The Influence of the Internet

The Influence of the Internet

Agenda The Influence of the • General Background • Modems • Internet Protocols • Web Hosting Internet • E-mail • Threats • Web Browsers • Security Eran Treister • Search Engines • Internet Opportunities Liron Pergament 2 General Background General Background • 1969 – ARPA-Net, the • 1876 – Alexander Graham Bell invents the forerunner of the Internet, is telephone. established. • 1962 – Bell Labs develops the first modem. 3 4 General Background General Background • 1981 – Minitel (Teletel) is deployed across • 1983 - DCA and DARPA establish the France by French Telecom. TCP/IP protocol for ARPANET • 1990s – The term Internet appears. 5 6 1 Internet Protocols Internet Protocols • The Internet is based on the 4-layer model. • This 4-layer model has: • Created in the 1970s by DARPA. – Layer 4: Application layer. • The structure of Internet protocols is still closely – Layer 3: Transport layer. reflected by the TCP/IP model. – Layer 2: Network layer. – Layer 1: Physical layer 7 8 World Wide Web E-Mail • 1989 – Tim Berners-Lee • In late 1971, Tomlinson proposes the basic concept of developed the first ARPANET the Web. email application. • 1990 – Creates HTML, HTTP, • Until the 1980s FTP provided URL: email services for ARPANET. http://en.wikipedia.org/wiki/Url. • Historical addresses till 1982: • 1990 –Writes the prototype for utzoo!decvax!harpo!eagle!mhtsa! the World Wide Web. ihnss!ihuxp!grg 9 10 E-Mails Web Browsers • Early 1980's: the SMTP • The first web browser- protocol was developed. WorldWideWeb. • 1984 – Creation of • Written in 1990 by Tim BITNET Berners-Lee. • 1997 – Hotmail released • Displayed HTML pages first free webmail. • Downloaded and opened most file types. 11 12 2 Web Browsers Mosaic Browser • Mosaic was the first • Images were popular World Wide embedded in the text. Web browser. • Added graphics to • Developed by Eric previous text-based Bina and Marc software Andreessen in 1992. • Released in 1993. 13 14 Netscape Navigator Internet Explorer • In 1994, Mosaic was • In 1995, Microsoft licensed Mosaic from renamed to Netscape Spyglass as the basis of Internet Explorer 1.0. Navigator. • Text and graphics appeared on the screen as the web page downloaded 1.0 2.0 3.0 15 16 The Browser Wars The Browser Wars • The first browser war: Internet Explorer vs. • The second browser war: Internet Explorer vs. Netscape Navigator Mozilla Firefox Vs. Vs. • By the end of 2006, the usage share of • 2002-2003: Peak of 95%. Netscape browsers had fallen from over 85% in • Since Firefox's release, its market share has the mid 1990s, to less than 1% . grown to 15.1%. 17 18 3 Search Engines Search Engines • The very first tool • In 1991 the Gopher protocol was created. used for searching on the Internet was • Allowed storing and searching large Archie repositories of information. • Implemented in 1990. • Could not search by file contents, only by file name. Select Fun & Games 19 20 Search Engines Search Engines • Veronica - Very Easy Rodent-Oriented • The first "full text" crawler-based search engine Net-wide Index. was WebCrawler, which came out in 1994. • Jughead - Jonzy's Universal Gopher • Deactivated in 2001. Hierarchy Excavation And Display. • Searched files in Gopher index systems. 21 22 • In 1998, Larry Page and Sergey Brin • Google uses an algorithm called created a new kind of server environment PageRank. that used low-end PCs. • Google is currently the most popular • Around 2001, Google rose to prominence. search engine. 23 24 4 How Search Engines Work How Search Engines Work • A crawler reads and stores information regarding web site pages. Web Crawling • Data is indexed and Searching stored in data structures. • Searching – the engine provides a listing of best- Indexing matching web pages. 25 26 Modem Development Modem Development • A device that converts between digital and • The first commercial analog signals. (dial-up) modem entered the • The first modems were developed in the communication 1950s. market only in 1962. • Invented by AT&T. • Enabled full-duplex transmission • Reached data rates of 300bps. 27 28 Modem Development Modem Development • In 1980 data rates reached 14.4 Kbps. • In the late 1990s: “broadband” modems: Cable • Doubled in 1994. and ADSL. • Enable connection speed of 2Mbit/s up to 50 • In 1996: 56 Kbps Mbit/s. 29 30 5 Wireless Modem Web Servers and Hosting • Wireless data modems are • Web servers are computers used in the WiFi and WiMax that host web pages. standards. • Web hosts are companies that • Give laptops and PCs access provide space on servers. points to a network. • Can also provide data center space called colocation. 