The Internet Unit Information Systems, Higher
The Internet HTML Two sets of notes
Notes on the Internet Internet services Communications hardware URL DNS Protocol TCP/IP, TCP/IP address, classes, sub netting Packet switching Internet security Internet regulatory boards/organisations Security and privacy RSA/PGP Internet use and the law Web resource information
HTML – Tags you need to know,,,,,,,,,,,,,. Visit W3Schools
Tag Inline elements
Tag Block elements
Gateway Routers A router which provides access from one network to another If a packet is sent to a destination which is not on the network, it is sent to the gateway address first
Data Protection Act Forms where people enter details Saved on their server Applies to all blogs
Computer Misuse Act Creating and Sending viruses Spyware installation Hacking a network
Need for International Policing of the Internet. Why it wont happen - Each country has separate legal systems - Dont want to lose control. - UN style org. Why would it be good - Prevent more crime - Censorship would be universal.
Academic, Commercial and Personal web pages
Browsers HTML interpretation – X Ray goggles client side scripting - cookie functions - built in encryption functions -
Cookies
The rules of cascading stylesheets state that: embedded styles within the text over-rule all others document level styles, defined in the document, over-rule external Stylesheets external stylesheets only apply if they are not over-ruled by the other 2 methods
Encryption –Symmetric key distribution problem
Encryption – Putting the data into code A = B = C =
Encryption –Asymmetric The person who will receive the data decides on a private key The RSA algorithm generates a public key which will be used to encrypt the message it is mathematically (almost) impossible to calculate the private key from the public key.
PGP – X send Y a message 1.PGP first compresses the message - harder to decode the message 2.PGP then creates a session key, which is a one-time-only secret key 3.session key itself is encrypted using Ys public key. 4.AXcrypt
PGP – Y receives the message 1. Ys copy of PGP uses his or her private key to decrypt the temporary session key. 2. PGP then uses the session key to decrypt the encrypted Message. This is the most secure and quickest means of encryption
Encryption in Action
secure sockets layer Implemented by browsers
secure sockets layer
use of Certificate Authorities
Firewalls
The firewall software can be set up to: reject packets from selected IP addresses (for example, blocking inappropriate sites) allow only packets from selected sites reject or allow packets from particular domain names only allow packets to and from certain ports (a useful defence against many viruses) allow or reject packets using particular protocols (for example, blocking all FTP requests) "sniff" packets, and reject any which contain certain words
cascading style sheets A cascading stylesheet (CSS) is a separate file which defines colours, fonts and sizes to be used on web pages. A reference to this file is included within every web page in a website. This ensures that each page is consistent in format.
client side scripting (including form validation and alerts). Server-side scripting is a web server technology in which a users request is fulfilled by running a script directly on the web server to generate dynamic HTML pages
Facebook database
PHP – show them computing website
page structure and layout The layout and structure of a page should make it easy for a reader to find information.
uniformity of presentation style sheets server-side scripting – client side not possible using a non-compatible browser, pages look the same to all dynamic pages -content is stored in a database of files, bbc etc.
download efficiency Ensure all graphics are re-sized and at screen resolution (normally 72dpi), and saved as compressed JPEG or GIF files.
browser compatibility issues
Internet services World Wide Web (WWW) Conferencing and newsgroups File transfer and file updating Chat/instant message
Communications hardware Server side hardware consists of Computers Disk drives Communication links Multiplexor Hubs Switches Routers Gateways Bridges
URL URL structure Protocol Domain name Path File identifier Port number (optional)
TCP/IP Transmission protocol TCP IP 1:5www.yahoo.comwww.you.com 2:5www.yahoo.comwww.you.com 3:5www.yahoo.comwww.you.com 4:5www.yahoo.comwww.you.com 5:5www.yahoo.comwww.you.com
Packet switching Why packet switching? Need for IP Packet 2 Packet 3 Packet 4 Packet 1:5 Packet 5
TCP/IP classification 32-bit IP address Network ID Host ID 32 BITs Network IDHost ID
Sub Netting Network masks used to split network into smaller networks Used to determine what subnet an IP address belongs to. Eg first four bits of host address removed to identify subnet Network address plus bits reserved for identifying subnetwork
Internet security Viruses Un-authorised access (hacking) Denial of service attacks Information theft
Internet regulatory boards IETF IANA W3C NOMINET
Security and privacy Packet filtering Firewall Proxy server Packet filter router Or Firewall Or Proxy server Internet Host ID
Security Encryption Key distribution problem RSA PGP Browser encryption Secure sockets
Law Data Protection Act 1984, 1989, 2000, 2004 Copyright, Design & Patents Act 1988 Computer Misuse Act 1990
Policing the Internet Need for international agreement Problems reaching international agreements
HTML Client side Server side Client side Server side
HTML structure Start of document marker /End of document marker Heading /End of Heading Body /End of body This area is not displayed The content, which is displayed in the browser
HTML Body Head Html Align Table H1-h6 Tr td th Img src Span Div Font family A href P br
HTML tags definitions Browser recognises and interprets HTML script instructions Ignore text
What is sent on WWW HTML script My Home Page
Enter HTML script
HTML transmission <html xmlns:o="urn:schemas-microsoft- com:office:office" xmlns:w="urn:schemas-microsoft- com:office:word" xmlns=" html40"> MY HOME PAGE My Home Page
Create website
WWW colors RGB colour system Hexadecimal Text color Bg color Anchor colours
HTML tables Similarity with spreadsheet Set up table Menu table Cellspacing Cellpadding
Uploading website Ftp software Publishing Index.html
Client side scripting JavaScript VBScript Compare JavaScript and VBScript Need for client side scripting Document.Write command Document.Cookie command
Submission form
Form validation Need for validation Simple VBS validation script Mailto: Problems with Mailto: CGI_bin Alert messages
PHP Future development Web server processing of hyper text MySQL Cookies and databases
Cascade style sheets Need for style sheets Writing CSS Three methods of including CSS
Outcome 2 Budget Airways Home Page.html Glasgow Departures.html Edinburgh Departures.html Dublin Departures.html Booking Form.html
Outcome 2 Create website Use tables Create submission form Form validation Hyper linking
Hardware Router Server Hub Switch Multiplexer
Site tracking software
FTP software