Module 1 - Free Home Page

advertisement
Module 1: The Internet
Overview
It is essential today to become proficient in using Internet tools. The Internet brings democracy to
communications, provides an open medium to produce and consume services and products, and empowers us
by stimulating and encouraging innovation, participation, and imagination, anytime and anywhere. In this
module, we will discuss fundamental topics concerning the Internet.
First, we will provide some background about the Internet. Topics include defining the Internet, explaining the
history of the Internet, and discussing the different organizations that operate, manage, and set standards for
the Internet.
Next, we will talk about how the Internet works, focusing on the client/server model and the Internet
infrastructure. In addition, we will discuss how to transfer data via the Internet using Internet protocols and
addresses.
We will conclude this module by explaining the different technologies available for connecting to the Internet,
including wired and wireless.
Please note that many of the examples used in this course will focus on access to different servers, applications,
or other resources cited in the modules. When needed, specific instructions will be given for each division on
how to access the individual servers required for completing your coursework.
Report broken links or any other problems on this page.
Copyright © by University of Maryland University College .
Module 1: The Internet
Objectives
After completing this module, you should be able to:
outline the history of the Internet
describe the Internet's administrative and organizational entities
illustrate Internet protocols and addressing
describe Internet connectivity methodologies
Report broken links or any other problems on this page.
Copyright © by University of Maryland University College .
Module 1: The Internet
Commentary
Topics
1.
2.
3.
4.
What Is the Internet?
History of the Internet
Internet Organizations
How the Internet Works
Module 1: The Internet
5.
6.
7.
8.
9.
The Internet Infrastructure
Internet Addressing
Internet Protocols
Connecting to the Internet
Internet Connection Technologies
What Is the Internet?
Contrary to popular belief, the Internet is not a physical entity to which one connects computers and computer
networks. Actually, it is a collection of computers and computer networks located all over the world. It is
important to note that throughout this course we will use the phrase "connected to the Internet." In reality,
however, a computer or computer network does not actually connect to the Internet; rather it becomes a
member of the Internet. To become a member of the Internet, the computer or computer network connects to
an existing member of the Internet by using a common set of Internet protocols.
The World Wide Web, or simply the Web, is only an element of the Internet. It is actually an overlay of the
Internet that enables us to access the information of the Internet in a graphical form. The Web uses the
Internet protocol of HTTP (Hypertext Transfer Protocol) to allow people to transmit data. HTTP is only one of
the languages "spoken" over the Internet. We will discuss this and other Internet protocols later in this module.
You can view the Internet in three ways:
as a group of resources available and accessible worldwide
as a community of people who exchange information and interact over the worldwide network
as a worldwide collection of computers and networks
In this section, we will focus on the last definition.
Two or more computers connected together and able to talk and understand each other constitute a computer
network. The Internet (with a capital I) is a proper noun and refers to the largest group of interconnected
networks in the world. The internet (with a small i) is a common noun and refers to any specific computer
network using TCP/IP protocols. There is only one Internet; however, there are many different types of
internets and private intranets. Companies and organizations can also choose to connect their internal networks
together, creating an "extranet."
Network managers make decisions regarding the size of the network, the topology, and how networks will be
connected to each other. Network sizes are LAN, MAN, and WAN. The Internet is the largest WAN in the world.
The function of an internet is essentially the same as any other communication medium, such as newspapers,
television, radio, the telephone system, or the postal system, in that each is made up of components that work
together to facilitate the dissemination of information.
An internet consists of:
hosts
a common communication protocol
a common address space
telecommunication links to connect the computers to the hosts
The same definition applies to the Internet (with a capital I).
Module 1: The Internet
A way to understand the Internet may be to compare it to a pre-existing network—a network used by the
creators of the Internet because of its proven method of using redundancy to increase communication: the
Public Switched Telephone Network (PSTN), also known as the United States' telephone system.
A telephone handset is the main device used for communication with other people connected to the telephone
system, which is normally located in one's home or office. The desktop computer is the main device most
people use to communicate with other people connected to the Internet, which, again, is normally located in
one's home or office. An illustration of the analogy appears below.
Telephone System
Communication device
telephone handset
The Internet
computer (host)
Communication protocol analog and digital signals
TCP/IP
Address space
telephone number
IP address
Communication media
copper wire, fiber optics, satellite, etc. copper wire, fiber optics, satellite, etc.
Return to top of page
History of the Internet
The U.S. Department of Defense (DOD) Advanced Research Projects Agency (ARPA) developed the ARPANET in
1969. ARPANET allowed four computers, located in California and Utah, to "talk" to each other. Because of the
Cold War and the fear of possible nuclear attacks, ARPANET was designed to allow continued communication if
one or more communication sites were destroyed. In the 1970s and 1980s, developers created the protocols
used to transfer, categorize, and search for information, using the ARPANET as a vehicle to transport the data.
Also during this time, the ARPANET was renamed the Internet. One of the most authoritative timelines of the
Internet can be seen at Hobbes' Internet Timeline.
The public was unaware of the Internet and its capabilities until after the development of the World Wide Web
(WWW) and the subsequent commercialization of the Internet. In 1989, Tim Berners-Lee and his co-workers at
the European Laboratory for Particle Physics (CERN) created another Internet protocol (HTTP), based on
hypertext and linking. This protocol allowed users to link directly from a document to another resource on the
Internet without issuing commands directly to their computers. Although this was a great improvement in
Internet accessibility, the system used a text-based browser.
Then, in 1992, Marc Andreessen released a Graphical User Interface (GUI) version of a browser called Mosaic
that allowed easier manipulation of Internet resources. The Mosaic browser became the browser known today
as Netscape. It is interesting to note that Microsoft founder Bill Gates stated in a 1996 interview that the WWW
was a passing fad and would never catch on in the United States!
