6 Section C: Portable and Mobile Internet Access  Internet to Go  Wi-Fi Hotspots  Portable and Mobile WiMAX  Portable Satellite Service  Cellular.

Slides:



Advertisements
Similar presentations
Computer Concepts – Illustrated 8th edition
Advertisements

Review of Chapter 2. Important concepts – The Internet is a worldwide collection of networks that links millions of businesses, government agencies, educational.
Chapter 6 The Internet.
The internet. Background Created in 1969, connected computers at UCLA, Stanford Research Institute, U. of Utah, and UC at Santa Barbara With an estimated.
Networks & Components Discuss the components required for successful communications Explain the purpose of communications software Identify various sending.
Computer Concepts 2014 Chapter 6 The Internet. 6 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet Access  Section C: Portable.
Unit 9 Network Fundamentals. Describe a network Explain the benefits of a network Identify risks in computing Describe the roles of clients & servers.
Chapter 9 Communications and Networks
Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet Access  Section C: Portable.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Communications and Networks
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
1 Chapter 19 Networks. 2 What’s Inside and on the CD? In this chapter you’ll learn: –Basic network terminology –To identify network components –About.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
Chapter 6: The Internet1 The Internet Chapter 6. Chapter 6: The Internet2 Internet Technology Background Internet Infrastructure Internet Protocols, Addresses,
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
Computer Networks IGCSE ICT Section 4.
Term 2, 2011 Week 1. CONTENTS Network communications standards – Ethernet – TCP/IP Other network protocols – The standard – Wireless application.
Living in a Digital World Discovering Computers 2011.
Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet.
The Internet. What is the internet? a vast network designed to transfer data from one computer to another.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
Computer Concepts 2014 Chapter 6 The Internet. 6 Background  The ARPANET, created in 1969, connected computers at UCLA, Stanford Research Institute,
Chapter 9 Communications and Networks. Communications What are computer communications? Next p. 460 Fig. 9-1  Process in which two or more computers.
Basic Data Communication
Communications & Networks
Chapter 5: Computer Networks
Chapter 6 The Internet. Internet Technology Chapter 6: The Internet 2  Background  Internet Infrastructure  Internet Protocols, Addresses, and Domains.
Chapter 6 The Internet. 6 Chapter 6: The Internet 2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet Access  Section C:
Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet Access  Section C: Portable.
Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet.
CMPTR Chapter 5.
Telecommunications and Networks Chapter 6 – Understanding Technology (Third Edition)
Computer Concepts 2014 Chapter 6 The Internet. 6 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet Access  Section C: Portable.
Chapter 4 Computer Networks – Part 1
Chapter 9 Communications and Networks. Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and.
Chapter 7 Connecting to the Internet. Connecting to the Internet FAQs: – What is the Internet? – What are the options for Internet service? – What is.
Module 2: Information Technology Infrastructure
Computer Concepts 2014 Chapter 5 Local Area Networks.
ITGS Types of network.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
Fourth Edition Discovering the Internet Chapter 1 Into the Internet.
Week 12 (2012) Dr. Ghada Drahem. INTENDED LEARNING OUTCOMES This lecture covers: Networking concepts and terminology Common networking and communications.
Computers Are Your Future Eleventh Edition
Chapter 7 Connecting to the Internet. 2Practical PC 5 th Edition Chapter 7 Getting Started In this Chapter, you will learn: − What is the Internet − Options.
Teaching and Learning with Technology ck to edit Master title style  Allyn and Bacon 2002 Teaching and Learning with Technology k to edit Master title.
1 Chapter 8 Communications & Networks. Objectives Overview Discuss the purpose of the components required for successful communications Describe these.
Teaching and Learning with Technology Chapter 7 Networks and the Internet by La Tisha Jenkins.
Reference :Understanding Computers
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Component 4: Introduction to Information and Computer Science Unit 7: Networks & Networking Lecture 1 This material was developed by Oregon Health & Science.
Networks The Big Picture. Three Great Leaps of Civilization.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
 Internet access is the process that enables individuals and organizations to connect to the Internet using computer terminals, computers, and mobile.
Computer Networks.  Which is the best definition of a circuit switched network?  An electric circuit where the connections get switched based on who.
7.1 © 2010 by Prentice Hall 4 Chapter Telecommunications, the Internet, and Wireless Technology.
Network media, protocols and networking standards, networking hardware.
The Online World DATA EXCHANGE. Introduction data devices/componentsperipheral Data exchange is the term used to cover all methods of passing data (including.
Computer Concepts 2013 Chapter 6 The Internet. 6 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet Access  Section C: Portable.
ICT Unit 4: Network and the effects of using them
Chapter 6 The Internet.
Chapter 6 The Internet.
Chapter 4 Computer Networks – Part 2
Networks and Connecting to the Internet
Different Types Of Connecting To Internet
10/14/2018 The Internet 10/14/2018.
Chapter 7 Connecting to the Internet
Presentation transcript:

