MGB 2003 - PowerPoint PPT Presentation

1 / 78
About This Presentation
Title:

MGB 2003

Description:

Online sale of fake identification documents. Accounts for 30% of all fake documents in U.S. ... E.g. Houses, cars. 10-Regulated Products. E.g. Alcohol. 11 ... – PowerPoint PPT presentation

Number of Views:28
Avg rating:3.0/5.0
Slides: 79
Provided by: dmitryr
Category:

less

Transcript and Presenter's Notes

Title: MGB 2003


1
Chapter 2The Internet and the World Wide Web
2
OVERVIEW
  • Introduction
  • Usage of Internet
  • Limitations
  • Ease of Searching Online
  • Bulletin Board Systems vs. Pay Services
  • Web Fundamentals
  • Internet Language
  • Implications for Management

3
Introduction
  • Internet First developed as a tool for people
    (scientists) to keep in touch one another
  • Any one with the following can connect to the
    internet and use it
  • PC ( Personal Computer )
  • browser
  • plug-ins ( specialized programs )
  • Make Objective of internet is to make information
    available anytime, anywhere, to any one (24/7)

4
Introduction
  • Internet begins with message communication ( send
    messages to multiple persons at the same time )
  • Now it is possible to transmit and receive data
    containing graphics, voice, video,

5
In the Beginning
  • Internet infrastructure that links thousands of
    networks together
  • Internet transmits messages among servers using
  • Satellites
  • Dedicated and fiber optics cables
  • Microwaves
  • others

6
In the Beginning
  • Interesting about Internet that no one own it or
    control it
  • Internet owes its existence to the Pentagon
  • Design network that safe transmission of data
    between military computers.
  • First called ARPAnet (Advance Research Project
    Agency)

7
In the Beginning
  • ARPAnet decommissioned in 1969
  • In 1984 network splits into two interconnected
    network
  • Military part called MILNET
  • Educational part Kept the name ARPAnet which
    become known as Internet

8
History of Internet Development
  • 30-year History since 1969
  • Pentagon and Cold War
  • Original Use
  • Military installations
  • Universities
  • Business firms with defense department contracts
  • Initial Goal
  • Design a network that maintains the safe
    transition of data between military computers

9
Events
10
What is the Internet
  • The Internet is a world-wide system of
    interconnected computers
  • There are several different ways to look at what
    the Internet actually is.
  • At the highest level,
  • the Internet is the
  • people that use it
  • the global community
  • of users.

11
What is the Internet
  • At another level, the Internet is a set of
    protocols that define the rules of how the
    computers will transfer information with one
    another.

12
What is the Internet
  • At the lowest level, it is the hardware behind
    the computer networks - the computers, modems,
    phone lines and cables that link together to form
    a huge network.

13
World Wide Web
  • Hypertext
  • Link
  • World Wide Web (WWW)
  • Browser
  • Internet Network Architecture
  • Internet Protocols
  • TCP/IP

14
World Wide Web
  • Hypertext -
  • Any text that contains links to other documents.
  • Can be generated with language called (HTML)
  • In HTML designer place tags within the text to do
    page formatting
  • Link
  • Referred as hyperlink
  • Connects current document to another location in
    the same document or to other document on the
    same host computer

15
World Wide Web
  • To access a web page you do the following
  • Enter an Internet address to a specific page
  • Browse through pages and select links to move
    from one page to another
  • Enter search statement at a search engine to
    retrieve pages on a specific topic

16
World Wide Web
  • World Wide Web (www)
  • An organization of files designed around a group
    of servers on the internet programmed to handle
    requests from browser software on your PCs
  • Name based on that sound, text, animation,
    pictures or information may come from anywhere in
    the world
  • Browser
  • a program that allows pictures and texts of a
    document to be viewed. E.g. Netscape and IE

17
World Wide Web
  • World Wide Web (www)
  • They needed a way to keep track of the
    information and documentation so that it could be
    easily accessed and updated

18
World Wide Web
19
Internet Network Architecture
Backbone e.g. High-Speed Backbone Network
operated by MCI
  • Architecture of the internet is hierarchal
    physical structure
  • Backbone the main network of connection that
    carry network traffic
  • NAP primary connection point for access to the
    internet backbone