It is important to understand four main points about the Internet:
it
it
it
it
was not designed to be secure
was not designed to have centralized management
is not operated by any one organization
was designed to be redundant
Before we continue our discussion of the Internet, we must briefly discuss its continuing evolution: Internet2.
Internet2 is a partnership of American universities, companies, and government laboratories working to develop
and promote the next generation of the Internet. Because of the advanced applications being developed within
Internet2, it requires high-speed telecommunication links. Internet2 currently operates at 10 gigabits per
second and supports transfer rates 100 to 1,000 times faster than typical broadband connections (Webopedia,
Module 1: The Internet
"Internet2"). A large portion of Internet2 is the result of a new Internet Protocol configuration, Internet Protocol
version 6 (IPv6). This will be explained further in the Internet Protocol section below.
Internet2 will also create new ways to use the Internet by using the Internet2 network infrastructure as a
conduit. Current Internet2 projects include telemedicine, digital libraries, and virtual laboratories (Webopedia,
"Internet2"). If you would like to learn more about Internet2, you can find links to additional information in our
Relevant URLs section.
Return to top of page
Internet Organizations
Although the Internet does not have a centralized management or operational structure, corporations and
governments do have a say about the how the Internet functions. The surprising thing, however, is the small
degree of control they have, mainly because so many corporations and governments are involved that none of
them individually has much power. In addition to corporations and governments, other Internet organizations
recommend and set standards for the Internet.
Corporations
Corporations exert influence on the Internet, and there are thousands of companies involved—however, no
single company dominates the Internet. In other words, although one company may dominate a particular
segment—such as browser market share, Internet access accounts, telecommunication links, or router
deployment—no company controls the Internet the way AT&T dominated the telephone industry years ago, the
way the U.S. Postal Service currently dominates the delivery of residential mail, or the way Microsoft dominates
the desktop operating system industry.
Governments
Some governments in the world rigidly control Internet access to limit the amount of information their citizens
can see. In contrast, until recently, the United States took a "hands-off" approach to Internet regulation. Yes,
laws were passed in the last few years, dealing mainly with pornography and, to a lesser extent, interstatecommerce taxation. However, either the U.S. Supreme Court struck down these laws or they had limited impact.
Nevertheless, because of world events and economic conditions, the United States and state governments are
exerting increasing levels of control over the Internet, especially in the areas of monitoring, security, and
interstate-commerce taxation.
Standards Setters
Standards-setting organizations provide for the ongoing viability of the Internet by developing, testing,
implementing, and publishing standards. Although there are many standards-setting bodies devoted to the
Internet, two groups have taken a major leadership role in this area:
the Internet Society (ISOC)
the World Wide Web Consortium (W3C)
The ISOC consists of individuals and organizations that actually created the Internet, as well as any
organization that wants to contribute to the maintenance of the Internet. The ISOC is also the organizational
home of the Internet Engineering Task Force (IETF), the Internet Architecture Board (IAB), the Internet
Engineering Steering Group (IESG), and the Internet Research Task Force (IRTF).
Here is how the process works:
The IETF develops the standards.
Module 1: The Internet
The
The
The
The
IRTF conducts research, in conjunction with the IETF.
IESG considers the standards.
IAB handles an appeal if a standard is rejected by the IESG.
ISOC champions the standards as international standards.
The responsibility for developing WWW standards falls to the W3C, which develops standards for everything
from the HTTP protocol (in conjunction with the IETF) to Web-accessibility issues. For example, if your Web site
must comply with Section 508 of the Americans with Disabilities Act, you will find guidelines, checklists,
evaluations, and even training resources at the W3C Web site. The goal of the W3C, which was founded by Tim
Berners-Lee, is to develop open standards so that the Web evolves in a single direction rather than being
splintered among competing factions.
Other Internet standards-setting organizations include:
the
the
the
the
the
European Telecommunications Standards Institute (ETSI)
Internet Assigned Numbers Authority (IANA)
Internet Corporation for Assigned Names and Numbers (ICANN)
International Telecommunication Union (ITU)
Working Group on Internet Governance (WGIG)
You, as an individual, organization, or company, can join these organizations, although most require a
membership fee. We have provided individual hyperlinks in the above standards-setting organizations list so
that you can easily go to these organizations' Web sites. You will find these same links listed in our Relevant
URLs section.
Return to top of page
How the Internet Works
The Client/Server Model
The Internet operates on a principle called the client/server model. This model has three components:
the client
the network
the server
As an analogy, the Internet consists of train tracks (the network—connecting at many different intersections)
that carry and transfer data (the train cars) between the clients and the servers.
Below is an example of the client/server model in action:
Figure 1.1
The Client/Server Model
Module 1: The Internet
For example, if you go to a restaurant and order dinner from a waiter, he is acting in the capacity of a server. In
other words, he is giving or serving you something. You, meanwhile, are acting in the capacity of a client
because you are asking for or receiving a resource (dinner, in this case). In the client/server model, clients ask
servers for resources, such as files.
Because you are reading this module online, you are using a Web browser, which is an application on the client
computer. The software used to access network services is called client software. Examples include the e-mail
program, the browser, the chat program, and conference-meeting software. To view this page, your browser
contacted a Web server (WebTycho), and, using the Internet as the network to transfer the data, asked for a
resource (the page you are reading).
Server software is used to provide services to clients. When the network is large, a network may divide the
duties into separate servers, i.e., mail servers, print servers, Web servers, and so forth. To tell the Web server
which resources you want, you type in a Uniform Resource Locator (URL). The Web server then responds with
the page and you read it.