6 Section C: Portable and Mobile Internet Access  Internet to Go  Wi-Fi Hotspots  Portable and Mobile WiMAX  Portable Satellite Service  Cellular Data Service Chapter 6: The Internet 1

6 Global PC Sales – 2015  Global PC shipments totaled million in 2015, a 10.4 percent plunge from the million recorded the year before, research firm the International Data Corporation (IDC), said on Jan 12,  It is the first time shipments have dipped below 300 million since  PC shipments continue downward spiral for 4 successive years Chapter 6: The Internet 2

6 Internet To Go  Portable Internet access can be defined as the ability to easily move your Internet service from one location to another  Mobile Internet access offers a continuous Internet connection as you are walking or riding in a bus, car, train, or plane Chapter 6: The Internet 3

6 Question  What is the difference between portable Internet access and mobile Internet access?  A. With portable access you cannot work online while moving very far.  B. Mobile access is less expensive than portable access.  C. Portable access requires cables, whereas mobile access does not.  D. Portable access requires a cell phone, whereas mobile access requires a notebook computer. Chapter 6: The Internet 4

6 Wi-Fi Hotspots  A Wi-Fi hotspot is an area in which the public can access a Wi-Fi network that offers Internet service  Wi-Fi does not typically provide acceptable mobile Internet access because you can only remain connected within range of the network’s hotspot Chapter 6: The Internet 5

6 Wireless Ethernet (Wireless LAN)  Wireless Ethernet (Wi-Fi or ) is the most common wireless connection technology for use on LANs  Wireless access point (WAP)  Device that transmits network packets between Wi-Fi-equipped computers and other devices  “g” maxed out at 54 Mbps; and “n” offers 300 Mbps. The latest ac offers more than 1 Gbps.

6 Internet Speed and Wi-Fi  If your high-speed Internet provider offers bandwidth up to 100 Mbps, then even with your n router, it will stay at 100 Mbps.  If there are 10 computers downloading at full speed all the time, it will split the Internet resources into 10 parts, with everyone only able to have 10 Mbps at once.

6 How does Wi-Fi Work  A computer's wireless adapter translates data into a radio signal and transmits it using an antenna.  A wireless router receives the signal and decodes it. The router sends the information to the Internet using a physical, wired Ethernet connection.  The process also works in reverse, with the router receiving information from the Internet, translating it into a radio signal and sending it to the computer's wireless adapter. Chapter 6: The Internet 8

6 How does Wi-Fi Work  A wireless network uses radio waves, just like cell phones, televisions and radios do. However, Wi-Fi transmit at frequencies of 2.4 GHz or 5 GHz. This frequency is considerably higher than the frequencies used for cell phones, walkie-talkies and televisions. The higher frequency allows the signal to carry more data but limited distance.  They use networking standards, which come in several flavors: a, b, g, n, and the latest ac (sometimes called Gigabit Wi-Fi). Chapter 6: The Internet 9

a: 54mbps b: 11mbps g: 54mbps n: 300mbps with 2 antennas ac (Gigabit Wi-Fi): 1Gbps Wi-Fi Standards

