the influence of the internet - techniongotsman/236801/10-influence-of-the-internet.pdf• 1990 –...
TRANSCRIPT
1
The Influence of the The Influence of the InternetInternetEranEran TreisterTreister
Liron PergamentLiron Pergament
22
AgendaAgenda
• General Background• Internet Protocols• E-mail• Web Browsers• Search Engines
• Modems• Web Hosting• Threats• Security• Internet Opportunities
33
General BackgroundGeneral Background
• 1876 – Alexander Graham Bell invents the telephone.
• 1962 – Bell Labs develops the first modem.
44
General BackgroundGeneral Background• 1969 – ARPA-Net, the
forerunner of the Internet, is established.
55
General BackgroundGeneral Background
• 1981 – Minitel (Teletel) is deployed across France by French Telecom.
66
General BackgroundGeneral Background
• 1983 - DCA and DARPA establish the TCP/IP protocol for ARPANET
• 1990s – The term Internet appears.
2
77
Internet ProtocolsInternet Protocols
• The Internet is based on the 4-layer model.• Created in the 1970s by DARPA.• The structure of Internet protocols is still closely
reflected by the TCP/IP model.
88
Internet ProtocolsInternet Protocols
• This 4-layer model has:– Layer 4: Application layer. – Layer 3: Transport layer. – Layer 2: Network layer.– Layer 1: Physical layer
99
World Wide WebWorld Wide Web
• 1989 – Tim Berners-Lee proposes the basic concept of the Web.
• 1990 – Creates HTML, HTTP, URL: http://en.wikipedia.org/wiki/Url.
• 1990 –Writes the prototype for the World Wide Web.
1010
EE--MailMail
• In late 1971, Tomlinson developed the first ARPANET email application.
• Until the 1980s FTP provided email services for ARPANET.
• Historical addresses till 1982: utzoo!decvax!harpo!eagle!mhtsa!ihnss!ihuxp!grg
1111
EE--MailsMails
• Early 1980's: the SMTPprotocol was developed.
• 1984 – Creation of BITNET
• 1997 – Hotmail released first free webmail.
1212
Web BrowsersWeb Browsers
• The first web browser-WorldWideWeb.
• Written in 1990 by Tim Berners-Lee.
• Displayed HTML pages• Downloaded and
opened most file types.
3
1313
Web BrowsersWeb Browsers
• Mosaic was the first popular World Wide Web browser.
• Developed by Eric Bina and Marc Andreessen in 1992.
• Released in 1993.
1414
Mosaic BrowserMosaic Browser
• Images were embedded in the text.
• Added graphics to previous text-based software
1515
Netscape NavigatorNetscape Navigator
• In 1994, Mosaic was renamed to Netscape Navigator.
• Text and graphics appeared on the screen as the web page downloaded
1616
Internet ExplorerInternet Explorer
• In 1995, Microsoft licensed Mosaic from Spyglass as the basis of Internet Explorer 1.0.
1.0 2.0
3.0
1717
The Browser WarsThe Browser Wars
• The first browser war: Internet Explorer vs. Netscape Navigator
• By the end of 2006, the usage share of Netscape browsers had fallen from over 85% in the mid 1990s, to less than 1% .
Vs.
1818
The Browser WarsThe Browser WarsThe Browser WarsThe Browser Wars
• The second browser war: Internet Explorer vs. Mozilla Firefox
• 2002-2003: Peak of 95%.• Since Firefox's release, its market share has
grown to 15.1%.
Vs.
4
1919
Search EnginesSearch Engines
• The very first tool used for searching on the Internet was Archie
• Implemented in 1990.• Could not search by
file contents, only by file name.
2020
Search EnginesSearch Engines
• In 1991 the Gopher protocol was created. • Allowed storing and searching large
repositories of information.
Select Fun & Games
2121
Search EnginesSearch Engines
• Veronica - Very Easy Rodent-Oriented Net-wide Index.
• Jughead - Jonzy's Universal Gopher Hierarchy Excavation And Display.
• Searched files in Gopher index systems.
2222
Search EnginesSearch Engines
• The first "full text" crawler-based search engine was WebCrawler, which came out in 1994.
• Deactivated in 2001.
2323
• In 1998, Larry Page and Sergey Brin created a new kind of server environment that used low-end PCs.
• Around 2001, Google rose to prominence.
2424
• Google uses an algorithm called PageRank.
• Google is currently the most popular search engine.
5
2525
How Search Engines WorkHow Search Engines Work
Web Crawling
Indexing
Searching
2626
How Search Engines WorkHow Search Engines Work
• A crawler reads and stores information regarding web site pages.
• Data is indexed and stored in data structures.
• Searching – the engine provides a listing of best-matching web pages.
2727
Modem DevelopmentModem Development
• A device that converts between digital and analog signals.
• The first modems were developed in the 1950s.
2828
Modem DevelopmentModem Development
• The first commercial (dial-up) modem entered the communication market only in 1962.
• Invented by AT&T.• Enabled full-duplex
transmission• Reached data rates of
300bps.
2929
Modem DevelopmentModem Development
• In 1980 data rates reached 14.4 Kbps.• Doubled in 1994.• In 1996: 56 Kbps
3030
Modem DevelopmentModem Development
• In the late 1990s: “broadband” modems: Cable and ADSL.
• Enable connection speed of 2Mbit/s up to 50 Mbit/s.
6
3131
Wireless ModemWireless Modem
• Wireless data modems are used in the WiFi and WiMaxstandards.
• Give laptops and PCs access points to a network.
3232
Web Servers and HostingWeb Servers and Hosting
• Web servers are computers that host web pages.