31 32 Web Hosting types Google Servers Example • Free – for personal users. • Provides: • Shared – shared by many – High bandwidth users. – Load balancing • Reseller – clients become web – Fault tolerance hosts. • Application specific – blog, image, video, wiki farms. • Clustered – websites are not limited to one server. 33 34 1978 - Zip Web Programming Tools • Created by Abraham Lempel and • Microsoft FrontPage, Jacob Ziv. Adobe DreamWeaver • Basis for Winzip. • ASP.Net • Improved the ability to transmit large • XHTML amounts of data. • JavaScript • All WWW programming standards are defined by W3C 35 36 6 Flash Technology Internet Threats Virus • Introduced in 1996. • Adds animation and interactivity to web Trojan- Horse pages. • swf extensions. Worm 37 38 The First Viruses The Jerusalem Virus • “Elk Cloner” (1982) by Richard Skrenta. • A DOS file virus first detected in Jerusalem, Israel, in October 1987. 39 40 Anti-Viruses – since 1987 Threats over the Network - Examples • 1987 - European Bernt Fix. • Today – McAfee VirusScan and Norton AntiVirus IP Spoofing Stealth of Data Denial of Service 41 42 7 Firewalls Firewall’s activity • Placed between networks of different security IP Level Creating level or trust. Access VPN Control Application level Authentication filtering 43 44 IP Level Access Control - Creating VPN Packet Filtering Creating VPN • Scanning of every packet according to a rules London New York table. Branch office HEAD QUARTERS Firewall Firewall Internet User User 45 46 Internet Opportunities Software Customer Services • Software customer services • Automatic Software Updates. • Instant messaging • Long term service & maintenance. • VoIP, Video. • File sharing applications • Mobility • Commercial Growth • Web 2.0 47 48 8 Instant Messaging Voice/Video Over IP • VoIP is routing of voice conversations over • Typed text communication over the Internet. an IP-based network. Once upon a time... Today 49 50 File Sharing Applications Internet in mobile • Napster – 1999. • Accessible in: • Today –eMule, Kaazaetc. – Cellular phones –PDAs, Palms – iPAQs 51 52 Commercial Growth Web 2.0 • Commercialism through the net. • Second generation of web-based communities • Automatic customer service. and services which facilitate collaboration and sharing between users. • People can upload as well as download. • Examples: – Wikipedia – Facebook 53 54 9 Second Life References • 3-D Virtual world built by it’s residents. • http://en.wikipedia.org/wiki/ • http://www.warbaby.com/FG_test/Timeline.html • http://www.livinginternet.com/e/ei.htm • http://www.schoolnet.ca/aboriginal/lessons/archi e-e.html • http://www.google.com/corporate/history.html • http://searchenginewatch.com/showPage.html?p age=2156451 • http://searchwebservices.techtarget.com/sDefinit ion/0,,sid26_gci211854,00.html 55 56 References References • http://www.usenix.org/events/usenix99/full • http://www.findmyhosting.com/bandwidth.h _papers/wilson/wilson_html/node4.html tm • http://www.pc-history.org/pc-virus.htm • http://inventors.about.com/library/inventors • http://www.bls.gov/oco/cg/cgs055.htm /bltelephone.htm • http://www2.rad.com/networks/2005/mode • http://www.liv.ac.uk/webteam/glossary/ ms/history.htm • http://www.computer.org/portal/cms_docs_ ieeecs/ieeecs/about/history/timeline.pdf 57 58 Backups.. Thank You! 59 60 10 Application Level Filtering - Security Technologies - Firewalls Statefull Firewall Intranet External Web Web Server Server • Statefull inspection - Application level User filtering. Firewall Internal Network Internet • Dynamic changes in the rule table. 61 62 FTP Application Example FTP Application Example User initiates a control channel User initiates a Firewall initiates a control channel control channel Internal Internal Network Network Firewall Internet Internet By adding dynamicStatic ruletable – blocks Server initiates a the transmissioncommunication is allowed from transmission channel the outside Server initiates a transmission channel 63 64 Firewall Usage - NAT 212.143.162.158 10.0. 0.17 10.0. 0.13 10.0. 0.212 Public IPs 64.236.16.11 10.0.10.1 Firewall 10.0. 0.7 10.0. 0.9 212.143.162.158:80 10.0.0.17:X 212.143.162.158:80 64.236.16.11:Y 212.143.162.158:80 64.236.16.11:Y 212.143.162.158:80 10.0.0.17:X 65 11.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    11 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us