The key concept here is that the client is using a protocol, or set of rules, that the server understands. In this
case, it is the HyperText Transfer Protocol (HTTP). HTTP is the protocol that the client (browser) and server
(Web) understand. This concept applies to any type of service you are using on the Internet, such as
sending/receiving e-mail or transferring files.
Return to top of page
The Internet Infrastructure
The Internet works because most large telecommunication companies have their own dedicated backbones that
connect various localities. In each locality, the company has a point of presence (POP). Still, there is no single
entity controlling the overall network.
Instead, there are a few high-level networks connecting to each other through Network Access Points (NAPs).
On the Internet, the largest Internet Service Providers (ISPs) connect at NAPs at various points around the
world. At these points, the ISPs have to be able to handle trillions and trillions of bytes of data flowing through
each system.
The Internet depends on NAPs, backbones, and routers to talk to each other. Even with all of the traffic involved
and the different interconnection points, data sent out on the Internet by a user can travel around the world in
a second or less.
Module 1: The Internet
In reality, the Internet is a collection of large corporate networks that agree to communicate with each other at
the NAPs. This is how every computer on the Internet connects to every other computer on it.
Below is an illustration of the Internet infrastructure.
Figure 1.2
Internet Infrastructure
Return to top of page
Internet Protocols
Protocols are very specific rules for transferring information via the Internet. Protocols do the following:
provide methods for transferring messages
specify the format of messages
describe how to handle errors
As we mentioned earlier, to become part of the Internet, you must use TCP/IP-related protocols. Similarly, the
applications that you use to run different services on the Internet (such as Telnet, FTP, and e-mail) build their
own protocols based on TCP/IP.
TCP/IP
The most basic Internet protocol is Transmission Control Protocol/Internet Protocol (TCP/IP). TCP/IP (formally
called the TCP/IP protocol suite) actually consists of hundreds of protocols. TCP defines how Internet messages
are broken into packets for traveling over the Internet and then put back together once they arrive at their
destination. The main purpose of IP is to get the packet to its destination via the address part of each packet.
TCP is transparent while the IP is more visible because we can actually see the address we are using.
High-Level Protocols
Other protocols use TCP/IP to get application-specific data to the destination. We use these high-level or
application-level protocols for requesting software applications on remote computers to perform a specific
function for us.
Module 1: The Internet
Below are examples of these high-level protocols that we will discuss in this course:
Telnet
HyperText Transfer Protocol (HTTP)
File Transfer Protocol (FTP)
Simple Mail Transfer Protocol (SMTP)
Post Office Protocol (POP)
Network News Transfer Protocol (NNTP)
Figure 1.3
High-Level Protocols
It is important to note that if you use one of these high-level protocols, a server must exist somewhere on the
Internet and a client program must be present on the computer on which you are issuing the commands. For
example, if you want to download a file to your computer and you are using the FTP protocol, you must have an
address to the FTP server to retrieve the file and you will need an FTP client to talk to the FTP server to initiate
the request.
Return to top of page
Internet Addressing
Internet Protocol (IP) Addresses
Every computer on the Internet needs a unique number or address to identify it. The telephone network has the
same requirement. On the telephone network, this number is your telephone number. On the Internet, this
number is your IP address.
A typical international telephone number looks like this:
01-202-555-1212
A typical IP address looks like this:
Module 1: The Internet
131.171.11.23
The IP address above is the address for one of the United States–based WebTycho sites.
Both numbers (the telephone number and IP address) work in a similar fashion. In general, when reading the
numbers from left to right, we get closer to the actual telephone or computer. For example, the telephone
number is constructed as follows:
01
202
555
1212
=
=
=
=
North America
Washington, D.C.
a central office in the Washington, D.C., area
the actual number assigned to your telephone line,
which is connected to your telephone
An IP address consists of a 32-bit number that is actually written as four decimal numbers, with each number
separated by a period. This is known as the dotted decimal notation, and each piece of the address is called an
octet. Each number can be from 0 to 255.
An IP address has the following three parts:
the part that identifies its class
the part that identifies a particular network on the Internet
the part that identifies a particular device (host) within that network
The class of the address determines which part belongs to the network and which part belongs to the host.
There are three different classes or types of IP addresses that the average Internet user should be aware of:
class A, B, and C.
Below are three IP address examples, along with an interpretation of the addresses.
IP Address
Example
Class and Network
Designation
Host
Designation
Class A
95.158.200.120
95.
158.200.120
Class B
140.212.117.50
140.212.
117.50
Class C
210.167.210.220
210.167.210.
220
For example, the raw IP address in binary (shown below) translates to the dotted decimal Class B address of:
131.171.11.23.
10000011 10101011 00001011 00010111
131.171 = the class and network part of the address
11.23
= the actual computer or host within the network
When you receive an IP address, it is either a dynamic or static address. Normally, if you connect using one of
the major ISPs (such as Earthlink, MSN, or AOL) and use a dial-up connection, they have assigned you a
dynamic IP address. However, some ISPs (mainly cable companies and DSL ISPs) give you a static IP address.
Regardless, if you are using a Windows system, you can determine your IP address by typing the commands
"winipcfg" or "ipconfig" at the DOS command prompt when you log onto the Internet.
Module 1: The Internet
The current IP addressing system for the Internet is IPv4 (Internet Protocol version 4), but work is being done
on IPv6 (Internet Protocol version 6). Our current Internet Protocol (TCP/IP–IPv4) is now more than 20 years
old and is showing signs of its age. Most important, there is a growing shortage of IPv4 addresses needed by all
the new machines added to the Internet. IPv6 resolves this issue by lengthening IP addresses from 32 bits to
128 bits, allowing for considerable future growth of the Internet. For more information, see Understanding IPv6
by David Morton.
