-
The
Internet
is
a huge WAN
which
act as a communication
tunnel
linking all the computers connected to the Internet together bridging all
known boundaries and borders.
-
The components working together
which make the Internet possible for all of us include
modems, ISP’s, DCHP
, DNS, Browsers, Protocols, and Routers etc.
-
In today’s world where all
computers are connected through this web one must be fearful of viruses
and take all possible precautions to avoid infection by using anti-virus programs
-
The
Internet
was
a project initially developed by a component of the military called the
Advanced Research Project Agency (ARPA
) to advance their communication
capabilities.
-
The
Internet
sometimes
referred to as the world wide web
(www)
is a huge WAN
consisting
of many small and large WANs.
-
All these computers can
communicate with each using the TCP/IP protocol
-
The Internet has since been improved by
universities, and researchers throughout the world and now is overseen by
different organizations such as ISOC
and IETF
.
-
It is rather difficult to
control the Internet because all the web servers are dispersed
throughout the world and there are so many parties involved in its
development.
-
The
Internet
Society
(ISOC
) is responsible for overseeing
the developments and the construction of the Internet.
-
The
Internet
engineering
taskforce (IETF
) is an organization to implement
requested improvements to the Internet made by the public and companies
referred to as Request For Comment (RFC
).
-
All
communicating computers have an IP
address
assigned
to them.
-
The IP address must be legitimate and
assigned by your Internet Service Provider (ISP) before the computer can communicate on the Internet.
-
All computers on the Internet can be identified by their
unique IP address
-
You can connect to any site on
the Internet by connecting to its IP address
-
We will discuss IP addresses at length later in
protocols.
-
In
order to establish an Internet
connection
both individuals and companies must establish an Internet account with an
Internet Service Provider (ISP
).
-
The location of your existence
on the Internet is where your service provider
is located and is defined as Point Of Presence (POP).
·Serial Line Internet Protocol (SLIP) offers no security; Point-to-Point Protocol (PPP) has password encryption security and supports dynamic
allocation of IP addresses easing the dial up
session process.
-
A
Dynamic Host Configuration Protocol (DHCP
) server can be used to lend
typical users of the WEB IP
addresses
from their Internet
Service
Provider (ISP
).
-
A DHCP
server responds to requests
made from client machines for an IP address, by lending it an IP address from it pool of IP addresses only for the
duration of the clients stay on the internet.
·Internet Service Providers (ISP) used a DHCP
server for all their clients,
which allows them to expand their quota, making the presumption that a
fraction of their clients will be on line at the same time.
DNS
Server
-
DNS
stands
for Domain Name Service.
-
Since human being typically
find it difficult to remember numbers and find it easier to remember
names, the DNS server was born.
·DNS
servers
have a database of site names and their associated IP
addresses.
-
If
an Internet
user
needs to connect to a particular site, they only need to type the name of
the site in the browser
and
the local DNS
will
provide the users browser with the sites IP
address
-
DNS
servers
perform queries among them selves throughout the Internet
to
resolve IP
addresses.
-
A
browser
is
software
designed
for downloading Internet
pages
and interpreting the HTML
code
information
on
each page in the site of interest.
-
The
two major browsers
currently
in the market are Internet
Explorer
and
Netscape
-
Hypertext Markup Language (HTML) is the special tag language used to present Web pages.
·This is achieved by assigning private fake IP addresses to the LAN computers at one end of the
firewall and connection the other end of the firewall to the Internet have a public real address
-
A
virus
is
a program designed to have two main functions in life, destruction of
computer data/hardware and reproduction of the virus itself on to other
devices
-
The main medium for virus
transfer is either a diskette
or the Internet, although it can be transferred by other mediums.
-
Internet
viruses
predominantly infect computers either by through e-mail, or when
downloading sharewares.
-
E-mail viruses infect your
system when you open a disguised e-mail attachment and then expand their
circle to other machines using your e-mail contacts list and send the same infected e-mail to all the people you
know.
Questions
1) Which are the
authorities who over see progress on the internet? (Choose all that apply)
a)
ISOC
b)
IEEE
c)
IETF
d)
ITIE
e)
ARPA
2) What is a
Request For Comment (RFC
)?
a)
Comments on an Internet connection
b)
Military permissions
c)
Permission to make comments on the Internet
d)
Suggestions for Internet improvements
e)
Another name for a token
3) What are
features of TCP/IP? (choose all that apply)
a)
All Computers on a TCP/IP network require a unique IP address
b)
TCP/IP is the main protocol of the internet
c)
TCP/IP is a non-routable protocol
d)
TCP/IP is a routable protocol
e)
TCP/IP contains protocols such as HTTP
4) What is the
dial up protocols? (Choose all that apply)
a)
SLIP
b)
ISS
c)
CWD
d)
PPP
5) What are
features of PPTP
? (Choose all that apply)
a)
Uses PPP encryption
b)
Faster then PPP
c)
Used in a VPN
d)
Performs data encapsulation
6) What are
features of DHCP
? (Choose all that apply)
a)
Dynamically assigns IP addresses to different TCP/IP clients
b)
Contains a pool of IP addresses
c)
Changes the clients fixed IP address
d)
Clients are required to renew leases
e)
Dynamically connects two computers
f)
Also sends the client information about the DNS and the default gateway
7) What are
features of DNS? (Choose all that apply)
a)
Informs the client of the IP address or the required server
b)
Contains a pool of IP addresses
c)
Queries other DNS servers for the required IP address
d)
Clients are required to renew leases
e)
Dynamically connects two computers
f)
Performs a name to IP conversion
8)The URL address of a site can be written
a:
a)
http://207.222.34.56/page1.com
b)
Page1.htm
c)
http://www.BooksAndCD
Training
.Com
d)
\\207.222.34.56\folder1
e)
\\207.222.34.56\page1
f)
html://www.Booksandcdtraining.com
9) The UNC
address of a site can be written
as:
a)
http://207.222.34.56/page1.com
b)
page1.htm
c)
http://www.BooksAndCD
Training
.Com
d)
\\207.222.34.56\folder1
e)
\\207.222.34.56\page1
f)
html://www.Booksandcdtraining.com
10) What are
features of a firewall? (Choose all that apply)
a)
Assigns a private IP address to its network clients
b)
Contains two network cards
c)
One network card is assigned a public address
d)
Blocks all network computers from the Internet
e)
Protects all network from Internet intruders
f)
Reports all unwanted traffic to the Internet authorities
11) What are
features of a Virus? (Choose all that apply)
a)
Designed for the destruction of software and data
b)
Evolves over time
c)
Can be transferred to any writ able medium
d)
Designed to reproduces itself
e)
Can be transmitted with emails
f)
Cannot be transferred on the Internet
Answers
-
A,C
-
D
-
A,B,D,E
-
A,D
-
A,C,D
-
A,B,D,F
-
A,C,F
-
C
-
E
-
A,B,C,D,E
-
A,C,D,E