6 Portable Satellite Service Chapter 6: The Internet 11

6 Cellular Data Services  Using cell phone technology to access the Internet offers mobility that is not yet possible with most of today’s wired or wireless computer network technologies Chapter 6: The Internet 12

6 Cellular Data Services  The 3G cellular technologies for Internet access are EDGE, EV- DO, and HSUPA  4G technology provides peak data rates of 100 Mbps while a device is in motion, or 1 Gbps rates when a device is stationary Chapter 6: The Internet 13

6 Cellular Data Services Chapter 6: The Internet 14

6 Wireless Application Protocol  WAP (Wireless Application Protocol) is a communications protocol that provides Internet access from handheld devices  For the real Internet, cellular service providers offer data services, sometimes referred to as mobile broadband  Most cellular service providers offer wireless modems for broadband data access Chapter 6: The Internet 15

6 Cellular Data Services  Portable Wi-Fi hotspot, also known as MiFi, is a brand name for a compact, mobile, wireless router offered by Novatel Wireless  Some cell phones, such as the Droid X and iPhone, can act as a portable Wi-Fi hotspot by becoming the router for a wireless network Chapter 6: The Internet 16

6 Internet Tethering  Tethering is when you turn you smartphone into a mobile Wi-Fi hotspot and share your phones 3G/4G data connection.  You don't have to use Wi- Fi to share your phone's internet connection: some allow you to connect a laptop (possibly even a tablet) via a USB cable. Chapter 6: The Internet 17 Drawback? Data usage,Power drain

6 FastPoll True/False Questions Answer A for True and B for False  Public Wi-Fi hotspots provide mobile Internet access.  With mobile broadband, you can use a cell phone to set up a mobile Internet connection.  Cloud computing uses distributed grid computing to predict weather.  VoIP uses circuit switching technology to send analog data.  is a popular Wi-Fi service provider for non-business consumers. Chapter 6: The Internet 18     

6 FastPoll True/False Questions Answer A for True and B for False  FTP makes it easy to anonymously use a search engine.  BitTorrent is an Internet security protocol.  Consumers should use port probes to encrypt data sent over the Internet.  NATs are used by hackers to intercept packets traveling over the Internet. Chapter 6: The Internet 19    

6 Question  Although ISPs offer Internet access though dial-up, satellites, WiMAX, and DSL, cable Internet is currently the preferred access method. Why?  A. It is the least expensive.  B. It is the fastest and most widely available technology.  C. It has the highest latency.  D. It was the original Internet access technology. Chapter 6: The Internet 20

6 Section D: Internet Services  Cloud Computing  Real-Time Messaging  Voice over IP  Forums, Wikis, Blogs, and Tweets  Grid Computing  FTP  File Sharing Networks Chapter 6: The Internet 21

6 Question  On the Internet, application protocols provide consumers with many useful services. Which one of the following correctly describes an Internet-based application protocol?  A. Chat and Instant messaging use Internet VoIP protocol.  B. Files can be shared over the Internet using FTP or BitTorrent protocols.  C. Cloud protocols such as SETI control distributed processing grids.  D. P2P is used to encrypt personal information to keep it private. Chapter 6: The Internet 22

6 Cloud Computing  Cloud computing depends on a grid of servers, storage devices, and protocols that offer Internet- accessible computing services ranging from consumer-level media sharing to office productivity applications and complex corporate data processing  Software as a Service (SaaS) Chapter 6: The Internet 23

6 Cloud Computing Chapter 6: The Internet 24

6 Real-Time Messaging  A networked-based, real-time messaging system allows people to exchange short messages while they are online  Instant messaging (IM)  Chat Chapter 6: The Internet 25

