The Influence of the Internet
Total Page:16
File Type:pdf, Size:1020Kb
Agenda The Influence of the • General Background • Modems • Internet Protocols • Web Hosting Internet • E-mail • Threats • Web Browsers • Security Eran Treister • Search Engines • Internet Opportunities Liron Pergament 2 General Background General Background • 1969 – ARPA-Net, the • 1876 – Alexander Graham Bell invents the forerunner of the Internet, is telephone. established. • 1962 – Bell Labs develops the first modem. 3 4 General Background General Background • 1981 – Minitel (Teletel) is deployed across • 1983 - DCA and DARPA establish the France by French Telecom. TCP/IP protocol for ARPANET • 1990s – The term Internet appears. 5 6 1 Internet Protocols Internet Protocols • The Internet is based on the 4-layer model. • This 4-layer model has: • Created in the 1970s by DARPA. – Layer 4: Application layer. • The structure of Internet protocols is still closely – Layer 3: Transport layer. reflected by the TCP/IP model. – Layer 2: Network layer. – Layer 1: Physical layer 7 8 World Wide Web E-Mail • 1989 – Tim Berners-Lee • In late 1971, Tomlinson proposes the basic concept of developed the first ARPANET the Web. email application. • 1990 – Creates HTML, HTTP, • Until the 1980s FTP provided URL: email services for ARPANET. http://en.wikipedia.org/wiki/Url. • Historical addresses till 1982: • 1990 –Writes the prototype for utzoo!decvax!harpo!eagle!mhtsa! the World Wide Web. ihnss!ihuxp!grg 9 10 E-Mails Web Browsers • Early 1980's: the SMTP • The first web browser- protocol was developed. WorldWideWeb. • 1984 – Creation of • Written in 1990 by Tim BITNET Berners-Lee. • 1997 – Hotmail released • Displayed HTML pages first free webmail. • Downloaded and opened most file types. 11 12 2 Web Browsers Mosaic Browser • Mosaic was the first • Images were popular World Wide embedded in the text. Web browser. • Added graphics to • Developed by Eric previous text-based Bina and Marc software Andreessen in 1992. • Released in 1993. 13 14 Netscape Navigator Internet Explorer • In 1994, Mosaic was • In 1995, Microsoft licensed Mosaic from renamed to Netscape Spyglass as the basis of Internet Explorer 1.0. Navigator. • Text and graphics appeared on the screen as the web page downloaded 1.0 2.0 3.0 15 16 The Browser Wars The Browser Wars • The first browser war: Internet Explorer vs. • The second browser war: Internet Explorer vs. Netscape Navigator Mozilla Firefox Vs. Vs. • By the end of 2006, the usage share of • 2002-2003: Peak of 95%. Netscape browsers had fallen from over 85% in • Since Firefox's release, its market share has the mid 1990s, to less than 1% . grown to 15.1%. 17 18 3 Search Engines Search Engines • The very first tool • In 1991 the Gopher protocol was created. used for searching on the Internet was • Allowed storing and searching large Archie repositories of information. • Implemented in 1990. • Could not search by file contents, only by file name. Select Fun & Games 19 20 Search Engines Search Engines • Veronica - Very Easy Rodent-Oriented • The first "full text" crawler-based search engine Net-wide Index. was WebCrawler, which came out in 1994. • Jughead - Jonzy's Universal Gopher • Deactivated in 2001. Hierarchy Excavation And Display. • Searched files in Gopher index systems. 21 22 • In 1998, Larry Page and Sergey Brin • Google uses an algorithm called created a new kind of server environment PageRank. that used low-end PCs. • Google is currently the most popular • Around 2001, Google rose to prominence. search engine. 23 24 4 How Search Engines Work How Search Engines Work • A crawler reads and stores information regarding web site pages. Web Crawling • Data is indexed and Searching stored in data structures. • Searching – the engine provides a listing of best- Indexing matching web pages. 25 26 Modem Development Modem Development • A device that converts between digital and • The first commercial analog signals. (dial-up) modem entered the • The first modems were developed in the communication 1950s. market only in 1962. • Invented by AT&T. • Enabled full-duplex transmission • Reached data rates of 300bps. 27 28 Modem Development Modem Development • In 1980 data rates reached 14.4 Kbps. • In the late 1990s: “broadband” modems: Cable • Doubled in 1994. and ADSL. • Enable connection speed of 2Mbit/s up to 50 • In 1996: 56 Kbps Mbit/s. 29 30 5 Wireless Modem Web Servers and Hosting • Wireless data modems are • Web servers are computers used in the WiFi and WiMax that host web pages. standards. • Web hosts are companies that • Give laptops and PCs access provide space on servers. points to a network. • Can also provide data center space called colocation. 