We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22
The Internet, Intranets,
Extranets and some other issues
The Internet The internet A network of networks The internet transmits data from one computer (called a host) to another Internet networks Linked networks that work much the same way -- they pass data around in packets, each of which carries the addresses of its sender and receiver Internet Discussion A global network connecting millions of computers. As of 1999, the Internet has more than 200 million users worldwide, and that number is growing rapidly. More than 100 countries are linked into exchanges of data, news and opinions. Unlike online services, which are centrally controlled, the Internet is decentralized by design. Each Internet computer, called a host, is independent. Its operators can choose which Internet services to use and which local services to make available to the global Internet community. Remarkably, this anarchy by design works exceedingly well. How the Internet Works Transport control protocol (TCP): A protocol that operates at the transport layer and is used in combination with IP by most Internet applications Backbone: An Internet high-speed, long distance communications links (like a bus; wire that connects nodes) Uniform resource locator (URL): An assigned address on the Internet for each computer. E.g., http://www.facebook.com Access to the Internet LAN servers: Local servers can provide access to the Internet through normal connections (e.g., Ethernet) Serial line internet protocol (SLIP) and Point-to- point protocol (PPP): Communications protocol software that transmits packets over telephone lines, allowing dial-up access to the Internet Connection via an on-line service: Examples are America Online and Microsoft Network. These services usually require sign-up procedures Internet Service Providers (ISP) Any company that provides individuals or companies with access to the Internet Thousands of providers including large communications companies Need an account with the ISP and software that links with TCP/IP Internet Services: E-mail, Telnet, Usenet and newsgroups, Chat rooms, Internet phone, Internet videoconferencing, Content streaming etc. Internet telephony: Also called voice-over-IP (VOIP): Technology that enables network managers to route phone calls and fax transmissions over the same network they use for data Intranet An internal corporate network built using Internet and World Wide Web standards and products that allows employees of an organization to gain access to corporate information A network based on TCP/IP protocols (an internet) belonging to an organization, usually a corporation, accessible only by the organization's members, employees, or others with authorization. An intranet's Web sites look and act just like any other Web sites, but the firewall surrounding an intranet fends off unauthorized access. Like the Internet itself, intranets are used to share information. Secure intranets are now the fastest-growing segment of the Internet because they are much less expensive to build and manage than private networks based on proprietary protocols. Extranet A network based on Web technologies that links selected resources of the intranet of a company with its customers, suppliers, or other business partners. A new buzzword that refers to an intranet that is partially accessible to authorized outsiders. Whereas an intranet resides behind a firewall and is accessible only to people who are members of the same company or organization, an extranet provides various levels of accessibility to outsiders. You can access an extranet only if you have a valid username and password, and your identity determines which parts of the extranet you can view. Privacy & Security Cryptography: The process of converting a message into a secret code and changing the encoded message back to regular text Encryption: The original conversion of a message into a secret code Digital Signature: An encryption technique used for online financial transactions Firewalls Firewalls: A method of preventing unauthorized access between a company’s computers and the Internet (looks at the header of a packet). A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. Assured Pipeline Assured pipeline: An Internet security method that looks at the entire request for data and then determines whether the request is valid Firewall Techniques There are several types of firewall techniques: Packet filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing. Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation. Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking. Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses. Artificial Neural Networks (ANN): Why? Our world is full of data. After collection and organization, data, if we are lucky, becomes information. In today's interconnected world, information exists in electronic form that can be stored and transmitted instantly. Challenge is to understand, integrate, and apply information to generate useful knowledge (“actionable intelligence”): Deep blue Enter New Breed of Processor: Artificial Neural Networks Instead of programming computational system to do specific tasks, teach system how to perform task To do this, generate Artificial Intelligence System- AI Empirical model which can rapidly and accurately find the patterns buried in data that reflect useful knowledge One case of these AI models is neural networks AI systems must be adaptive – able to learn from data on a continuous basis Used for: Mathematical Modeling (Function Approximation), Classification, Clustering, Forecasting, Vector Quantization, Pattern Association, Control and Optimization Graphics Computer graphics: generating 2D images of a 3D world represented in a computer. Main tasks: modeling: (shape) creating and representing the geometry of objects in the 3D world rendering: (light, perspective) generating 2D images of the objects animation: (movement) describing how objects change in time Why Study Computer Graphics? Graphics is cool I like to see what I’m doing I like to show people what I’m doing Graphics is interesting Involves simulation, AI, algorithms, architecture… I’ll never get an Oscar for my acting But maybe I’ll get one for my CG special effects Graphics is fun Software Piracy Creating a copy and/or selling it. This is the act that some people refer to as "software piracy". This is copyright violation in most countries and is unlikely to be fair use or fair dealing if the work remains commercially available. In some countries the laws may allow the selling of a version modified for use by blind people, students (for educational product) or similar. Differences in legislation may also make the copyright void in some jurisdictions, but not the others. Types of Piracy Industrial piracy: An individual or group attempts duplication and distribution on a large scale for profit. Corporate piracy: Unprotected contents are shared through networks such as peer-to-peer, LAN and Internet. Reseller piracy: Involves computer hardware companies selling machines with illegal copies of software preloaded on their hard drive. Home piracy: Ranges from trading disks with friends to running a not-for- profit bulletin board for the purpose of illegal software distribution. Universal Serial Bus (USB) A representative peripheral interface Universal Serial Bus (USB) provides a serial bus standard for connecting devices, usually to a computer, but it also is in use on other devices such as set-top boxes, game consoles and PDAs. (wikipedia.org) USB is a likely solution any time you want to use a computer to communicate with devices outside the computer The interface is suitable for one-of-kind and small-scale designs as well as mass-produced, standard peripheral types Thanks!!!