The Domain Name System (DNS)
IP addresses are hard for people to remember. To make it easier to remember the names of computers on the
Internet, the Domain Name System (DNS) was developed. For example, to access WebTycho, you only have to
remember tychousa.umuc.edu instead of 131.171.11.23.
When you use the Internet to send an e-mail message or to access WebTycho, you use a domain name to do so.
For example, "http://tychousa.umuc.edu" contains the domain name umuc.edu. However, the e-mail address
"smith@umuc.edu" also contains the domain name umuc.edu. Every time you use a domain name, you use the
Internet's DNS servers to translate the human-readable domain name into the computer-readable IP address.
Just like telephone numbers and IP addresses, domain names follow a hierarchy. However, the precedence is
reversed. There are top-level domains and subdomains. The top-level domain name has the highest precedence.
The most common top-level domain names include .com, .org, .net, .edu, and .gov. You may be surprised to
know that over 100 top-level domain names exist. You can see this list at the Internet Corporation for Assigned
Names' (ICANN's) list of top-level domains.
Within every top-level domain is a list of second-level domains. For example, in the .edu first-level domain
below, there are second-level domains.
University Name
Second-Level
Domain
University of Maryland University College
umuc.edu
University of North Carolina
unc.edu
Harvard University
harvard.edu
Howard University
howard.edu
Every name in the .edu top-level domain must be unique. The leftmost word, such as tychousa, is the host
name. It specifies the name of a specific computer, which has a specific IP address in a domain.
For example, the second-level domain "umuc.edu" could have subdomains such as www.us.umuc.edu,
ftp.us.umuc.edu, or xxx.us.umuc.edu, which are all valid domain names. In the domain www.us.umuc.edu, edu
is the top-level domain, umuc.edu is a second-level domain, us.umuc.edu is a third-level domain, and
www.us.umuc.edu is a fourth-level domain, which specifies the actual name of the computer (www.).
All of these names make IP addresses easier for us to remember, but a DNS server is necessary to process a
domain name request. DNS servers accept requests from programs and other name servers to convert domain
names into IP addresses. When a request comes in, the DNS server can do one of the following four things with
it:
If it knows the IP address, it will answer the request for the requested domain with an IP address.
It can contact another DNS server and try to find the IP address for the name requested.
It can respond to the request by saying, "I do not know the IP address for the domain you requested,
but here is the IP address for a DNS server that does know."
Module 1: The Internet
It can return an error message because the requested domain name does not exist or is invalid.
Figure 1.4
Domain Name Requests
If you should ever type a domain name into a client and nothing happens, or you receive an error message, try
using the IP address instead. The DNS could be down. For example, instead of typing http://www.umuc.edu,
type http://137.171.11.11.
By the way, if you know the domain name or host name, such as tychousa.umuc.edu, you can retrieve the IP
address by typing the command ping tychousa.umuc.edu at the DOS command prompt, if you are using
Windows.
One thing to remember is that although domain names are great for people, they are useless for computers.
That is why applications, like browsers, must find the IP addresses before they can get the resource you want.
To obtain a domain name for yourself or your business, you must register with a registrar. You can get a list of
registrars by going to the ICANN Web site. Once you are at the site, click on the Registrars Listing link to view a
list of certified registrars. In 2000, ICANN introduced seven new generic domain names: .aero (for the airtransport industry), .biz (for businesses), .coop (for cooperatives), .info (for all uses), .museum (for
museums), .name (for individuals), and .pro (for professions).
Uniform Resource Locator (URL)
Every resource on the Internet has a unique URL. The type of resource depends on the Internet application
protocol. For example, an HTML page (like the one you are reading) is an HTTP resource. The URL has four
parts:
the name of the protocol required to access the resource
a domain name that identifies a specific computer on the Internet
a port number, which is optional
the location of the file on the computer
Below is a representation of a URL:
Figure 1.5
The Uniform Resource Locator (URL)
Module 1: The Internet
This tells your browser that you want to locate a Web page named schedule.htm, located in a folder named
/cmst385, on a computer named tychousa.umuc.edu.
Notice that this example does not include a port number. If you do not include a port number, the Web browser
will assume a default port number for the service you requested. For example, the default port number for Web
services (http://) is 80. If the Web server administrator changes the default port number on the Web server,
the URL must contain the port number. The following example uses a port number:
http://tychousa.umuc.edu:8080/cmst385/schedule.htm
Now, if you type in http://tychousa.umuc.edu/cmst385 instead (without specifying a file name), the Web server
will normally give you a file named index.htm or index.html, but it could be any name the system administrator
has specified. This is a default page. For example, if you access http://www.umuc.edu, you will notice that the
UMUC home page will display but there is no file name specified in the browser's command line at the top of the
screen. The default file for any specific folder is its index.html page. If a folder does not have an index.html file,
then depending on the UNIX settings/security settings, either you will see a list of files located within that folder
or you will get a message stating that you do not have permission to view the contents of the folder. We will
discuss these permission settings in module 5.
There are different types of URL protocols. A URL for a file that you want to fully download and save on your
computer requires that you specify the "ftp" protocol in the URL, for example:
ftp://tychousa.umuc.edu/cmst385/courses.doc.
If you are using the latest versions of most browsers, you need not include the protocol in a URL if you are
requesting a Web page. If you do not include the protocol, the Web browser assumes the http:// protocol. Note
that capitalization doesn't matter at this level either: http://www.umuc.edu/ and http://www.umuc.edu/ will
take you to the same place. However, when you are typing the specific file names (specifically on a UNIX
server) you must use appropriate capitalization. Typing www.umuc.edu/track1/Jones.html will take you to a
different location than www.umuc.edu/Track1/jones.html.
