Using the Internet and Connecting Our Devices PDF

Document Details

InexpensiveEuphonium735

Uploaded by InexpensiveEuphonium735

Wilfrid Laurier University

Tags

internet networking computer networking web applications digital communication

Summary

This document provides an overview of the internet and its components, including how computers communicate and share data. It covers topics like IP addresses, domain names, and various types of networks, along with different business models of e-commerce. The document also touches upon digital activism and privacy concerns related to technology.

Full Transcript

Using the Internet and Connecting our Devices Chapters 3 and 7 UX204 The Internet is the largest computer network in the world The Internet The concept of the internet was developed in the 1950s when the United States was in the midst of the Cold War with the for...

Using the Internet and Connecting our Devices Chapters 3 and 7 UX204 The Internet is the largest computer network in the world The Internet The concept of the internet was developed in the 1950s when the United States was in the midst of the Cold War with the former Soviet Union. The Internet is a network of networks Established a secure form of communication Created a means of communication for all computers The Web Is a subset of the internet Is dedicated to hosting HTML pages Is the means by which we access information over the internet Began in 1991 when Tim Berners-Lee wanted a method for researchers to link research documents How the Internet works: Every computer/device that is connected to the internet acts in one of two ways: – It’s either the CLIENT: a computer asking for data – Or it’s the SERVER: the computer that receives the request and returns data Photo by Pixabay: https://www.pexels.com/photo/two-silver-imac-on-table-265125/ The Internet Protocol address [IP address] –How computers identify each other [it identifies any computer on the internet] –Websites have unique IP addresses –A domain name is the text version of an IP address –Is referred to as a dotted Photo by Pixabay: https://www.pexels.com/photo/two-silver-imac-on-table-265125/ quad Every website has a unique address: The Web With the arrival of many web applications that allow individuals to become creators on the web (rather than passive consumers), the Web 2.0 was born, a dramatic shift for Photo by Ivan Samkov: https://www.pexels.com/photo/a-group-of-friends-taking-video-8117813/ technology users around the world. Photo by cottonbro studio: https://www.pexels.com/photo/liking-a-photo-on-instagram-5052877/ –Sites Web 2.0 ▪LinkedIn ▪Facebook –Social media Social networking Communicating with The Web Communicating with The Web Project collaboration and file sharing tools –Wikis: collaborative web-based documents [Google docs] –Project management tools [Trello, Photo by Mikhail Nilov: https://www.pexels.com/photo/person-in-gray-long-sleeve-shirt-holding-a-laptop-8284728/ Cards, Slack] Blogs –Blogs –Vlogs Communicating with The Web Podcasts – Audio episodes Webcasts Media sharing platforms –YouTube, Flickr, Instagram, Sound Cloud TYPES OF E-COMMERCE BUSINESS MODELS: –Business-to-consumer (B2C): transactions between businesses and consumers –Business-to-business (B2B): when businesses buy and sell goods/services to other businesses –Consumer-to-consumer (C2C): when consumers sell to other consumers [Etsy] Photo by energepic.com: https://www.pexels.com/photo/black-payment-terminal-2988232/ More TYPES OF E-COMMERCE: –Social commerce: uses social networks to assist in marketing and purchasing products [Yelp and TripAdvisor] –Mobile commerce or m- commerce: conducting commercial transactions though a smartphone, tablet, or other mobile device [my husband buying McDonald’s through his app] Making online shopping safer: –Check for secure websites ▪HTTPS: the S stands for secure and indicates secure sockets layer protocol has been applied to the website –Use well-known, reputable sites –Pay by credit card, not debit card –Check return policy –Avoid using public computers [if you have to use a public computer, use a private browser] Browsers & Features: – Use pinned tabs: pin most-used tabs so they display automatically when the browser opens – Use privacy browsing: allow you to browse the web without retaining a history trail – Use session restore: brings back all your active web pages if the browser or system shuts down Search Engines Search engine: a set of programs that search the web for keywords and have three components: –Spiders: constantly collecting data on the web –Indexer: organizes the data from the spiders into large databases –Search engine software: searches the indexed data, pulling out relative information based on your search Getting Better Search results: – Use Boolean operators: using words like ‘and, not, or’ with your keywords [“lemon square recipe no eggs” –Search for a phrase: put quote marks around specific phrases for better results [i.e. “Ford Explorer Models” vs ford] –Search within a website: use the search word, then site, followed by the website’s URL –Use a wild card: using an * in place of an unknown term pro tip: – Using Google Chrome’s Search Tools feature allows you to restrict search results by size, colour, type, time, and usage rights. Internet Resource Considerations –Authority: who is the author of the article or site? –Bias: is the site biased? [perhaps the site is meant to sell a specific product or service rather than to inform] –Relevance: is the information on the site current? –Audience: what audience is the site intended for? –Links: are the links available and appropriate? Digital Activism: raising awareness about specific issues online. Photo