1 / 22

Chapter 11

Chapter 11. From Internet to Information Infrastructure. Topics. Internet Applications: Communication and Connection The Evolving Internet Internet2 and the Next Generation Internet Internet Issues: Ethical and Political Dilemmas

elina
Download Presentation

Chapter 11

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 11 From Internet to Information Infrastructure

  2. Topics • Internet Applications: Communication and Connection • The Evolving Internet • Internet2 and the Next Generation Internet • Internet Issues: Ethical and Political Dilemmas • Internet Everywhere: The Invisible Information Infrastructure • Cyberspace: The Electronic Frontier

  3. Internet Applications: Communication and Connection • Search engines are designed to make it easier to find information on the Web. • web crawlers or spiders --software robots that systematically search the web

  4. Search Engines • Some search engines use keywords and Boolean logic to conduct searches

  5. Search Engines • Other search engines allow searches by using a hierarchical directory or subject tree

  6. Portals • Web entry stations that offer quick and easy access to a variety of services. • Consumer portalsincludes search engines, email services, chat rooms, references, news and sports headlines, shopping malls and other services • Corporate portalson intranets serve the employees of particular corporations • Vertical portalsare targeted at members of a particular industry or economic sector

  7. Handle URLs with care. Get to know your search engines. If you’re in a hurry, dispense with frills. Organize your favorite bookmarks. Be selective. Protect your privacy. Be conscious of cookies. Shop with bots. Shop smart. Remember why you’re there. Think before you publish. Rules of Thumb: Working the Web

  8. Email on the Internet • What appears on the screen depends on the type of Internet connection you have and the mail program you use. • Popular graphical email programs include Eudora, Outlook and Netscape Communicator.

  9. Email on the Internet • Email formats include: • ASCII text--can be viewed by any mail client program • HTML--displays text formatting, pictures, and links to Web pages

  10. Mailing Lists & Network News • Mailing listsallow you to participate in email discussion groups on special-interest topics. • A newsgroupis a public discussion on a particular subject consisting of notes written to a central Internet site and redistributed through a worldwide newsgroup network called Usenet

  11. Real-Time Communication • Users are logged in at the same time. • Instant Messaging for exchanging instant messages with on-line friends and co-workers • Internet telephony (IP telephony) for long-distance toll-free telephone service • Videoconferencing for two-way meetings

  12. Rules of Thumb: Netiquette • Say what you mean and say it with care. • Keep it short and to the point. • Proofread yours messages. • Learn the “nonverbal” language of the Net. • Keep your cool. • Don’t be a source of spam (Internet junk mail). • Lurk before you leap. • Check your FAQs. • Give something back.

  13. Push Technology • The Web was built with pull technology—browsers on client computers “pull” information from server machines. • Browser asks for information • With push technology, information is delivered automatically to the client computer. • New product descriptions • Automatic software upgrades • Updated news

  14. Peer-to-Peer and Grid Computing • Peer-to-Peer (P2P) computing - users share music, movies, and other files without going through a central directory. • Grid computing- anyone can plug in from anywhere and rent processing power and software from anywhere on the Net

  15. Intranets, Extranets and Electronic Commerce • Intranetsare self-contained intra-organizational networks that offer email, newsgroups, file transfer, Web publishing and other Internet-like services. • Firewallsprevent unauthorized communication and secure sensitive internal data

  16. Intranets, Extranets and Electronic Commerce • Extranetsare private TCP/IP networks designed for outside use by customers, clients and business partners of the organization. • electronic data interchange (EDI - a decade-old set of specifications for ordering, billing, and paying for parts and services over private networks

  17. Intranets, Extranets and Electronic Commerce • Electronic commerce involves business transactions through electronic networks. • Business-to-business (B2B) e-commerce- transactions that involve businesses providing goods or services to other businesses • Business-to-consumer (B2C) e-commerce- transactions that take place on the Internet, rather than an extranet, because consumers don’t have access to private extranets

  18. Web Services • Web services involve new kinds of Web-based applications that can be assembled quickly using existing software components • Examples: • plug a shopping-cart component into an existing Web site • design applications that can be accessed through a variety of Web-enabled devices

  19. The Evolving Internet • Internet2launched by the government and various corporations in 1998 to provide faster network communications for universities and research institutions. • Next Generation Internet (NGI),will consist of a nationwide web of optical fiber integrated with intelligent management software to maintain high-speed connections.

  20. Internet Issues: Ethical and Political Dilemmas • Filtering software to combat inappropriate content • Digital cash to make on-line transactions easier and safer • Encryption software to prevent credit card theft • Digital signatures to prevent email forgery

  21. Internet Everywhere: The Invisible Information Infrastructure • Blurring of the boundaries between the Web and interpersonal communication applications • A variety of Internet appliances, network computers, set-top boxes, PDAs, mobile phones, and other devices connected to the Internet in offices and homes “In the future, everything with a digital heartbeat will be connected to the Internet.” • Scott McNealy, CEO of Sun Microsystems

More Related