Return to top of page
Connecting to the Internet
Every computer that connects to the Internet is part of a network. For example:
You could be in a hotel lobby and connect to the Internet, via an ISP, using a wireless technology.
You could be at home and use your cable modem to connect to your ISP.
You could be at your office and connect to an ISP via a local area network.
From an Internet-user perspective, the most important component of the Internet connection process is
probably the Internet Service Provider (ISP). As a typical Internet user, however, you will use many different
components and services to access resources on the Internet. Below is an overview of the process.
Internet Connection Process
Module 1: The Internet
Internet
Components
Tasks
Resources
computer
(desktop, laptop,
PDA)
device you use to send
and receive multimedia
sound, video, camera, voice
recognition
communication
equipment
connects your computer
to the local loop
dial-up modem, regular telephone
line, DSL, cable modem, ISDN,
satellite, LANs, routers
local loop carrier
connects you to your ISP
communication lines, cable, satellite,
wireless
ISP POPs
logs you into your ISP
remote ports
Internet services
services you use to
access resources on the
Internet
DNS, e-mail, NNTP, Telnet, FTP, Web
ISP backbone
interconnects ISP POPs,
ISPs to other ISPs, and
ISPs to content
backbone providers, fiber optics lines,
NAPs
Online content
sites that contain the
resources you want
Web servers, portals, remote
computing, files
Origin of online
content
source of the content
legacy systems, scanned resources,
streaming audio and video,
telephony, phone, recordings, original
content
ISPs
Originally, people accessed the Internet by using a desktop computer, modem, and telephone line in their home.
Now, many people access the Internet through high-speed broadband connections and wireless remote
connections. According to a comScore news release, 36 percent of U.S. online users accessed the Web through
a high-speed connection in the fourth quarter of 2003 (March 2004). The Yankee Group estimates that U.S.
broadband home Internet use will grow to 66 percent by 2008. There are other access points as well, including
libraries, airports, televisions, handheld devices, cybercafés, and automobiles. In all of these scenarios, however,
you still need an ISP to get there.
When you connect to your ISP, you become part of their network. The ISP may then connect to a larger
network and, in turn, become part of its network. Again, the Internet is just a network of networks.
An ISP normally gives you three things to help you access the Internet: connection line (such as a telephone
line or cable), the software you need to connect, and technical support in case you have problems. In addition,
many ISPs provide Web site space and e-mail accounts.
There are also special types of ISPs, called online service providers, that provide additional services such as
special features, special content, and a home page that provides you links to many useful Internet sites.
Examples of ISPs that are also online service providers include EarthLink, AOL, AT&T, and MSN. During this
course, we will refer to any entity that provides Internet access as an ISP.
Module 1: The Internet
To identify ISPs in your area, you can use an online search engine or look in your telephone book under the
"Internet services and products" heading. Then call their customer service number and ask the representative
about the following factors:
Factors
ISP Considerations
Dial-in or remote
access
Does the ISP have a telephone number in your local area?
Does the ISP have a local or toll-free telephone number in the areas to
which you may travel?
Internet availability
How often will you get through when you actually try to access the
Internet? (You may conduct your own test by accessing your ISP at
different times.)
E-mail
Does the ISP offer e-mail accounts, and how many?
Can you access your account away from home by using the Web?
Performance
Is your e-mail delivered instantly or is it stored and delivered at specified
times?
How long does an average Web page take to download?
What is the uptime rate for the ISP?
Customer service and
technical support
Are technical support and customer service available online?
Is the telephone call toll-free?
What is the wait time once you make a call?
Are the support and service personnel courteous and knowledgeable?
Are the support and service personnel available when you need them?
Cost
Does the ISP offer different monthly subscriptions, such as a flat monthly
fee with unlimited access, or limited hours with additional hours for an
extra charge?
Does the ISP offer special features, content, or promotions?
Web site
Does the ISP give you space for a Web site?
How much space will you get and how much will it cost?
Is there a charge for traffic generated to and from your site?
Does your ISP support server-side technologies such as CGI, ASP, JSP, or
ColdFusion?
Upgrades
If using dial-up, can you upgrade to a faster service such as Digital
Subscriber Line (DSL)?
If using cable or DSL, how often is the connection software updated? Can
these updates be done remotely?
Many Internet sites compare ISP services. You can find links to these sites in our Relevant URLs section.
Return to top of page
Internet Connection Technologies
There are many ways to physically connect to the Internet. The physical connection between any two nodes can
be any type of electrical medium. The physical connection can be a telephone line, cable modem, Digital
Module 1: The Internet
Subscriber Line (DSL), satellite, an Integrated Services Digital Network (ISDN) line, a leased T-line, or wireless.
All that is necessary is that they use the common set of Internet-related protocols. Not all types of connections
are available in every geographic area, so your selection may be limited to what local providers offer. Following
is some information to help you make your choice.
Dial-Up Connection Using a Modem
Dial-up is the original way of connecting to the Internet. While online, however, the telephone is unavailable for
calls unless a line splitter is installed. Modems can be either external or internal. Your ISP will provide the
telephone number to use for your area, the settings you need, and the software on CD-ROM to install on your
computer.
The minimum standard for modem speed today is 56 kbps (56,000 bits per second), but you will never achieve
this upper limit on your home computer. First, there is a federal law that limits data transmission on the
telephone system to 53K. Second, you may have a "dirty" telephone line. To check this you can pick up your
telephone, press a key, and then listen to the background for pops, crackles, or even others' conversations. This
is "noise," which could affect your modem. These "noise" sources may be inside your home, outside, or both.