31 32 Web Hosting types Google Servers Example • Free – for personal users. • Provides: • Shared – shared by many – High bandwidth users. – Load balancing • Reseller – clients become web – Fault tolerance hosts. • Application specific – blog, image, video, wiki farms. • Clustered – websites are not limited to one server. 33 34 1978 - Zip Web Programming Tools • Created by Abraham Lempel and • Microsoft FrontPage, Jacob Ziv. Adobe DreamWeaver • Basis for Winzip. • ASP.Net • Improved the ability to transmit large • XHTML amounts of data. • JavaScript • All WWW programming standards are defined by W3C 35 36 6 Flash Technology Internet Threats Virus • Introduced in 1996. • Adds animation and interactivity to web Trojan- Horse pages. • swf extensions. Worm 37 38 The First Viruses The Jerusalem Virus • “Elk Cloner” (1982) by Richard Skrenta. • A DOS file virus first detected in Jerusalem, Israel, in October 1987. 39 40 Anti-Viruses – since 1987 Threats over the Network - Examples • 1987 - European Bernt Fix. • Today – McAfee VirusScan and Norton AntiVirus IP Spoofing Stealth of Data Denial of Service 41 42 7 Firewalls Firewall’s activity • Placed between networks of different security IP Level Creating level or trust. Access VPN Control Application level Authentication filtering 43 44 IP Level Access Control - Creating VPN Packet Filtering Creating VPN • Scanning of every packet according to a rules London New York table. Branch office HEAD QUARTERS Firewall Firewall Internet User User 45 46 Internet Opportunities Software Customer Services • Software customer services • Automatic Software Updates. • Instant messaging • Long term service & maintenance. • VoIP, Video. • File sharing applications • Mobility • Commercial Growth • Web 2.0 47 48 8 Instant Messaging Voice/Video Over IP • VoIP is routing of voice conversations over • Typed text communication over the Internet. an IP-based network. Once upon a time... Today 49 50 File Sharing Applications Internet in mobile • Napster – 1999. • Accessible in: • Today –eMule, Kaazaetc. – Cellular phones –PDAs, Palms – iPAQs 51 52 Commercial Growth Web 2.0 • Commercialism through the net. • Second generation of web-based communities • Automatic customer service. and services which facilitate collaboration and sharing between users. • People can upload as well as download. • Examples: – Wikipedia – Facebook 53 54 9 Second Life References • 3-D Virtual world built by it’s residents. • http://en.wikipedia.org/wiki/ • http://www.warbaby.com/FG_test/Timeline.html • http://www.livinginternet.com/e/ei.htm • http://www.schoolnet.ca/aboriginal/lessons/archi e-e.html • http://www.google.com/corporate/history.html • http://searchenginewatch.com/showPage.html?p age=2156451 • http://searchwebservices.techtarget.com/sDefinit ion/0,,sid26_gci211854,00.html 55 56 References References • http://www.usenix.org/events/usenix99/full • http://www.findmyhosting.com/bandwidth.h _papers/wilson/wilson_html/node4.html tm • http://www.pc-history.org/pc-virus.htm • http://inventors.about.com/library/inventors • http://www.bls.gov/oco/cg/cgs055.htm /bltelephone.htm • http://www2.rad.com/networks/2005/mode • http://www.liv.ac.uk/webteam/glossary/ ms/history.htm • http://www.computer.org/portal/cms_docs_ ieeecs/ieeecs/about/history/timeline.pdf 57 58 Backups.. Thank You! 59 60 10 Application Level Filtering - Security Technologies - Firewalls Statefull Firewall Intranet External Web Web Server Server • Statefull inspection - Application level User filtering. Firewall Internal Network Internet • Dynamic changes in the rule table. 61 62 FTP Application Example FTP Application Example User initiates a control channel User initiates a Firewall initiates a control channel control channel Internal Internal Network Network Firewall Internet Internet By adding dynamicStatic ruletable – blocks Server initiates a the transmissioncommunication is allowed from transmission channel the outside Server initiates a transmission channel 63 64 Firewall Usage - NAT 212.143.162.158 10.0. 0.17 10.0. 0.13 10.0. 0.212 Public IPs 64.236.16.11 10.0.10.1 Firewall 10.0. 0.7 10.0. 0.9 212.143.162.158:80 10.0.0.17:X 212.143.162.158:80 64.236.16.11:Y 212.143.162.158:80 64.236.16.11:Y 212.143.162.158:80 10.0.0.17:X 65 11.