Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
8 views5 pages

CMP 313 Notes - 5

The Introduction to Internet Technology course (CMP 313) covers foundational concepts of Internet technologies, including networking fundamentals, protocols, web technologies, and security considerations. Students will learn to design, deploy, and manage web applications and networked systems through various lab activities and discussions. Key topics include network types, IP addressing, the OSI and TCP/IP models, web development basics, and common security threats.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views5 pages

CMP 313 Notes - 5

The Introduction to Internet Technology course (CMP 313) covers foundational concepts of Internet technologies, including networking fundamentals, protocols, web technologies, and security considerations. Students will learn to design, deploy, and manage web applications and networked systems through various lab activities and discussions. Key topics include network types, IP addressing, the OSI and TCP/IP models, web development basics, and common security threats.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Course Outline: Introduction to Internet Technology Course Code: CMP 313

Course Description:

This course provides a foundational understanding of Internet technologies, exploring


how the Internet works, the technologies that enable web-based communication, and
the protocols and infrastructure that support online applications. Topics include
networking fundamentals, protocols, web technologies, security considerations, and
emerging Internet trends. By the end of the course, students will be able to design,
deploy, and manage basic web applications and networked systems.

Lecture Notes_5: Internet Technology

1. Introduction to Internet Technology and Networking Fundamentals

Overview of Internet Technology

• Definition: The Internet is a global network that connects millions of private,


public, academic, and business networks.
• Purpose: Communication, data exchange, research, entertainment, and
commerce.
• Key Components:
o ISPs (Internet Service Providers): Companies that provide access to
the Internet.
o Web Browsers: Applications like Chrome, Firefox, and Safari.
o Search Engines: Tools to locate information (e.g., Google, Bing).

Basic Components of a Network

• Nodes: Devices like computers, printers, and routers connected to a network.


• Links: Physical (cables) or wireless (Wi-Fi, Bluetooth) connections between
nodes.
• Topology:
o Bus: All nodes connected to a single cable.
o Star: All nodes connect to a central hub.
o Ring: Nodes form a circular pathway.
o Mesh: Nodes interconnected.

Types of Networks

• LAN (Local Area Network): Small area, such as homes or offices.


• WAN (Wide Area Network): Larger geographic area, e.g., the Internet.
• MAN (Metropolitan Area Network): City-wide networks.
• PAN (Personal Area Network): Devices around an individual, e.g.,
Bluetooth.

Client-Server vs. Peer-to-Peer Models

• Client-Server:
o Centralized server provides services.
o Example: Email servers.
• Peer-to-Peer (P2P):
o All nodes are equal, share resources without a central server.
o Example: File sharing systems.

IP Addressing: IPv4 vs. IPv6

• IPv4: 32-bit, written as 4 octets (e.g., 192.168.0.1).


o Limited addresses (~4.3 billion).
• IPv6: 128-bit, written as eight groups of four hexadecimal digits.
o Vast address space (~340 undecillion).

Lab Activities

1. Activity: Set up a simple network using a router, switch, and two devices.
Assign static IPs and verify connectivity using ping.
2. Activity: Configure a peer-to-peer network using two computers.

Use Case

• Scenario: A small office needs a network for 10 computers. Discuss which


network type and topology to use.

Scenario-Based Questions

1. What happens if two devices on a network have the same IP address?


2. How would you troubleshoot a device that cannot connect to the Internet?

Discussion Questions

1. Compare the advantages and disadvantages of client-server and peer-to-peer


models.
2. Why is IPv6 adoption important?

Case Analysis Questions

• A company needs to connect two offices in different cities. Discuss the most
suitable type of network and why.

2. Networking Protocols

OSI Model and TCP/IP Model

• OSI Model (7 layers):


1. Physical: Transmits raw data (e.g., cables).
2. Data Link: Ensures error-free data transfer.
3. Network: Routing and addressing.
4. Transport: Reliable delivery (TCP/UDP).
5. Session: Manages sessions between devices.
6. Presentation: Data translation and encryption.
7. Application: User interface (e.g., HTTP, FTP).
• TCP/IP Model (4 layers):
1. Network Interface
2. Internet
3. Transport
4. Application

Protocols

• HTTP: Fetches web pages.


• FTP: Transfers files.
• DNS: Resolves domain names to IP addresses.
• DHCP: Automatically assigns IP addresses.

Data Transmission

• Encapsulation: Wrapping data with protocol information.


• Decapsulation: Stripping protocol headers.

Lab Activities

1. Activity: Analyze network traffic using Wireshark.


2. Activity: Configure a basic DNS server for a local network.

Use Case

• Scenario: A user cannot access a website. Use your knowledge of DNS to


identify potential issues.

Scenario-Based Questions

1. What happens during the encapsulation process?


2. How does DHCP assign IP addresses?

Discussion Questions

1. Why is TCP preferred for file transfer and UDP for live streaming?
2. How does DNS improve user experience?

3. Web Technologies

Basics of Web Development

• HTML: Defines structure (e.g., headings, paragraphs).


• CSS: Styles content (e.g., colors, layout).
• JavaScript: Adds interactivity (e.g., dynamic menus).

Structure of a Web Page

• Document Object Model (DOM):


o Hierarchical structure of elements.
o Enables scripting and manipulation.

Client-Side vs. Server-Side Scripting

• Client-Side: Executed on the browser (JavaScript).


• Server-Side: Executed on the server (PHP, Node.js).

Lab Activities

1. Activity: Create a webpage with HTML, style it with CSS, and add
interactivity using JavaScript.
2. Activity: Use browser developer tools to inspect a webpage’s DOM.

Use Case

• Scenario: A business wants a mobile-friendly website. Discuss key


considerations.

Scenario-Based Questions

1. How would you improve the load time of a webpage?


2. What happens if a webpage lacks CSS?

4. Internet Security

Common Security Threats

• Phishing: Fraudulent emails to steal data.


• Malware: Malicious software.
• DoS: Overloading servers to disrupt service.

Encryption and Secure Communication

• Symmetric Encryption: Same key for encryption and decryption.


• Asymmetric Encryption: Public and private keys.
• HTTPS: Secure communication using SSL/TLS.

Firewalls, VPNs, and HTTPS

• Firewalls: Filter network traffic.


• VPNs: Secure remote access.
• HTTPS: Encrypts web traffic.

Lab Activities

1. Activity: Configure a firewall for a small network.


2. Activity: Enable HTTPS on a local web server.
Use Case

• Scenario: A user receives a suspicious email with a link. How should they
respond?

Scenario-Based Questions

1. How does HTTPS protect against eavesdropping?


2. What are the limitations of firewalls?

Extra Activities

1. Research case studies on major cybersecurity breaches.


2. Compare client-side and server-side scripting using practical examples.

You might also like