Some possible sources inside your home are:
telephone line placed too close to fluorescent lights or running motors
move the lines, if possible
dirty telephone wall sockets and jacks
clean the connecting pins on both until the original color appears
be sure to inspect all sockets that share the same telephone line, because a dirty socket in your
family room could affect your modem connection in your bedroom if they use the same line
try disconnecting extra devices on the line, such as extra telephones and fax machines, in other rooms
If you think the problem is outside your home, contact your telephone company and have someone there do a
check. However, the typical speed of a 56K modem will be from 42K to 50K.
U.S. Dial-Up Average Costs
Internet access
from free to $20 per month
modem
$25 to $80 (normally included with computer)
modem installation
$50 or self-installed
telephone cable
$10 or less
extra telephone line
$20 to $30 per month (optional)
DSL
DSL exists in different forms and they work at varying distances and speeds from the nearest telephone central
office. To get DSL, you must contact your local phone company or ISP and ask what is available for your
location. If you live outside a certain distance from the central office, you will be unable to get DSL. DSL can
significantly increase your connection speed versus a standard dial-up modem (384–1,000 kbps vs. 1.5–100
Module 1: The Internet
mbps). Although it operates over normal telephone lines, you can use your telephone at the same time because
DSL uses a binary transfer of data. To gain the top range advertised by the DSL provider, you must live within a
three-mile radius of the company providing access. DSL is also an "always-on" connection; you will need a
firewall.
U.S. DSL Average Costs
Internet access
$40 to $50 per month
modem and cable
$80 to $260 (sometimes free with promotion)
installation
$40 to $60 (sometimes free with promotion)
Cable Modems
Cable modems connect to the Internet through a cable TV line at a far greater speed than dial-up. This medium
has a faster transfer rate (around 512 kbps) and is not affected by outside weather patterns. The connection is
"always-on" (unless you turn off your computer) and it does not tie up the phone line. Multiple computers can
be networked through a router, allowing everyone on each household computer to be online at the same time.
If you subscribe to cable TV and cable Internet, you can even watch TV and access the Internet at the same
time. You will need an Ethernet card, which comes standard on most computers.
If you have an "always-on" connection, you will need a firewall to protect the data on your computer. We will
talk about this topic more in module 6. In addition, if you are the first in your neighborhood or apartment
building to get cable modem, you will have a very fast connection because no one else is sharing your
bandwidth. However, because cable connections use an Ethernet technology, the more people that connect to
your cable modem segment, the less bandwidth is available for you.
U.S. Cable Modem Average Costs
Internet access
$35 to $55 per month
modem and cable
$80 to $260 (sometimes free with promotion)
installation
$40 to $60 (self-installation kits available)
additional computer connection
$5 to $15 (if offered)
extra telephone line
$20 to $30 per month (optional)
Satellite
With one-way satellite, you need a conventional modem and a telephone link to an ISP for uploads, and a
satellite dish for downloads. Satellite data transfer speeds range around 400 kbps. Two-way satellite systems
allow you to both upload and download through your satellite dish. Compared to other services, a satellite
connection is quite expensive. However, if you do not have cable or do not live within the required distance for
DSL, this may be your only high-speed option. To aim the satellite dish, satellite requires a clear line of sight to
the south (or to the north, if you are located south of the equator).
U.S. Satellite Average Costs
Internet access
$50 or more per month (depending on the number of hours)
Module 1: The Internet
two-way system
$250 to $575
installation
$175 to $250 (sometimes free with promotion)
ISDN
A single ISDN line can handle up to eight devices, including a computer, telephone, fax, and video, and you can
operate any two devices at the same time. ISDN operates over standard telephone and fiber-optic lines. Costs
vary, depending on a particular country's infrastructure. ISDN is not readily available in the United States, so
the cost can be quite high; however, ISDN is available just about everywhere in Japan, so the cost is
comparatively low. ISDN is slower than cable, running at about 128 kbps.
U.S. ISDN Average Costs
Internet access
$30 to $35 per month
equipment
$125 to $350
installation
$45 to $110
router
$250
T-Lines
Businesses are the primary users of T-lines; however, some apartments, condominiums, and college
dormitories offer these connections as a service for their residents. T-lines are direct, dedicated links to the
Internet. They are very expensive and are usually used by ISPs to provide high-volume customers with Internet
access or by businesses that want to set up private networks. T1 links provide 1.5 mbps connections and T3
lines provide 44 mbps connections.
Wireless Technologies
Wi-Fi (wireless fidelity) is a wireless local area network technology. It works by adding short-range radios to
stationary computers, laptops, and handheld personal digital assistants (PDAs). In addition to homes and offices,
you can find Wi-Fi connection points in airports, cafés, and hotels, which means that you can access the
Internet from almost anywhere. If you use this technology, make sure you follow proper security precautions to
prevent someone from tapping into your signal.
Bluetooth is a specification that describes how PDAs, mobile phones, and computers can connect with each
other and with home and business phones and computers, using a short-range wireless connection. Bluetooth
requires that a low-cost transceiver chip be included in each device. As with Wi-Fi, you should follow proper
security precautions.
Wireless Access Protocol (WAP) is actually a set of protocols that standardize how wireless devices, mainly
mobile phones, access the Internet. WAP allows the user to access such things as Web pages, e-mail, and chat.
WAP follows the Internet's client/server approach and pushes much of the processing to the server, allowing the
wireless device to have a small footprint. WAP's main selling point is its ability to allow interoperability among
different devices and services.
U.S. Wireless Average Costs
Module 1: The Internet
Internet access
$30 to $40 per month
base station (for home computer)
$125 to $650
access device (for each unit such as PDA, cell phone)
$70 to $95
Return to top of page
Report broken links or any other problems on this page.
Copyright © by University of Maryland University College .
These are the popups for this section, in order of their appearance.
