IT Fundamentals/Internet

From Wikiversity
Jump to navigation Jump to search
Internet

This lesson introduces Internet services and web browsers.

Objectives and Skills[edit]

Objectives and skills for the Internet portion of IT Fundamentals certification include:[1]

  • Compare and contrast common Internet service types.
    • Fiber optic
    • Cable
    • DSL
    • Wireless
      • Radio frequency
      • Satellite
      • Cellular
  • Given a scenario, configure and use web browsers.
    • Caching/clearing cache
    • Deactivate client-side scripting
    • Browser add-ons/extensions
      • Add
      • Remove
      • Enable/disable
    • Private browsing
    • Proxy settings
    • Certificates
      • Valid
      • Invalid
    • Popup blockers
    • Script blockers
    • Compatible browser for application(s)
  • Explain basic networking concepts.
    • Basics of network communication
      • Basics of packet transmission
      • DNS
        • URL-to-IP translation
      • LAN vs. WAN
    • Basic protocols
      • HTTP/S
      • POP3
      • IMAP
      • SMTP

Readings[edit]

  1. Wikipedia: Internet access
  2. Wikipedia: Web browser
  3. Wikipedia: Internet protocol suite
  4. Wikipedia: Domain Name System

Multimedia[edit]

  1. YouTube: Common Internet Service Types
  2. YouTube: Configure & Use Web Browsers

Activities[edit]

  1. Research plans available from different wired (fiber optic, cable, DSL) and wireless (radio frequency, satellite, cellular) Internet providers. Compare mobility, availability, bandwidth, reliability, delay, concurrent connections, security, and cost. How is speed measured for these services (bps, Kbps, Mbps, Gbps, or Tbps)?
  2. Research email protocols. Identify the differences between HTTPS, POP3, IMAP, and SMTP. Note what each protocol does and when each should be used. Check settings in your preferred email program to determine which email protocols you are using.
  3. Complete the GCF Global: Internet Safety tutorials.
  4. Configure and use web browsers. Try two or three different web browsers (Chrome, Firefox, Edge, Safari, etc.) for each of the following activities.
    • View cache contents and then clear the cache.
    • Disable JavaScript and test website functionality. Reenable JavaScript when you finish testing.
    • Check installed browser extensions (add-ons). Install Privacy Badger to experiment with if you don't currently have any extensions installed. Practice enabling and disabling extensions. Remove any extensions you don't recall installing or don't use anymore.
    • Test private browsing. Research what actual privacy private browsing provides and what privacy it doesn't or can't address.
  5. View and test web site certificates.
  6. Use a protocol analyzer to view the basics of packet transmission and URL-to-IP translation:
    1. Review Wireshark and the lessons on how to:
      • Install Wireshark
      • Start a Wireshark Capture
      • Stop a Wireshark Capture
      • Capture Network Traffic
      • Filter Displayed Traffic
    2. Start a Wireshark capture and then use a browser to navigate to a website you haven't visited recently (within the last day or so).
    3. Stop the Wireshark capture.
    4. Filter for DNS traffic and observe how the DNS protocol was used to translate the URL's fully-qualified domain name (FQDN) into an IP address.
  7. Use a protocol analyzer to compare HTTP and HTTPS traffic:
    1. Start a Wireshark capture and then use a browser to navigate to a website using HTTP, and another website using HTTPS.
    2. Stop the Wireshark capture.
    3. Filter for HTTP traffic and observe that the contents of the traffic are visible in the capture.
    4. Filter for HTTPS traffic and observe that the contents of the traffic are encrypted and not visible in the capture.

Lesson Summary[edit]

Internet Service[edit]

  • An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet.[2]
  • Wired Internet access options include analog and digital computer modems attached to telephone lines, coaxial television cable (CATV), and fiber optic cables.[3]
  • Wireless Internet access options include Wi-Fi, cellular, and satellite connections.[4]
  • Optical fiber is a flexible, transparent fiber used most often as a means to transmit light between the two ends of the fiber and permit transmission over longer distances and at higher bandwidths (data transfer rates) than electrical cables.[5]
  • Cable Internet is a form of broadband Internet access which uses the same coaxial cable infrastructure as cable television.[6]
  • Digital subscriber line (DSL) is a family of technologies that are used to transmit digital data over telephone lines.[7]
  • Wireless communication is the electromagnetic transfer of information between two or more points that are not connected by an electrical conductor.[8]
  • The frequencies of the radio spectrum that are available for use for communication are treated as a public resource and are regulated by government organizations. These regulations determine which frequency ranges can be used for what purpose and by whom.[9]
  • Wi-Fi technology may be used to provide local network and Internet access to devices that are within range of one or more routers that are connected to the Internet.[10]
  • The Wi-Fi coverage of one or more interconnected access points (hotspots) can extend from an area as small as a few rooms to as large as many square kilometers.[11]
  • Satellite Internet access is Internet access provided through communications satellites.[12]
  • Mobile Internet refers to access to the internet via a cellular telephone service provider.[13]

