How the Internet Works Jon Crowcroft,

Slides:



Advertisements
Similar presentations
The Internet.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Personal Computer Safety. What's the point? ● Computers/Internet are a huge part of our lives – A place to store our family photos – A way to pay bills.
Internet Online Safety How to have FUN and Stay in Control.
Internet safety! By: Liam, Brilee, Dinny, Shalisha.
Nummenmaa & Thanish: Practical Distributed Commit in Modern Environments PDCS’01 PRACTICAL DISTRIBUTED COMMIT IN MODERN ENVIRONMENTS by Jyrki Nummenmaa.
Facebook Presented by: Keystone Computer Concepts.
What you don’t know CAN hurt you!
Investigating Malicious Software Steve Romig The Ohio State University April 2002.
Chapter 14: Troubleshooting and Problem Resolution.
Using internet and cell phones safely
Java.  Java is an object-oriented programming language.  Java is important to us because Android programming uses Java.  However, Java is much more.
How computers changed the world.
8 February How Computers Work: Algorithms The Internet.
Web Security A how to guide on Keeping your Website Safe. By: Robert Black.
Mobility in the Internet Part II CS 444N, Spring 2002 Instructor: Mary Baker Computer Science Department Stanford University.
Internet Security Passwords.
Vocabulary URL = uniform resource locator: web address protocol –set of rules that networked computers follow in order to share data and coordinate communications.
Fundamentals of Networking Discovery 1, Chapter 9 Troubleshooting.
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Why You Should Buy A I-Phone 4s. By Steven Gailitis.
IB 300: Advanced Computer Sciences. Professor: Nabil Elmjati.
You can contact your parents so they know where you are and you can extend your time out. You can take photos and videos and share them with family and.
Mohammed Saiyeedur Rahman.  E-commerce is buying and selling goods over the internet. This could include selling/buying mobile phones, clothes or DVD’s.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
The internet and the WWW
Improving productivity using IT
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Review Academic Talent Search. All About Networking DevicesDevices Packet TransferPacket Transfer HardwareHardware SoftwareSoftware Wiring/CablingWiring/Cabling.
Social impacts of the use of it By: Mohamed Abdalla.
Reliability & Desirability of Data
App Rights or wrongs ? A look at smartphone apps or: why RTFM* is not just important for geeks and “computer types” * = Read The F+*#ing (or “Fine”) Manual.
Unit 1 – Improving Productivity Ayesha begum. 1.1Why did you use a computer? What other systems / resources could you have used? We use a computer because.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Lecture#1 on Internet. Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation IP address: pattern of 32.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
Follow the Data Data (and information) move from place to place in computer systems and networks. As it moves it changes form frequently. This story describes.
Understanding Networking Joe Cicero Northeast Wisconsin Technical College.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Audacity Audacity web address:
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Chapter 2 The Internet Underlying Architecture. How the DNS works? DNS: Domain Name System Visiting a website: - Write the address - IP will use the address.
How the Internet Goes Wrong Jon Crowcroft,
TCP/IP (Transmission Control Protocol / Internet Protocol)
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
9: Troubleshooting Your Network
Have fun on the internet while being safe!!  Do you know what cyber safety means?.. YesNo.
Activity 3 Identifying the Risks. Questions What do you do online? What sort of sites do you visit? Have you ever had a bad experience online?
science/internet-intro
DIGITAL CITIZENSHIP.  Privacy - Protect Personal Information  Respect - Plagiarism, Downloading Music Appropriately.  Self Expression - Create your.
The Internet. Important Terms Network Network Internet Internet WWW (World Wide Web) WWW (World Wide Web) Web page Web page Web site Web site Browser.
Firewalls Fighting Spyware, Viruses, and Malware Ch 5.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Cybersecurity Test Review Introduction to Digital Technology.
Netprog: Chat1 Chat Issues and Ideas for Service Design Refs: RFC 1459 (IRC)
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Safer Internet Day. What do you use the Internet for? watching TV shows watching online videos playing gamestalking to friends homeworkfinding out things.
Let’s Talk about Intellectual Property Copyright Plagiarism Fair Use.
CPS110: Networks Landon Cox March 25, Network hardware reality  Lots of different network interface cards (NICs)  3Com/Intel, Ethernet/802.11x.
Responsible digital citizenship By: Aiden. What is responsible digital citizenship? Responsible digital citizenship is many things. The topics I am covering.
Installation and Setting up a Wireless LAN. Why would you want a Wireless LAN? Because it would take a lot of cable to set up your Internet, and a wireless.
Unit 4 IT Security.
Academic Talent Search
INTRODUCTION TO NETWORKS AND COMMUNICATIONS
AP CSP: Making a reliable Internet & DNS
Modelling the internet
Modelling the internet
Tonga Institute of Higher Education IT 141: Information Systems
Tonga Institute of Higher Education IT 141: Information Systems
Presentation transcript:

How the Internet Works Jon Crowcroft,

Let’s look at what can go wrong We take the Internet for granted Until something doesn’t work! Let’s look at three common problems 1. Why can’t I get to a web site? 2. Why’s my download suddenly go slow? 3. Why’s my computer just got virused?

Outage! Aside from wires coming unplugged, or computers crashing (yours or theirs) there are several reasons you might not be able to get to a website :- 1. Names 2. Addresses 3. Routes

The Wires…

Flakey hardware improved by Smart Software Wires get broken People kick cables out Turn computers off Power fails Can we make up for this by making the whole Smarter than the sum of the parts? Yes - control software!!

The Domain Name System When you type (or cut&paste) what you want… a “lookup” is done to Find the IP Address Which is Where it is The DNS may be broken.. Or you might just type something slightly wrong

Routing An address is where, but then you need a map and a compass to find the route The net does this For you in a Distributed way Which can go wrong!

Dynamics Even as things change, software can keep track

Congestion Traffic jams can happen anywhere…on the internet too…

The Internet is shared, like roads Not so much like railways or flight paths So you have to wait your turn If there’s a lot of users, the wait gets longer This is “implemented” by software in your computer which runs a protocol Called TCP - which cooperates with other computers implicitly to give a fair share…think about card games or anything where there are rounds…but where you can pass if you like It isn’t exactly like that as it would take to long in a network, so instead it uses statistics

Insecurity! You may program your computer, But most the programmes you use were written by someone else (Microsoft, Apple, open source contributers) When you download a programme, how do you know who really wrote it, and what they really want to do with it? This is as true on your cell phone as it is on a notebook. This is true for Facebook Apps (and photo tagging) that invade your privacy.

Why do people write “malware” Sometimes they want to steal your ideas or your money But other times they want to use your computer to do things like Spam Botnets/ddos attacks Really bad guys pretend To be trying to help:

The Internet is quite complicated It isn’t complex - it’s just made of a lot of pieces, each of which is really very simple. For an “end to end” path to work Properly, as expected, and to perform well All the pieces have to function correctly Amazingly, it does work most the time Largely because we have got a lot better at designing and building computer software and hardware in the last years But there’s a lot more to do still!