Network Access Points (NAPs) e.g. New York
(Sprint)
Regional Networks e.g. AOL, ATT
Regional ISPs i.e. Local Providers
User Level e.g. University / Corporate Networks
20
World Wide Web
  • Internet Protocols
  • specific rules that make it possible to conduct
    communications in the Internet between machines.
  • TCP/IP
  • Transmission Control Protocol/ Internet Protocol
  • A set of protocols that provide the basic for
    operating the internet

21
World Wide Web
  • Key Protocols accessible on the web
  • E-mail- Simple Mail Transfer Protocol (SMTP)
  • Distributed electronic files and messages to one
    or several e-mail boxes
  • Also electronic files can be attached to an
    e-mail message called (MIME)
  • HTTP Hyper Text Transfer Protocol
  • Designed as protocol for WWW
  • Allow transmission of hypertext over network
  • VoIP Voice over Internet Protocol
  • Allow to place telephone call over the web

22
  • Webmaster
  • A person who is skilled in web design, web
    maintenance, and web upgrade

23
How to Search the Web
  • The Browser
  • Plug-Ins
  • Multimedia
  • Search Engine

24
The Browser
  • To access the Web you need browser
  • Browser is a piece of software that allow users
    to navigate the web
  • Two types of browser
  • Text-only mode such as lynx
  • Graphic mode graphical software program that
    retrieves text, audio, and video such as
    Netscape, and Internet Explorer

25
Plug-Ins
  • Software programs are configured to a Web browser
    to improve its capabilities
  • Active X
  • Microsoft program that makes it possible to embed
    animated objects and data on the web pages.
  • We can use Active X to view three dimensional
    objects (VRML)

26
Multimedia
  • Streaming media
  • audio or video that begin to play as it downloads
    (streaming)
  • Done through buffering
  • Buffering
  • A PC features that serves to minimize the wait
    time between downloading and actual viewing of
    the material on the monitor

27
Search Engine
  • A website or a database and the tools to search
    it
  • Collection part of Search Engine (robots)
  • Roams Internet sites
  • Retrieves messages
  • Sorts and indexes
  • Create database from them
  • The two main elements of Web research are
  • Index ( keyword)
  • Search engine

28
Search Engine
  • Index
  • Database that stores a copy of each web page
    gathered by a spider
  • Could be
  • hierarchical from general to specific topic
  • Alphabetical contains sources with a focus on
    specific topic

29
What is a Search Engine?
  • A page on the web connected to a backend program
  • Allows a user to enter words which characterise a
    required page
  • Returns links to pages which match the query

30
Components of a Search Engine
  • Robot (or Worm or Spider)
  • collects pages
  • checks for page changes
  • Indexer
  • constructs a sophisticated file structure to
    enable fast page retrieval
  • Searcher
  • satisfies user queries

31
Search Results
  • Presented as links
  • Supposedly ordered in terms of relevancy to the
    query
  • Some Search Engines score results
  • Normally organised if groups of ten per page

32
(No Transcript)
33
Problems
  • Links are often out of date
  • Usually too many links are returned
  • Returned links are not very relevant
  • The Engines don't know about enough pages
  • Different engines return different results

34
How do pages get into a Search Engine?
  • Robot discovery (following links)
  • Self submission
  • Payments

35
Robot Discovery
  • Robots visit sites while following links
  • The more links the more visits
  • Make sure you don't exclude Robots from visiting
    public pages

36
Payments
  • Some search engines only index paying customers
  • The more you pay the higher you appear on answers
    to queries

37
Self submission
  • Register your page with a search engine
  • Pay for a company to register you with many
    search engines
  • Get registration with many search engines for
    free!

38
Search Engine
  • Spider
  • Program that roams the web from link to link
    identifying and scanning pages.
  • Looking for new sites where information is likely
    to reside

39
Web Crawling
  • How do the web search engines get all of the
    items they index?
  • Main idea
  • Start with known sites
  • Record information for these sites
  • Follow the links from each site
  • Record information found at new sites
  • Repeat

40
Search Engine
  • First Generation search engine
  • Return results in a schematic order
  • On the page Ranking

41
Search Engine
  • Second Generation search engine
  • Organize search results by peer ranking, domain,
    or site rather than relevancy
  • Off the Page Ranking
  • More reliable in the ranking of the results
  • A web page become highly ranked if it is
    connected to other highly ranked pages
  • Google derives its result from the behavior and
    judgment of millions of web users