Web Browsers[edit]

  • A web browser (commonly referred to as a browser) is a software application for retrieving, presenting and traversing information resources on the World Wide Web.[14]
  • The primary purpose of a web browser is to bring information resources to the user, allowing them to view the information, and then access other linked information.[15]
  • A browser cache is used for temporary storage of web documents, such as HTML pages and images, to reduce bandwidth usage, server load, and perceived lag.[16]
  • Client-side scripting, typically using JavaScript, changes interface behaviors within a specific web page in response to mouse or keyboard actions, or at specified timing events.[17]
  • A browser extension is a plug-in that extends the functionality of a web browser.[18]
  • Browser extensions are used for improving a browser's user interface, security or accessibility, blocking advertisements, and various other features to make browsing the internet easier and more pleasant.[19]
  • Browser extensions have access to everything done by the browser, and can do things like inject ads into web pages, or make "background" HTTP requests to third-party servers. As a result, a malicious browser extension may take action against the interest of the user that installed it.[20]
  • Private browsing is a feature in some web browsers where the browser creates a temporary session that is isolated from the browser's main session and user data. Browsing history is not saved, and local data associated with the session, such as cookies, are cleared when the session is closed. These modes are designed primarily to prevent data and history associated with a particular browsing session from persisting on the device, or being discovered by another user of the same device. Private browsing modes do not necessarily protect users from being tracked by other websites or their Internet service provider (ISP).[21]
  • A proxy server is a server application or appliance that acts as an intermediary for requests from clients seeking resources from servers that provide those resources.[22]
  • A public key certificate, also known as a digital certificate or identity certificate, is an electronic document used to prove the ownership of a public key. The certificate includes information about the key, information about the identity of its owner (called the subject), and the digital signature of an entity that has verified the certificate's contents (called the issuer). If the signature is valid, and the software examining the certificate trusts the issuer, then it can use that key to communicate securely with the certificate's subject.[23]
  • Web development and design technologies allow an author to associate any item on a pop-up with any action, including with a cancel or innocent looking button. All major web browsers let users block unwanted pop-ups almost completely.[24]
  • Script blockers block active (executable) web content, which a user can wholly or partially unblock by whitelisting a site or domain from the browser or browser extension's toolbar menu.[25]
  • Cross-browser compatibility is the ability of a website or web application to function across different browsers and degrade gracefully when browser features are absent or lacking.[26]

Networking Concepts[edit]

  • The Internet protocol suite provides end-to-end data communication specifying how data should be packetized, addressed, transmitted, routed, and received. This functionality is organized into four abstraction layers, which classify all related protocols according to the scope of networking involved. From lowest to highest, the layers are the link layer, containing communication methods for data that remains within a single network segment (link); the internet layer, providing internetworking between independent networks; the transport layer, handling host-to-host communication; and the application layer, providing process-to-process data exchange for applications.[27]
  • Common link-layer protocols include Ethernet, Wi-Fi, and DSL.[28]
  • The standard internet layer protocol is IP.[29]
  • The standard transport layer protocols are TCP and UDP.[30]
  • Common application layer protocols include:[31]
    • HTTP and HTTPS (web)
    • POP3, IMAP, and SMTP (email)
    • FTP, FTPS, and SFTP (file transfer)
    • SNMP (network monitoring)
  • Packets are transmitted by switches and access points on local networks and by routers between networks.[32]
  • The Domain Name System (DNS) is a hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most prominently, it translates more readily memorized domain names to the numerical IP addresses needed for locating and identifying computer services and devices with the underlying network protocols.[33]
  • A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.[34]
  • A wide area network (WAN) is a telecommunications network that extends over a large geographical area for the primary purpose of computer networking, often established with leased telecommunication circuits.[35]

Key Terms[edit]