Popup 1:
Computer—By definition, a computer is a microprocessor. What you use at home or work is actually a computer
system. However, for the sake of simplicity, we will use the term computer throughout this course.
Popup 2:
Protocol—The methods or rules by which two computers agree to communicate.
Popup 3:
/CMST385/0602/Modules/M1-Module_1/../G1-Glossary.html#TCP/IP
Popup 4:
Intranet—A private network in an organization or enterprise that uses TCP/IP, HTTP, and other Internet
protocols.
Popup 5:
Extranet—An intranet that can be securely accessed by an organization's customers, partners, suppliers, and
vendors.
Popup 6:
Topology—The shape of a local-area network (LAN) or other communications system. Topologies are either
physical or logical. Types of topologies include bus, ring, star, and tree formations.
Module 1: The Internet
Popup 7:
LAN—A computer network that spans a relatively small area. Most LANs are confined to a single building or
group of buildings.
Popup 8:
MAN—Metropolitan Area Network, a data network designed for a town or city. In terms of geographic breadth,
MANs are larger than local-area networks (LANs), but smaller than wide-area networks (WANs).
Popup 9:
WAN—A wide-area network (computer network) that spans a relatively large geographical area. Typically, a
WAN consists of two or more local-area networks (LANs).
Popup 10:
Host—Also called a server, a host is a computer connected to other computers for the purposes of sharing its
resources. Resources include applications, files, peripherals, databases, and Internet connectivity. Computers
connected to the host are known as workstations.
Popup 11:
Protocol—The methods or rules by which two computers agree to communicate.
Popup 12:
Address space—The set of names that can be referenced on the network is called an address space. The
common address space is similar to your telephone number in that each address must be unique.
Popup 13:
http://www.zakon.org/robert/internet/timeline/
Popup 14:
Browser—A program that allows you to view Web pages.
Popup 15:
http://www.internet2.edu/
Module 1: The Internet
Popup 16:
http://www.ietf.org/
Popup 17:
http://www.irtf.org/
Popup 18:
http://www.ietf.org/iesg.html
Popup 19:
http://www.iab.org/
Popup 20:
http://www.isoc.org/
Popup 21:
http://www.etsi.org/
Popup 22:
http://www.iana.org/
Popup 23:
http://www.icann.org/
Module 1: The Internet
Popup 24:
http://www.itu.int/home/
Popup 25:
http://www.wgig.org/
Popup 26:
Clients—Computers on which you run applications, such as word processors, spreadsheets, Web browsers, and
e-mail programs.
Popup 27:
Servers—On the Internet, servers are very fast computers dedicated to managing files, printers, or network
traffic, such as Web or e-mail servers.
Popup 28:
Protocol—The methods or rules by which two computers agree to communicate.
Popup 29:
Backbone—A very high-capacity transmission line or pathway that carries data gathered from local and regional
networks.
Popup 30:
Point of presence (POP)—A place for you to access a company's network, usually without having to pay for the
connection.
Popup 31:
Network Access Points (NAPs)—In the United States, a NAP is one of six major Internet interconnection points
that serve to move all Internet traffic.
Popup 32:
Module 1: The Internet
Internet service providers (ISPs)—Companies that provide other companies and individuals access to the
Internet. An ISP has the telecommunication lines and equipment to have a point of presence on the Internet for
the geographic area served.
Popup 33:
Packets—When you send or receive any type of message on the Internet, that message is broken into packets.
A packet is the unit of data sent or routed between an origin (you) and a destination (such as an e-mail server).
Along with the data, the packet contains the originating IP address and the destination IP address.
Popup 34:
Transparent—If a connection or process is transparent, it works in the background; the user does not need to
do anything to have the operation performed.
Popup 35:
Telnet—A program that allows you to remotely log into other computers on the Internet and is part of the
TCP/IP protocol suite. You can manage files, use resources, and execute programs.
Popup 36:
HyperText Transfer Protocol (HTTP)—The set of rules for exchanging text, graphic images, sound, video, and
other multimedia files between a Web browser and Web server. The main purpose of HTTP is to transfer
displayable Web pages and related files to your Web browser and other devices. A key concept of HTTP is that a
file can contain references (or links) to other files. When you click on the links, the file referenced is sent to
your browser.
Popup 37:
File Transfer Protocol (FTP)—The simplest, but not the only way to exchange files between computers on the
Internet. Its main purpose is to upload and download programs and other files from and to your computer to
and from other computers.
Popup 38:
SMTP—Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers. Most e-mail
systems that send mail over the Internet use SMTP to send messages from one server to another; the
messages can then be retrieved with an e-mail client using either POP or IMAP.
Popup 39:
Post Office Protocol (POP)—POP3 is the most recent version of a standard protocol for receiving e-mail. When
someone sends you Internet e-mail, it is stored in your mailbox at a POP server and is held there for you until
you request that it be downloaded to your computer via an e-mail client.
Module 1: The Internet
Popup 40:
Network News Transfer Protocol (NNTP)—An Internet protocol used to post and retrieve messages on
newsgroups. NNTP servers manage the worldwide network of newsgroups and include the server at your ISP.
An NNTP client is included as part of your browser or e-mail client. You can also use a separate program called a
newsreader. Newsgroups allow you to find the answer to virtually any question you may have. NNTP is the main
protocol used by computers for managing the notes posted on newsgroups
Popup 41:
IP address—A number that identifies each sender or receiver of data that is sent in packets across the Internet.
Although the latest version of the IP is version 6, we will illustrate version 4 in this course because it is the most
widely used.
Popup 42:
Central office—A central office (CO) is an office or a building in a locality that your home or business telephone
line is connected to and has switching equipment that can switch calls locally or to long-distance carrier phone
offices.