42
Search Engine
  • Portal a location on the web that acts as
    launching point for searching for and retrieving
    information

43
Searching process
  • People look up web sites with search engine
  • People usually use bookmarks to visit their sites
  • Bookmarking action taken on a facility of a web
    browser that allow you to save URL addresses for
    future quick access and use.
  • Web site must be quick and current
  • Website should address privacy

44
Internet Service Providers
  • Company that links user to the internet for a fee
  • Born in the mid-1990s

45
Internet Service Providers
  • ISPs offers the following services
  • Linking consumers and businesses to Internet
  • Payment system for online purchases
  • Monitoring and maintaining a customers Web site
  • Network management and system integration
  • Backbone access services for other ISPs

46
Reliability and Stability of Web
  • Internet Society
  • Works with ISPs by providing information to
    prospective users and attracts product developers
  • Internet Architecture Board
  • Focuses on TCP/IP and other protocols

47
Usage of Internet
  • 1- Marketing and selling products/services
  • E-commerce
  • gt 1 million sales
  • B2B, Government Agencies, Universities, B2C
  • Failures
  • 2/3 out of 100,000 companies
  • 2- Speed of doing business
  • 24/7

48
Usage of Internet (Contd)
  • 4- Gathering opinions and trying out new ideas
  • Online Opinion Polls

49
Usage of Internet (Contd)
  • 5- Equal Opportunity for all Business
  • Allow competitions with larger companies
  • 6- Mass Distribution
  • Marketing heaven
  • Ease of update
  • 7- Paper-free Environment

50
Usage of Internet (Contd)
  • 8- Customer Service and Support Resource
  • Use of FAQ
  • 9- Efficiency and Unequaled Cost-effectiveness
  • For niche products / services
  • Provide information
  • 10-Managerial Tool
  • Use of e-mail

51
Whos Online?
Source Peterson, Andrea, Lost in the Maze.
Wall Street Journal, Dec 6, 1999, p. R6
52
Whos Online? (Contd)
Source Peterson, Andrea, Lost in the Maze.
Wall Street Journal, Dec 6, 1999, p. R6
53
Limitations
  • 1- Security and Privacy
  • 20 met Federal Trade Commission (FTC) standards
    for protecting consumer privacy
  • 90 compliance rate by Internet companies for
    posting their privacy policies
  • FTC Fair Information Principles
  • Notice/Awareness
  • Choice/Consent
  • Access/Participation
  • Security/Integrity

54
Limitations (Contd)
  • 2- Rash of Fake IDs
  • Online sale of fake identification documents
  • Accounts for gt 30 of all fake documents in U.S.
  • Three levels of fake ID procurements
  • Sell real-looking documents in customers name
  • Sell templates that allow customers to make their
    own phony documents
  • Do-it-yourself counterfeiter

55
Limitations (Contd)
  • 4- Threats of Hackers and Viruses
  • Threaten the integrity of Internet files and
    transactions
  • Hacking schools and Virus software
  • 5- Stressed Out Networks
  • Pressure to upgrade and maintain more complex
    networks

56
Limitations (Contd)
  • 6- Fulfillment
  • Merchants link with vendor
  • Responsiveness
  • 7- Struggling Small Business
  • Cost of maintaining and upgrading
  • Security

57
Limitations (Contd)
  • 8- Customer Relations
  • Heavy demand on customer service
  • 9- Products Having No Online Demand
  • E.g. Houses, cars
  • 10-Regulated Products
  • E.g. Alcohol
  • 11-Shortage of E-literate People

58
Bulletin Board Systems vs. Pay Services
  • BBSes
  • A computer-based meeting and announcement system
  • Allow local people to exchange information free
    of charge
  • E.g. e-mail, netnews
  • Through subscription, e.g. AOL, Prodigy
  • Pay Services
  • Provide e-mail, interactive talking, etc.
  • Include security software
  • Ensure privacy, confidentiality, and integrity

59
Web Fundamentals
  • URLs and HTTPs
  • The language of the internet

60
Web Fundamentals
  • World Wide Web (WWW)
  • Global hypertext network of millions of Web
    servers and browsers
  • Connected by Hypertext Transfer Protocol (HTTP)
  • Web pages can be designed by Hypertext Markup
    Language (HTML)

61
Web Fundamentals
  • World Wide Web (WWW)
  • Like Client/server system
  • Content is holding by web server
  • Request by client or browser
  • clients display information sent by the web
    server on their monitoring.