CSS (Cascading Style Sheets)
A style sheet language used for describing the presentation of a document written in a markup language.[36]
DSL (Digital Subscriber Line)
A family of technologies that are used to transmit digital data over telephone lines.[37]
FTP (File Transfer Protocol)
A standard network protocol used for the transfer of computer files between a client and server on a computer network.[38]
FTPS (File Transfer Protocol over Secure Sockets Layer)
An extension to the commonly used File Transfer Protocol (FTP) that adds support for the Transport Layer Security (TLS) and the (now prohibited) Secure Sockets Layer (SSL) cryptographic protocols.[39]
HTML (Hypertext Markup Language)
The standard markup language for documents designed to be displayed in a web browser.[40]
HTTP (Hypertext Transfer Protocol)
An application protocol for distributed, collaborative, hypermedia information systems used as the foundation of data communication for the World Wide Web.[41]
HTTPS (Hypertext Transfer Protocol Secure)
An extension of the Hypertext Transfer Protocol (HTTP) used for secure communication encrypted using Transport Layer Security (TLS).[42]
IMAP (Internet Mail Access Protocol)
An Internet standard protocol used by e-mail clients to retrieve e-mail messages from a mail server.[43]
IP (Internet Protocol)
The principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet.[44]
ISP (Internet Service Provider)
An organization that provides services for accessing, using, or participating in the Internet.[45]
POP (Post Office Protocol)
An application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection.[46]
POP3 (Post Office Protocol 3)
The current version of the Post Office Protocol (POP).[47]
SFTP (Secure File Transfer Protocol)
A network protocol that provides file access, file transfer, and file management over any reliable data stream designed by the Internet Engineering Task Force (IETF) as an extension of the Secure Shell protocol (SSH) version 2.0 to provide secure file transfer capabilities.[48]
SMTP (Simple Mail Transfer Protocol)
An Internet standard for electronic mail (email) transmission.[49]
SNMP (Simple Network Management Protocol)
An Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior.[50]
SSL (Secure Sockets Layer)
An outdated encryption protocol replaced by Transport Layer Security (TLS).[51]
TCP (Transmission Control Protocol)
One of the main protocols of the Internet protocol suite, which provides reliable, ordered, and error-checked delivery of a stream of octets (bytes) between applications running on hosts communicating via an IP network.[52]
TCP/IP (Transmission Control Protocol/Internet Protocol)
Known as the Internet protocol suite, the conceptual model and set of communications protocols used in the Internet and similar computer networks.[53]
URL (Uniform Resource Locator)
A reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it.[54]
VoIP (Voice over Internet Protocol)
A method and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.[55]

Assessments[edit]

See Also[edit]

References[edit]

  1. CompTIA: IT Fundamentals (ITF+) Exam Objectives FC0-U61
  2. Wikipedia: Internet service provider
  3. Wikipedia: Internet service provider
  4. Wikipedia: Internet service provider
  5. Wikipedia: Optical fiber
  6. Wikipedia: Cable Internet access
  7. Wikipedia: Digital subscriber line
  8. Wikipedia: Wireless
  9. Wikipedia: Wireless
  10. Wikipedia: Wi-Fi
  11. Wikipedia: Wi-Fi
  12. Wikipedia: Satellite Internet access
  13. Wikipedia: Mobile web
  14. Wikipedia: Web browser
  15. Wikipedia: Web browser
  16. Wikipedia: Web cache
  17. Wikipedia: Dynamic web page
  18. Wikipedia: Browser extension
  19. Wikipedia: Browser extension
  20. Wikipedia: Browser extension
  21. Wikipedia: Private browsing
  22. Wikipedia: Proxy server
  23. Wikipedia: Public key certificate
  24. Wikipedia: Pop-up ad
  25. Wikipedia: NoScript
  26. Wikipedia: Cross-browser compatibility
  27. Wikipedia: Internet protocol suite
  28. Wikipedia: Internet protocol suite
  29. Wikipedia: Internet protocol suite
  30. Wikipedia: Internet protocol suite
  31. Wikipedia: Internet protocol suite
  32. Wikipedia: Internet protocol suite
  33. Wikipedia: Domain Name System
  34. Wikipedia: Local area network
  35. Wikipedia: Wide area network
  36. Wikipedia: Cascading Style Sheets
  37. Wikipedia: Digital subscriber line
  38. Wikipedia: File Transfer Protocol
  39. Wikipedia: FTPS
  40. Wikipedia: HTML
  41. Wikipedia: Hypertext Transfer Protocol
  42. Wikipedia: HTTPS
  43. Wikipedia: Internet Message Access Protocol
  44. Wikipedia: Internet Protocol
  45. Wikipedia: Internet service provider
  46. Wikipedia: Post Office Protocol
  47. Wikipedia: Post Office Protocol
  48. Wikipedia: SSH File Transfer Protocol
  49. Wikipedia: Simple Mail Transfer Protocol
  50. Wikipedia: Simple Network Management Protocol
  51. Wikipedia: Transport Layer Security
  52. Wikipedia: Transmission Control Protocol
  53. Wikipedia: Internet protocol suite
  54. Wikipedia: URL
  55. Wikipedia: Voice over IP