by Magnus Mueller: https://www.pexels.com/photo/photo-of-hand-holding-a-black-smartphone-2818118/ Question: Is digital activism effective or does it foster a false sense of involvement? Smartphones have a GPS chip [Your location can be captured from your mobile device even if app location tracking is turned off.] Geolocation—targets consumers by their location Ethical question: Are geolocation devices a Photo by cottonbro studio: https://www.pexels.com/photo/person-holding-black-android-smartphone-4542998/ threat to privacy? COMPUTER NETWORK: when two or more devices are connected via hardware and software so they can communicate with each other. each device attached to the network is referred to as a node. Photo by Yan Krukau: https://www.pexels.com/photo/people-sitting-in-front-of-computers-8867243/ Networks: Benefits of networks –Sharing a high-speed Internet connection –Sharing printers and peripheral devices –Sharing files –Common communications Disadvantage of networks –Setup and administration Networks: How data moves through networks –Data transfer rate (bandwidth) is the maximum speed data can be transmitted –Throughput is the actual speed data is transferred –Measured in megabits per second (Mbps) or gigabits per second (Gbps) NETWORKS CAN BE CLASSIFIED BY DISTANCE: – Personal area network (PAN) - network used for communicating between devices close to one person – Local area network (LAN) - nodes are located within a small geographic area, like a cafe. – Home area network (HAN) - connects all devices in a home – Metropolitan area network (MAN) - provides access to a specific geographic area, like a city – Wide area network (WAN) - spans a large physical distance [The internet is the largest WAN, as it spans the entire globe.] Networks can be managed in two ways: central or local. –Client/server network: the client is a computer on which users accomplish tasks and the server is the computer that provides information/resources to the client [usually found in medium to large establishments. This is an example of a central administration.] –Peer-to-peer network [P2P]: each node connected on the network can communicate directly to the other nodes on a network. [Because they are easy to set up and don’t require specialized networking operating systems, they’re the most common type of home network.] This is an example of local administration. All network nodes are connected to each other and the network by transmission media. Transmission Media: Transmission media establish a communications channel between the nodes on a network –Wireless networks - uses radio signals rather than physical cables to connect to the internet –Wired networks - a home network will include a wired Ethernet connection between the main network components [router, switches, wireless access points]. Technically faster than wireless networks. Wired –UTP cable: twisted copper wires surrounded by a plastic jacket Coaxial cable: single copper wire surrounded by layers of plastic –Fiber-optic cable: plastic or glass fibers [transmits data at extremely fast speeds.] Basic Network Hardware: Network adapter Network interface card (NIC) Modem - connects your network to the Internet Router - transfers packets of data between two or more networks such as your home network and the internet Switch - acts like a traffic signal on a network, receiving data packets from each computer on the network, then sends them to their intended nodes. [You can attach up to four wired devices to a network by using a switch.] The router and switch are often combined into a single device called an integrated switch. Some businesses and large organizations have dedicated access to the internet, but most consumers purchase Internet access through an Internet Services Provider [ISP.] Broadband is high-speed internet access. Photo by Vlada Karpovich: https://www.pexels.com/photo/young-lady-typing-on-keyboard-of-laptop-in-living-room-4050315/ BROADBAND: –Cable Internet - transmits data over coaxial cables that also transmit cable television signals –DSL (digital subscriber line) –Fiber-optic service - use fiber-optic cables to transmit data by light signals over long distances [because the speed of light is fast, this is extremely fast!] –Satellite Internet MOBILE BROABAND A cellular service that brings Internet access to mobile devices. Currently 4G or 5G Requires a wireless hotspot NETWORK-ATTACHED STORAGE DEVICES Is like a network-connected hard drive and are designed to store and manage all network data. They have been popular for years on business networks and are now available for home networks as well. NAS devices are essentially a specialized external hard drive. WIRELESS NETWORK CONSIDERATIONS: Maximum Wi-Fi range is about 350 feet Walls, floors, and large metal objects [i.e. some appliances] are sources of interference with wireless signals Place an access point where the Wi-Fi signal becomes weaker A wireless range extender repeats or amplifies wireless router signal Because packets of information on a wireless network are broadcast through the airwaves, savvy hackers can intercept and decode information from your transmissions. To secure a wireless network: Use encryption and security protocols [encryption: a method of translating your data into code] Change network name (SSID) and password [hackers know default names and access codes for routers] Disable SSID broadcast [makes it harder for a hacker to detect network] Create a passphrase Implement media access control WPA2 is the most secure security protocol used with routers. Copyright All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Copyright © 2020 Pearson All Rights Reserved

Use Quizgecko on...
Browser
Browser