62
Uniform Resource Locator (URL)
  • A name that represents the address of specific
    web site
  • Uniform Resource Locator (URL)
  • E.g. http//www.virginia.edu
  • http//
  • protocol designer
  • Special method used in moving files (hypertext)
  • Tell the browser what protocol to use in
    connecting to web server

63
Uniform Resource Locator (URL)
  • www.virginia.edu - server name
  • Called Host name
  • www tell the network that the material requested
    is located on a dedicated Web server somewhere
  • Virginia is the name of the Web site requested
  • edu indicates the site is an educational
    institution

64
Web Fundamentals (Contd)
  • Security Protocols
  • Providing security services for messages or
    stream of data
  • Two main security protocol
  • Secure Socket Layer (SSL)
  • protocol for transmitting private information in
    a secure way over the internet
  • Most widely used
  • Developed by Netscape Communications

65
  • 2. Secure HTTP (S-HTTP)
  • Extension of HTTP
  • Provide various security features
  • Such as
  • Client /server Authentication
  • Allows Web clients and servers to specify privacy
    capabilities independently of one another

66
Internet Language
  • Provider
  • ISP
  • An organization that provide an entrance ramp to
    Internet
  • Browser
  • A software program loaded in a PC allowing user
    to access Internet

67
  • Server-
  • Destination point on the internet
  • Where information stored
  • When you send a message to retrieve some
    information through internet
  • Browser pick up message, reformat it
  • Send it through various layers to the physical
    layer where cables and wires transmit message to
    appropriate server
  • Server retrieves information and send it back to
    the browser to view it

68
Internet Language (Contd)
  • Telnet
  • Protocol that allow users to log on to a computer
    and access files from a remote location.
  • A basic Internet service allowing users to access
    remote computers as if they were local.
  • To use it you must have Internet address of
    remote computer

69
  • File Transfer Protocol (FTP)
  • A standard protocol allowing users to copy files
    from computer to computer on Internet
  • Allow you to access remote computer

70
Malicious Software
  • Any Software ( program) that cause damage by
    spreading itself to other computer.
  • Trojan horse
  • Zombie
  • Virus
  • Macro
  • worm

71
Internet Language (Contd)
  • Malicious Software
  • Trojan horse
  • A program that seems to perform legitimate work,
    but causes damage when executed
  • Usually used for stealing password from
    unprotected computer
  • Localized and does not replicate itself

72
Internet Language (Contd)
  • Malicious Software
  • Zombie
  • A launching program residing in an
    Internet-attached computer
  • Which use computer as a base to attack other
    computers on the internet and tie up traffic
  • Hard to detect, the lie hidden
  • Worm
  • A program replicating itself on a computers hard
    disk and memory, slowing down the computers
    performance
  • Reproduce through e-mail

73
Internet Language (Contd)
  • Malicious Software
  • Virus
  • Program that perform unrequested and often
    destructive act
  • Biggest computer security problem
  • Macro
  • Ability to stores a series of commands that
    happen in sequence

74
Internet Language (Contd)
  • Broken Link
  • A link that references a page that no longer
    exists.
  • If you click on a broken link you will get some
    kind of "Page not found - Error 404" message.
  • Webserver
  • is a computer which holds a number of Web pages,
  • 'serves' them out to computers that request
    them.
  • There is nothing very special about the actual
    computer - it's just an ordinary computer (though
    usually a fairly powerful one) running special
    software.

75
  • Remote Not on your own computer or on a computer
    directly connected with yours, but far away out
    in the Internet somewhere

76
Implications for Management
  • Surge of E-commerce
  • IT Job Market
  • 850,000 IT jobs go unfilled in 2001
  • Job Loyalty
  • First National Techies Day

77
Summary
  • Introduction
  • Usage of Internet
  • Limitations
  • Ease of Searching Online
  • Bulletin Board Systems vs. Pay Services
  • Web Fundamentals
  • Internet Language
  • Implications for Management

78
Chapter 2Internet World Wide Web
WWW
Write a Comment
User Comments (0)
About PowerShow.com