
b71978177007facc6a5ae95aa1bb3bd2.ppt
- Количество слайдов: 45
6 Section C: Portable and Mobile Internet Access Ø Internet to Go Ø Wi-Fi Hotspots Ø Portable and Mobile Wi. MAX Ø Portable Satellite Service Ø Cellular Data Service Chapter 6: The Internet 1
6 Global PC Sales – 2015 Ø Global PC shipments totaled 276. 2 million in 2015, a 10. 4 percent plunge from the 308. 3 million recorded the year before, research firm the International Data Corporation (IDC), said on Jan 12, 2016. Ø It is the first time shipments have dipped below 300 million since 2008. Ø PC shipments continue downward spiral for 4 successive years Chapter 6: The Internet 2
6 Internet To Go Ø Portable Internet access can be defined as the ability to easily move your Internet service from one location to another Ø Mobile Internet access offers a continuous Internet connection as you are walking or riding in a bus, car, train, or plane Chapter 6: The Internet 3
6 Question Ø 062300 What is the difference between portable Internet access and mobile Internet access? Ø A. With portable access you cannot work online while moving very far. Ø B. Mobile access is less expensive than portable access. Ø C. Portable access requires cables, whereas mobile access does not. Ø D. Portable access requires a cell phone, whereas mobile access requires a notebook computer. Chapter 6: The Internet 4
6 Wi-Fi Hotspots Ø A Wi-Fi hotspot is an area in which the public can access a Wi-Fi network that offers Internet service Ø Wi-Fi does not typically provide acceptable mobile Internet access because you can only remain connected within range of the network’s hotspot Chapter 6: The Internet 5
6 Wireless Ethernet (Wireless LAN) Ø Wireless Ethernet (Wi-Fi or 802. 11) is the most common wireless connection technology for use on LANs Ø Wireless access point (WAP) Ø Device that transmits network packets between Wi-Fi-equipped computers and other devices Ø 802. 11“g” maxed out at 54 Mbps; and “n” offers 300 Mbps. The latest 802. 11 ac offers more than 1 Gbps.
6 Internet Speed and Wi-Fi Ø If your high-speed Internet provider offers bandwidth up to 100 Mbps, then even with your 802. 11 n router, it will stay at 100 Mbps. Ø If there are 10 computers downloading at full speed all the time, it will split the Internet resources into 10 parts, with everyone only able to have 10 Mbps at once.
6 How does Wi-Fi Work Ø A computer's wireless adapter translates data into a radio signal and transmits it using an antenna. Ø A wireless router receives the signal and decodes it. The router sends the information to the Internet using a physical, wired Ethernet connection. Ø The process also works in reverse, with the router receiving information from the Internet, translating it into a radio signal and sending it to the computer's wireless adapter. Chapter 6: The Internet 8
6 How does Wi-Fi Work Ø A wireless network uses radio waves, just like cell phones, televisions and radios do. However, Wi-Fi transmit at frequencies of 2. 4 GHz or 5 GHz. This frequency is considerably higher than the frequencies used for cell phones, walkie-talkies and televisions. The higher frequency allows the signal to carry more data but limited distance. Ø They use 802. 11 networking standards, which come in several flavors: 802. 11 a, b, g, n, and the latest ac (sometimes called Gigabit Wi-Fi). Chapter 6: The Internet 9
6 Wi-Fi Standards • 802. 11 a: 54 mbps • 802. 11 b: 11 mbps • 802. 11 g: 54 mbps • 802. 11 n: 300 mbps with 2 antennas • 802. 11 ac (Gigabit Wi-Fi): 1 Gbps
6 Portable Satellite Service Chapter 6: The Internet 11
6 Cellular Data Services Ø Using cell phone technology to access the Internet offers mobility that is not yet possible with most of today’s wired or wireless computer network technologies Chapter 6: The Internet 12
6 Cellular Data Services Ø The 3 G cellular technologies for Internet access are EDGE, EVDO, and HSUPA Ø 4 G technology provides peak data rates of 100 Mbps while a device is in motion, or 1 Gbps rates when a device is stationary Chapter 6: The Internet 13
6 Cellular Data Services Chapter 6: The Internet 14
