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

DSL (digital subscriber line) - technology that delivers digital data transmission over the wires of a local telephone network

Domain Name ndash Consist of Different form of Organization name and a ldquosuffixrdquo that describe the type of organization

Ethernet - most commonly used protocol designed to change the packets into electrical signals that can be sent out over the wire

Firewall - a barrier between a network and the Internet through which only authorized users can passset of security policies to screen incoming and outgoing messages also used to isolate one part of a network from another

FTP (file transfer protocol) - application used to transfer a copy of a file from one computer to another computer with one acting as client and the other as servera login with a user name and password is typically required

Gateways - a node on a network that translates (converts protocol) from one operating system environment to another

Gbps (gigabits per second billions of bits per second) - a data transfer speed measurement for high- speed networks

Host address - part of an IP address that is uniquely assigned by an administrator

HTTP (HyperText Transfer Protocol) - protocol users interact with (by means of a browser) to access Web pages over an internet or intranet

Hz (hertz) - unit of frequency one hertz simply means one cycle per second applied to any periodic event (egone tick of a clock is 1 Hz the human heart beats at 12 Hz)

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

IEEE (Institute of Electronic and Electrical Engineers) - voluntary organization of engineers that creates consensus standards for network wiring and other technologies pronounced ldquoeye-triple-Erdquo

Internet layer - part of the TCPIP model that performs the same function as the network layer of the OSI model

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCPIP connectionless unreliable protocol that provides features for addressing type or service specification fragmentation and reassembly and security

IP address (internet protocol address) - logical address assigned

to every workstation server printer and router on any interconnected network

ISDN (Integrated Services Digital Network) -a circuit-switched telephone network system designed to allow digital transmission of voice and data over ordinary copper telephone wires

ISPs (Internet service providers) - businesses or organizations that provide consumers with access to the Internet and related services

Kbps (thousands of bits per second) - a measure of data transfer speed

LAN (local area network) - network that operates within a small geographic area usually within a building

Line layer - layer of the OSI physical layer that is responsible for synchronizing and multiplexing multiple streams of

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

data into one SONET stream within SONET frames also monitors and administers SONET multiplexers

MAN (metropolitan area network) - connects sites in and around a large city

MB (megabyte) - unit of information or computer storage equal to either exactly one million bytes or in some cases 1048567 bytes or more rarely 1024000 bytes not to be confused with Mb which stands for megabits

Mbps (megabits per second) - a unit of information storage not to be confused with MB or megabytes

MHz (megahertz) - one hertz is one cycle per second - a megahertz is equal to one million cycles per second

NIC (network interface card) - hardware adapter that provides communication capabilities responsible for building transmitting receiving and decoding frames in a LAN environment serves as the interface between the networked devices and the connecting wires

Packets - data structures that collectively represent the transmission stream (headers and data)associated with the network layer when the communication protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of functioning as a client and a server users on the network can freely share resources on their computer or access shared resources on other computers

Surf or Surfing ndash Means to search

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia

Tbps - Trillions of bits per second

TCPIP (transmission control protocolInternet protocol)dominant protocol suite used in networking TCP (transport control protocol) connection-oriented reliable protocol that has end-to-end responsibility for making sure that information arrives without errors and in the correct order

Topology - the physical (how the wires are laid out) andor logical (how the wires work) arrangement of the devices on the network

URL ndash Universal Resources Location

WAN (wide area network) - geographically dispersed network of computers

Web Page ndash is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device

Wi-Fi - describes the underlying technology of wireless local area networks (WLAN) based on IEEE specifica-tions originally developed for mobile computing devices in LANs but is now used for more services including Internet and VoIP phone access

Wireless - telecommunications in which electromagnetic waves (rather than some form of wire) carry the sig-nal over part or all of the communication path

WWW (World Wide Web) - server-based application that organizes information using hypermedia