Course Outline: Introduction to Internet Technology Course Code: CMP 313
Course Description:
This course provides a foundational understanding of Internet technologies, exploring
how the Internet works, the technologies that enable web-based communication, and
the protocols and infrastructure that support online applications. Topics include
networking fundamentals, protocols, web technologies, security considerations, and
emerging Internet trends. By the end of the course, students will be able to design,
deploy, and manage basic web applications and networked systems.
Lecture Notes_5: Internet Technology
1. Introduction to Internet Technology and Networking Fundamentals
Overview of Internet Technology
• Definition: The Internet is a global network that connects millions of private,
public, academic, and business networks.
• Purpose: Communication, data exchange, research, entertainment, and
commerce.
• Key Components:
o ISPs (Internet Service Providers): Companies that provide access to
the Internet.
o Web Browsers: Applications like Chrome, Firefox, and Safari.
o Search Engines: Tools to locate information (e.g., Google, Bing).
Basic Components of a Network
• Nodes: Devices like computers, printers, and routers connected to a network.
• Links: Physical (cables) or wireless (Wi-Fi, Bluetooth) connections between
nodes.
• Topology:
o Bus: All nodes connected to a single cable.
o Star: All nodes connect to a central hub.
o Ring: Nodes form a circular pathway.
o Mesh: Nodes interconnected.
Types of Networks
• LAN (Local Area Network): Small area, such as homes or offices.
• WAN (Wide Area Network): Larger geographic area, e.g., the Internet.
• MAN (Metropolitan Area Network): City-wide networks.
• PAN (Personal Area Network): Devices around an individual, e.g.,
Bluetooth.
Client-Server vs. Peer-to-Peer Models
• Client-Server:
o Centralized server provides services.
o Example: Email servers.
• Peer-to-Peer (P2P):
o All nodes are equal, share resources without a central server.
o Example: File sharing systems.
IP Addressing: IPv4 vs. IPv6
• IPv4: 32-bit, written as 4 octets (e.g., 192.168.0.1).
o Limited addresses (~4.3 billion).
• IPv6: 128-bit, written as eight groups of four hexadecimal digits.
o Vast address space (~340 undecillion).
Lab Activities
1. Activity: Set up a simple network using a router, switch, and two devices.
Assign static IPs and verify connectivity using ping.
2. Activity: Configure a peer-to-peer network using two computers.
Use Case
• Scenario: A small office needs a network for 10 computers. Discuss which
network type and topology to use.
Scenario-Based Questions
1. What happens if two devices on a network have the same IP address?
2. How would you troubleshoot a device that cannot connect to the Internet?
Discussion Questions
1. Compare the advantages and disadvantages of client-server and peer-to-peer
models.
2. Why is IPv6 adoption important?
Case Analysis Questions
• A company needs to connect two offices in different cities. Discuss the most
suitable type of network and why.
2. Networking Protocols
OSI Model and TCP/IP Model
• OSI Model (7 layers):
1. Physical: Transmits raw data (e.g., cables).
2. Data Link: Ensures error-free data transfer.
3. Network: Routing and addressing.
4. Transport: Reliable delivery (TCP/UDP).
5. Session: Manages sessions between devices.
6. Presentation: Data translation and encryption.
7. Application: User interface (e.g., HTTP, FTP).
• TCP/IP Model (4 layers):
1. Network Interface
2. Internet
3. Transport
4. Application
Protocols
• HTTP: Fetches web pages.
• FTP: Transfers files.
• DNS: Resolves domain names to IP addresses.
• DHCP: Automatically assigns IP addresses.
Data Transmission
• Encapsulation: Wrapping data with protocol information.
• Decapsulation: Stripping protocol headers.
Lab Activities
1. Activity: Analyze network traffic using Wireshark.
2. Activity: Configure a basic DNS server for a local network.
Use Case
• Scenario: A user cannot access a website. Use your knowledge of DNS to
identify potential issues.
Scenario-Based Questions
1. What happens during the encapsulation process?
2. How does DHCP assign IP addresses?
Discussion Questions
1. Why is TCP preferred for file transfer and UDP for live streaming?
2. How does DNS improve user experience?
3. Web Technologies
Basics of Web Development
• HTML: Defines structure (e.g., headings, paragraphs).
• CSS: Styles content (e.g., colors, layout).
• JavaScript: Adds interactivity (e.g., dynamic menus).
Structure of a Web Page
• Document Object Model (DOM):
o Hierarchical structure of elements.
o Enables scripting and manipulation.
Client-Side vs. Server-Side Scripting
• Client-Side: Executed on the browser (JavaScript).
• Server-Side: Executed on the server (PHP, Node.js).
Lab Activities
1. Activity: Create a webpage with HTML, style it with CSS, and add
interactivity using JavaScript.
2. Activity: Use browser developer tools to inspect a webpage’s DOM.
Use Case
• Scenario: A business wants a mobile-friendly website. Discuss key
considerations.
Scenario-Based Questions
1. How would you improve the load time of a webpage?
2. What happens if a webpage lacks CSS?
4. Internet Security
Common Security Threats
• Phishing: Fraudulent emails to steal data.
• Malware: Malicious software.
• DoS: Overloading servers to disrupt service.
Encryption and Secure Communication
• Symmetric Encryption: Same key for encryption and decryption.
• Asymmetric Encryption: Public and private keys.
• HTTPS: Secure communication using SSL/TLS.
Firewalls, VPNs, and HTTPS
• Firewalls: Filter network traffic.
• VPNs: Secure remote access.
• HTTPS: Encrypts web traffic.
Lab Activities
1. Activity: Configure a firewall for a small network.
2. Activity: Enable HTTPS on a local web server.
Use Case
• Scenario: A user receives a suspicious email with a link. How should they
respond?
Scenario-Based Questions
1. How does HTTPS protect against eavesdropping?
2. What are the limitations of firewalls?
Extra Activities
1. Research case studies on major cybersecurity breaches.
2. Compare client-side and server-side scripting using practical examples.