Beekman5 std ppt_11

22
2002 Prentice Hall Chapter 11 From Internet to Information Infrastructure

description

 

Transcript of Beekman5 std ppt_11

Page 1: Beekman5 std ppt_11

2002 Prentice Hall

Chapter 11

From Internet to Information

Infrastructure

Page 2: Beekman5 std ppt_11

2002 Prentice Hall 2

Topics

Internet Applications: Communication and ConnectionThe Evolving InternetInternet2 and the Next Generation InternetInternet Issues: Ethical and Political DilemmasInternet Everywhere: The Invisible Information InfrastructureCyberspace: The Electronic Frontier

Page 3: Beekman5 std ppt_11

2002 Prentice Hall 3

Internet Applications: Communication and Connection

Search engines are designed to make it easier to find information on the Web.

web crawlers or spiders --software robots that systematically search the web

Page 4: Beekman5 std ppt_11

2002 Prentice Hall 4

Search Engines

Some search engines use keywords and Boolean logic to conduct searches

Page 5: Beekman5 std ppt_11

2002 Prentice Hall 5

Search Engines

Other search engines allow searches by using a hierarchical directory or subject tree

Page 6: Beekman5 std ppt_11

2002 Prentice Hall 6

Portals

Web entry stations that offer quick and easy access to a variety of services. Consumer portals includes search engines, email services,

chat rooms, references, news and sports headlines, shopping malls and other services

Corporate portals on intranets serve the employees of particular corporations

Vertical portals are targeted at members of a particular industry or economic sector

Page 7: Beekman5 std ppt_11

2002 Prentice Hall 7

Rules of Thumb: Working the Web

Handle URLs with care.Get to know your search engines.If you’re in a hurry, dispense with frills.Organize your favorite bookmarks.Be selective.

Protect your privacy.Be conscious of cookies.Shop with bots.Shop smart.Remember why you’re there.Think before you publish.

Page 8: Beekman5 std ppt_11

2002 Prentice Hall 8

Email on the Internet

What appears on the screen depends on the type of Internet connection you have and the mail program you use.

Popular graphical email programs include Eudora, Outlook and Netscape Communicator.

Page 9: Beekman5 std ppt_11

2002 Prentice Hall 9

Email on the Internet

Email formats include:

ASCII text--can be viewed by any mail client program

HTML--displays text formatting, pictures, and links to Web pages

Page 10: Beekman5 std ppt_11

2002 Prentice Hall 10

Mailing Lists & Network News

Mailing lists allow you to participate in email discussion groups on special-interest topics.

A newsgroup is a public discussion on a particular subject consisting of notes written to a central Internet site and redistributed through a worldwide newsgroup network called Usenet

Page 11: Beekman5 std ppt_11

2002 Prentice Hall 11

Real-Time Communication

Users are logged in at the same time.

Instant Messaging for exchanging instant messages with on-line friends and co-workers

Internet telephony (IP telephony) for long-distance toll-free telephone service

Videoconferencing for two-way meetings

Page 12: Beekman5 std ppt_11

2002 Prentice Hall 12

Rules of Thumb: Netiquette

Say what you mean and say it with care.Keep it short and to the point.Proofread yours messages.Learn the “nonverbal” language of the Net.Keep your cool.Don’t be a source of spam (Internet junk mail).Lurk before you leap.Check your FAQs.Give something back.

Page 13: Beekman5 std ppt_11

2002 Prentice Hall 13

Push Technology

The Web was built with pull technology—browsers on client computers “pull” information from server machines. Browser asks for information

With push technology, information is delivered automatically to the client computer. New product descriptions Automatic software upgrades Updated news

Page 14: Beekman5 std ppt_11

2002 Prentice Hall 14

Peer-to-Peer and Grid Computing

Peer-to-Peer (P2P) computing - users share music, movies, and other files without going through a central directory.

Grid computing - anyone can plug in from anywhere and rent processing power and software from anywhere on the Net

Page 15: Beekman5 std ppt_11

2002 Prentice Hall 15

Intranets, Extranets and Electronic Commerce

Intranets are self-contained intra-organizational networks that offer email, newsgroups, file transfer, Web publishing and other Internet-like services.

Firewalls prevent unauthorized communication and secure sensitive internal data

Page 16: Beekman5 std ppt_11

2002 Prentice Hall 16

Intranets, Extranets and Electronic Commerce

Extranets are private TCP/IP networks designed for outside use by customers, clients and business partners of the organization. electronic data interchange (EDI - a decade-old set

of specifications for ordering, billing, and paying for parts and services over private networks

Page 17: Beekman5 std ppt_11

2002 Prentice Hall 17

Intranets, Extranets and Electronic Commerce

Electronic commerce involves business transactions through electronic networks. Business-to-business (B2B) e-commerce - transactions that

involve businesses providing goods or services to other businesses

Business-to-consumer (B2C) e-commerce - transactions that take place on the Internet, rather than an extranet, because consumers don’t have access to private extranets

Page 18: Beekman5 std ppt_11

2002 Prentice Hall 18

Web Services

Web services involve new kinds of Web-based applications that can be assembled quickly using existing software components

Examples: plug a shopping-cart component into an existing Web

site design applications that can be accessed through a

variety of Web-enabled devices

Page 19: Beekman5 std ppt_11

2002 Prentice Hall 19

The Evolving Internet

Internet2 launched by the government and various corporations in 1998 to provide faster network communications for universities and research institutions.

Next Generation Internet (NGI), will consist of a nationwide web of optical fiber integrated with intelligent management software to maintain high-speed connections.

Page 20: Beekman5 std ppt_11

2002 Prentice Hall 20

Internet Issues: Ethical and Political Dilemmas

Filtering software to combat inappropriate content

Digital cash to make on-line transactions easier and safer

Encryption software to prevent credit card theft

Digital signatures to prevent email forgery

Page 21: Beekman5 std ppt_11

2002 Prentice Hall 21

Internet Everywhere: The Invisible Information Infrastructure

Blurring of the boundaries between the Web and interpersonal communication applications

A variety of Internet appliances, network computers, set-top boxes, PDAs, mobile phones, and other devices connected to the Internet in offices and homes

“In the future, everything with a digital heartbeat will be connected to the Internet.”

Scott McNealy, CEO of Sun Microsystems

Page 22: Beekman5 std ppt_11

2002 Prentice Hall 22