6 Wireless Application Protocol Ø WAP (Wireless Application Protocol) is a communications protocol that provides Internet access from handheld devices Ø For the real Internet, cellular service providers offer data services, sometimes referred to as mobile broadband Ø Most cellular service providers offer wireless modems for broadband data access Chapter 6: The Internet 15
6 Cellular Data Services Ø Portable Wi-Fi hotspot, also known as Mi. Fi, is a brand name for a compact, mobile, wireless router offered by Novatel Wireless Ø Some cell phones, such as the Droid X and i. Phone, can act as a portable Wi-Fi hotspot by becoming the router for a wireless network Chapter 6: The Internet 16
6 Internet Tethering Ø Tethering is when you turn you smartphone into a mobile Wi-Fi hotspot and share your phones 3 G/4 G data connection. Ø You don't have to use Wi. Fi to share your phone's internet connection: some allow you to connect a laptop (possibly even a tablet) via a USB cable. Drawback? Data usage, Power drain Chapter 6: The Internet 17
6 Fast. Poll True/False Questions Answer A for True and B for False Ø 061100 Public Wi-Fi hotspots provide mobile Internet access. Ø 061200 With mobile broadband, you can use a cell phone to set up a mobile Internet connection. Ø 061300 Cloud computing uses distributed grid computing to predict weather. Ø 061400 Vo. IP uses circuit switching technology to send analog data. Ø 061500 SETI@home is a popular Wi-Fi service provider for non-business consumers. Chapter 6: The Internet 18
6 Fast. Poll True/False Questions Answer A for True and B for False Ø 061600 FTP makes it easy to anonymously use a search engine. Ø 061700 Bit. Torrent is an Internet security protocol. Ø 061800 Consumers should use port probes to encrypt data sent over the Internet. Ø 061900 NATs are used by hackers to intercept packets traveling over the Internet. Chapter 6: The Internet 19
6 Question Ø 062200 Although ISPs offer Internet access though dial-up, satellites, Wi. MAX, and DSL, cable Internet is currently the preferred access method. Why? ØA. It is the least expensive. ØB. It is the fastest and most widely available technology. ØC. It has the highest latency. ØD. It was the original Internet access technology. Chapter 6: The Internet 20
6 Section D: Internet Services Ø Cloud Computing Ø Real-Time Messaging Ø Voice over IP Ø Forums, Wikis, Blogs, and Tweets Ø Grid Computing Ø FTP Ø File Sharing Networks Chapter 6: The Internet 21
6 Question Ø 062400 On the Internet, application protocols provide consumers with many useful services. Which one of the following correctly describes an Internet-based application protocol? Ø A. Chat and Instant messaging use Internet Vo. IP protocol. Ø B. Files can be shared over the Internet using FTP or Bit. Torrent protocols. Ø C. Cloud protocols such as SETI control distributed processing grids. Ø D. P 2 P is used to encrypt personal information to keep it private. Chapter 6: The Internet 22
6 Cloud Computing Ø Cloud computing depends on a grid of servers, storage devices, and protocols that offer Internetaccessible computing services ranging from consumer-level media sharing to office productivity applications and complex corporate data processing Ø Software as a Service (Saa. S) Chapter 6: The Internet 23
6 Cloud Computing Chapter 6: The Internet 24
6 Real-Time Messaging Ø A networked-based, real-time messaging system allows people to exchange short messages while they are online Ø Instant messaging (IM) Ø Chat Chapter 6: The Internet 25
6 Voice over IP Ø Vo. IP (Voice over Internet Protocol) or Voice over IP, is a technology in which a broadband Internet connection is used to place telephone calls instead of the regular phone system Ø If you want to set up free computer-tocomputer Vo. IP, you and the people you communicate with can download and install freeware or open source Vo. IP clients Chapter 6: The Internet 26