• Web hosts are companies that provide space on servers.
• Can also provide data center space called colocation.
3333
Web Hosting typesWeb Hosting types
• Free – for personal users.• Shared – shared by many
users.• Reseller – clients become web
hosts.• Application specific – blog,
image, video, wiki farms.• Clustered – websites are not
limited to one server.
3434
Google Servers ExampleGoogle Servers Example
• Provides:– High bandwidth– Load balancing– Fault tolerance
3535
1978 1978 -- ZipZip
• Created by Abraham Lempel and Jacob Ziv.
• Basis for Winzip.• Improved the ability to transmit large
amounts of data.
3636
Web Programming ToolsWeb Programming Tools
• Microsoft FrontPage, Adobe DreamWeaver
• ASP.Net• XHTML• JavaScript• All WWW programming
standards are defined by W3C
7
3737
Flash TechnologyFlash Technology
• Introduced in 1996.• Adds animation and
interactivity to web pages.
• swf extensions.
3838
Internet ThreatsInternet Threats
Trojan- Horse
Virus
Worm
3939
The First VirusesThe First Viruses
• “Elk Cloner” (1982) by Richard Skrenta.
4040
The Jerusalem VirusThe Jerusalem Virus
• A DOS file virus first detected in Jerusalem, Israel, in October 1987.
4141
AntiAnti--Viruses Viruses –– since 1987since 1987• 1987 - European Bernt Fix.• Today – McAfee VirusScan and Norton AntiVirus
4242
Stealth of Data
IP Spoofing
Denial of Service
Threats over the Network Threats over the Network --ExamplesExamples
8
4343
FirewallsFirewalls
• Placed between networks of different security level or trust.
4444
IP Level IP Level Access Access ControlControl
AuthenticationAuthenticationApplication level filtering
FirewallFirewall’’s activitys activity
Creating Creating VPNVPN
4545
IP Level Access ControlIP Level Access Control --Packet FilteringPacket Filtering
• Scanning of every packet according to a rules table.
4646
Creating VPNCreating VPN
User
Internet
New York HEAD QUARTERS
User
LondonBranch office
FirewallFirewall
4747
Internet OpportunitiesInternet Opportunities
• Software customer services• Instant messaging• VoIP, Video.• File sharing applications• Mobility• Commercial Growth• Web 2.0
4848
Software Customer ServicesSoftware Customer Services
• Automatic Software Updates.• Long term service & maintenance.
9
4949
Instant MessagingInstant Messaging• Typed text communication over the Internet.
Once upon a time... Today
5050
Voice/Video Over IPVoice/Video Over IP• VoIP is routing of voice conversations over
an IP-based network.
5151
File Sharing ApplicationsFile Sharing Applications
• Napster – 1999.• Today – eMule, Kaaza etc.
5252
Internet in mobileInternet in mobile
• Accessible in:– Cellular phones– PDAs, Palms– iPAQs
5353
Commercial GrowthCommercial Growth
• Commercialism through the net.• Automatic customer service.
5454
Web 2.0Web 2.0
• Second generation of web-based communities and services which facilitate collaboration and sharing between users.
• People can upload as well as download.
• Examples:– Wikipedia– Facebook
10
5555
Second LifeSecond Life
• 3-D Virtual world built by it’s residents.
5656
ReferencesReferences
• http://en.wikipedia.org/wiki/• http://www.warbaby.com/FG_test/Timeline.html• http://www.livinginternet.com/e/ei.htm• http://www.schoolnet.ca/aboriginal/lessons/archi
e-e.html• http://www.google.com/corporate/history.html• http://searchenginewatch.com/showPage.html?p
age=2156451• http://searchwebservices.techtarget.com/sDefinit
ion/0,,sid26_gci211854,00.html
5757
ReferencesReferences
• http://www.usenix.org/events/usenix99/full_papers/wilson/wilson_html/node4.html
• http://www.pc-history.org/pc-virus.htm• http://www.bls.gov/oco/cg/cgs055.htm• http://www2.rad.com/networks/2005/mode
ms/history.htm• http://www.computer.org/portal/cms_docs_
ieeecs/ieeecs/about/history/timeline.pdf
5858
ReferencesReferences
• http://www.findmyhosting.com/bandwidth.htm
• http://inventors.about.com/library/inventors/bltelephone.htm
• http://www.liv.ac.uk/webteam/glossary/
5959
Thank You!Thank You!
6060
Backups..Backups..
11
6161
Intranet Web Server
External Web Server
User
Firewall Internal Network
Internet
Security Technologies Security Technologies -- FirewallsFirewalls
6262
Application Level Filtering --StatefullStatefull FirewallFirewall
• Statefull inspection - Application level filtering.
• Dynamic changes in the rule table.
6363
FTP Application ExampleFTP Application Example
Internal Network
Internet
User initiates a control channel
Server initiates a transmission channel
6464
FTP Application ExampleFTP Application Example
Firewall
Internal Network
Internet
User initiates a control channel
Firewall initiates a control channel
Server initiates a transmission channel
Static table blocks communication from the outside
By adding dynamic rule –the transmission is allowed
6565
Firewall Usage Firewall Usage -- NATNAT
Firewall
Public IPs 64.236.16.11 10.0.10.1
212.143.162.158
212.143.162.158:80 64.236.16.11:Y
212.143.162.158:80
10.0. 0.17
10.0.0.17:X
212.143.162.158:80 64.236.16.11:Y
212.143.162.158:80 10.0.0.17:X
10.0. 0.1310.0. 0.212
10.0. 0.710.0. 0.9