Popup 43:
Bit—Bit is short for binary digit and is the smallest unit of data a computer can understand. A bit can be either a
0 or a 1.
Popup 44:
Dynamic—To save money, most corporate networks and ISPs make their users share a pool of IP addresses.
These IP addresses are called dynamic because each time you log into your network or ISP, you get a new one.
Popup 45:
Static—A static IP address is permanently assigned to you.
Popup 46:
http://www.pcsupportadvisor.com/nasample/c0655.pdf
Popup 47:
Module 1: The Internet
DNS—Domain Name System (DNS) serves maps (or equates) text names to IP addresses automatically.
Popup 48:
Top-Level Domain—In the Domain Name System (DNS) naming of computers, there is a hierarchy of names.
The root of the system is unnamed. There is a set of what are called top-level domain names (TLDs). There is a
small set of generic top-level domain names: com for commercial endeavors, org for nonprofit organizations,
net for network providers, mil for military organizations, gov for government organizations, and edu for
educational organizations. There are also a number of top-level domain names for individual countries, including
Canada (ca), Australia (au), and the United Kingdom (uk).
Popup 49:
http://data.iana.org/TLD/tlds-alpha-by-domain.txt
Popup 50:
Second-Level Domain—The portion of a Uniform Resource Locator (URL) that identifies the specific and unique
administrative owner associated with an Internet Protocol (IP) address. The second-level domain name includes
the top-level domain name. For example, in: www.whatis.com, "whatis" is the second-level domain and ".com"
is the top-level domain.
Popup 51:
http://www.icann.org/registrars/accredited-list.html
Popup 52:
URL—The address of a file or resource available on the Internet.
Popup 53:
http://www.umuc.edu/
Popup 54:
Local loop—The connection from a telephone company's central office to your telephone. This connection is
usually a pair of copper wires called a twisted pair.
Module 1: The Internet
Popup 55:
Local loop carrier—A local carrier that rents or sells telecommunication transport.
Popup 56:
Modem—Modem stands for modulate/demodulate. It converts a digital signal originating from your computer to
an analog signal so the signal can be transmitted over your telephone line to your central office. It also takes an
incoming analog signal coming from your central office and converts it to a digital signal that your computer can
understand.
Popup 57:
Broadband—Data transmission in which a single medium (wire) can carry several channels at once. Cable TV,
for example, uses broadband transmission. In contrast, baseband transmission allows only one signal at a time.
Cable and DSL computer networks use broadband transmission.
Popup 58:
http://www.internetworldstats.com/articles/art047.htm
Popup 59:
http://www.internetworldstats.com/am/us.htm
Popup 60:
Nodes—Computing devices that are members of the Internet.
Popup 61:
Line splitter—A line splitter divides a telephone signal into two or more signals.
Popup 62:
Ethernet—A networking technology that allows your computer to connect to a network.
Popup 63:
Module 1: The Internet
Firewall—Allows you to restrict access to and from your computer.
Popup 64:
/CMST385/0602/Modules/M1-Module_1/../G1-Glossary.html#footprint
Module 1: The Internet
Self-Assessment
Directions: Test yourself on how well you know the material. You will get the correct answers when you click
the Submit button at the bottom. There are no grade points for this online review.
Multiple choice: Select the best answer for each of the following:
1. A computer that is able to function on a network is a:
A. protocol
B. host
C. parcel
D. helper
2. The method or rules by which two computers agree to communicate is the:
A. communication link
B. protocol
C. sign
D. commentary
3. The organization that develops WWW standards for the Internet is the:
A. W3C
B. ISOC
C. REP
D. ESOC
4. In reference to the Internet, the three components of the client/server model are the client, the
server, and the:
A. port
B. host
Module 1: The Internet
C. protocol
D. network
5. The six major Internet connection points that serve to move all Internet traffic in the United
States are called:
A. NAPs
B. CAPs
C. HAPs
D. PAPs
6. Which of the following is not considered a high-level protocol?
A. POP
B. NNTP
C. TCP
D. HTTP
7. The protocol used for exchanging text, graphic images, sound, video, and other multimedia files
between a Web browser and Web server is:
A. Telnet
B. HTTP
C. FTP
D. SMTP
8. A number that identifies each sender or receiver of data that is sent in packets across the
Internet is called a(an):
A. communication address
B. IP address
C. TCP address
D. routing address
9. What system was developed to make it easier for people to remember the names of computers on
the Internet?
A. DNS
B. SMS
C. MSN
D. POP
Module 1: The Internet
10. The unique address of a file or resource on the Internet is called a:
A. PPP
B. UPP
C. URL
D. PRL
Report broken links or any other problems on this page.
Copyright © by University of Maryland University College .
Exercises
Due dates for the following assignments and directions for submitting assignments are listed in the Course
Schedule section of your syllabus.
Task
1. Research the availability and cost of DSL and cable modems in your area. Contact your local telephone
and cable companies and find out whether these services are available in your area and what they cost.
Review Questions
1. What is an internet? Identify the similarities and differences between an internet and the Internet.
2. Describe the HTTP protocol and explain why it is important to the Web.
3. What is ARPANET and what is its relationship to the Internet?
4. What is the World Wide Web Consortium and why is it important to the Internet?
5. Describe HTML and explain why it is important to the Web.
6. Describe the difference between a LAN and a WAN.
7. Briefly explain the client/server concept as it relates to the Internet.
8. What is an advantage of using cable modems?
9. How is ADSL different from ISDN?
10. Identify and explain the three basic sections of a URL.
11. If you are using a 56K modem, how long would it take to load a graphic that has 150,000 bytes?
Report broken links or any other problems on this page.
Copyright © by University of Maryland University College .
Download