6 Forums, Wikis, Blogs, and Tweets Ø An Internet forum is a Web-based online discussion site where participants post comments to discussion threads Ø A wiki allows participants to modify posted material Ø A blog (short for Web log) is similar to an online diary; it is maintained by one person and contains a series of entries on one or more topics Ø A tweet is a short message of 140 characters or less, posted to the Twitter Web site Chapter 6: The Internet 27
6 Forums, Wikis, Blogs, and Tweets Chapter 6: The Internet 28
6 Grid Computing Ø A grid computing system is a network of computers harnessed together to perform processing tasks Ø SETI@home project Chapter 6: The Internet 29
6 FTP (File Transfer Protocol) Chapter 6: The Internet 30
6 FTP (File Transfer Protocol) Chapter 6: The Internet 31
6 File Sharing Networks Ø File sharing, sometimes called P 2 P file sharing, allows users to obtain files from other users located anywhere on the Internet Ø Bit. Torrent is a file sharing protocol that distributes the role of file server across a collection of dispersed computers Chapter 6: The Internet 32
6 Section E: Internet Security Ø Intrusion Attempts Ø Securing Ports Ø NAT Ø Virtual Private Networks Chapter 6: The Internet 33
6 Question Ø 062500 Protecting your computer from Internetbased intrusions is an important aspect of computer security. Which one of the following is NOT a useful security technique? ØA. Setting up NAT on a router ØB. Activating firewall software ØC. Checking the status of software ports ØD. Activating your computer’s file sharing options Chapter 6: The Internet 34
6 Intrusion Attempts Ø An intrusion is any access to data or programs by hackers, criminals, or other unauthorized persons Ø A communications port is the doorway that allows a computer to exchange data with other devices Ø A port probe (or port scan) uses automated software to locate computers that have open ports and are vulnerable to unauthorized access Chapter 6: The Internet 35
6 Intrusion Attempts Chapter 6: The Internet 36
6 Securing Ports Chapter 6: The Internet 37
6 Securing Ports Ø A firewall is software or hardware designed to filter out suspicious packets attempting to enter or leave a computer Ø Sharing printers or files on a LAN or the Internet requires open ports so the data can be transferred to and from your computer Chapter 6: The Internet 38
6 NAT – Network address translation Ø Network address translation (NAT) is the process your router uses to keep track of packets and their corresponding private or public IP addresses Chapter 6: The Internet 39
6 NAT – Network address translation Ø Routers are intended to work within LANs to monitor and direct packets being transported from one device to another Ø A routable IP address is one that can be accessed by packets on the Internet Ø A private IP address is a non-routable IP address that can be used within a LAN, but not for Internet data transport Chapter 6: The Internet 40
6 NAT – Network address translation Chapter 6: The Internet 41
6 Virtual Private Networks Ø It is possible to secure remote connections by setting up virtual private network (VPN) access to a remote access server in the corporate office Ø Access to a VPN is usually by invitation only; employees who need to access a VPN are given the necessary instructions, addresses, and passwords to make connections Chapter 6: The Internet 42
6 Virtual Private Networks Ø VPN Ø An extranet that uses public networks and their protocols Ø IP tunneling Ø Effectively creates a private passageway through the public Internet Ø Encapsulation Ø Process used by VPN software Chapter 6: The Internet 43
6 What Do You Think? Ø 063100 Does it seem plausible that your government would attempt to shut down the Internet to curtail civil unrest? Ø A. Yes B. No C. Not sure Ø 063200 Do you use the Internet to access political news? ï A. Yes B. No C. Not sure Ø 063300 Should your government have legal power to shut down the Internet? Ø A. Yes B. No C. Not sure Ø 063400 Have you experienced an Internet outage that lasted longer than 24 hours? Ø A. Yes B. No C. Not sure Chapter 6: The Internet 44
Chapter 6 Complete Computer Concepts 2014
b71978177007facc6a5ae95aa1bb3bd2.ppt