6 Voice over IP  VoIP (Voice over Internet Protocol) or Voice over IP, is a technology in which a broadband Internet connection is used to place telephone calls instead of the regular phone system  If you want to set up free computer-to- computer VoIP, you and the people you communicate with can download and install freeware or open source VoIP clients Chapter 6: The Internet 26

6 Forums, Wikis, Blogs, and Tweets  An Internet forum is a Web-based online discussion site where participants post comments to discussion threads  A wiki allows participants to modify posted material  A blog (short for Web log) is similar to an online diary; it is maintained by one person and contains a series of entries on one or more topics  A tweet is a short message of 140 characters or less, posted to the Twitter Web site Chapter 6: The Internet 27

6 Forums, Wikis, Blogs, and Tweets Chapter 6: The Internet 28

6 Grid Computing  A grid computing system is a network of computers harnessed together to perform processing tasks  project Chapter 6: The Internet 29

6 FTP (File Transfer Protocol) Chapter 6: The Internet 30

6 FTP (File Transfer Protocol) Chapter 6: The Internet 31

6 File Sharing Networks  File sharing, sometimes called P2P file sharing, allows users to obtain files from other users located anywhere on the Internet  BitTorrent is a file sharing protocol that distributes the role of file server across a collection of dispersed computers Chapter 6: The Internet 32

6 Section E: Internet Security  Intrusion Attempts  Securing Ports  NAT  Virtual Private Networks Chapter 6: The Internet 33

6 Question  Protecting your computer from Internet- based intrusions is an important aspect of computer security. Which one of the following is NOT a useful security technique?  A. Setting up NAT on a router  B. Activating firewall software  C. Checking the status of software ports  D. Activating your computer’s file sharing options Chapter 6: The Internet 34

6 Intrusion Attempts  An intrusion is any access to data or programs by hackers, criminals, or other unauthorized persons  A communications port is the doorway that allows a computer to exchange data with other devices  A port probe (or port scan) uses automated software to locate computers that have open ports and are vulnerable to unauthorized access Chapter 6: The Internet 35

6 Intrusion Attempts Chapter 6: The Internet 36

6 Securing Ports Chapter 6: The Internet 37

6 Securing Ports  A firewall is software or hardware designed to filter out suspicious packets attempting to enter or leave a computer  Sharing printers or files on a LAN or the Internet requires open ports so the data can be transferred to and from your computer Chapter 6: The Internet 38

6 NAT – Network address translation  Network address translation (NAT) is the process your router uses to keep track of packets and their corresponding private or public IP addresses Chapter 6: The Internet 39

6 NAT – Network address translation  Routers are intended to work within LANs to monitor and direct packets being transported from one device to another  A routable IP address is one that can be accessed by packets on the Internet  A private IP address is a non-routable IP address that can be used within a LAN, but not for Internet data transport Chapter 6: The Internet 40

6 NAT – Network address translation Chapter 6: The Internet 41

6 Virtual Private Networks  It is possible to secure remote connections by setting up virtual private network (VPN) access to a remote access server in the corporate office  Access to a VPN is usually by invitation only; employees who need to access a VPN are given the necessary instructions, addresses, and passwords to make connections Chapter 6: The Internet 42

6 Virtual Private Networks Chapter 6: The Internet 43  VPN  An extranet that uses public networks and their protocols  IP tunneling  Effectively creates a private passageway through the public Internet  Encapsulation  Process used by VPN software

6 What Do You Think?  Does it seem plausible that your government would attempt to shut down the Internet to curtail civil unrest?  A. YesB. NoC. Not sure  Do you use the Internet to access political news?  A. YesB. NoC. Not sure  Should your government have legal power to shut down the Internet?  A. YesB. NoC. Not sure  Have you experienced an Internet outage that lasted longer than 24 hours?  A. YesB. NoC. Not sure Chapter 6: The Internet 44

Computer Concepts 2014 Chapter 6 Complete