Internet Technology And Web Browsers Essay

1764 words - 8 pages

Internet Technology and Web Browsers

American Military University


How internet technology and web browsers have affected our daily lives. Today the internet touches every corner of the globe, and often is the main way an everyday person obtains information and communicates at home, school, or place of business. We can see how internet technology affects the entire globe by just a few simple clicks of a mouse or a simple touch of a screen with in a web browser to see a webcam in the arctic to teaching school kids in India. None of this would be possible without the idea of them being able to create hardware to connect computers to share ...view middle of the document...

So much has this technology become part of our lives according to this website(http://www.thecultureist.com/2013/05/09/how-many-people-use-the-internet-more-than-2-billion-infographic/) there are more than two billion people who use the internet every day. These were just some examples of on a LAN/WAN/MAN slowly crept into our lives to become essential to everyday use.
Local area network consists of two or more computers connected together using network interface cards via a medium (cable or wireless) to pass information to one another. LAN is a type of network is limited geographical size ranging from an office space, classroom, house, or within the proximity of a building. Also this type of network is considered to have high connection speeds ranging from megabytes to gigabytes, because there is not as much loss of signal do to the range the signal will have to travel. How you can define a LAN it comes in many parts. Breaking down some of those parts we will look at what a topology is and how it affects a network. There are two types of topologies a physical topology and logical topology. A physical topology refers to how the computers are physically connected to make the shape of the network. Some examples of physical topologies consist of a bus(backbone topology with no extra hardware needed to connect the computers together), star (central connecting point such as a hub/switch/router to channel broadcast information in the right path), ring (connects computers in a ring directly to one another regenerating the message to pass on to the next computer if not intended for that computer), mesh (computers are directly connected to one another like the ring, but this type has more redundancy ensuring message gets passed on), and hybrid that combines different physical topologies together. These examples of physical topologies are all connected using a physical cabling such as unshielded twisted pair, coaxial cable, fiber optic, and the one connection that doesn’t have a cable a wireless connection. All of these types are governed by the industry standard of Institute of Electrical Electronics Engineers (IEEE) which focus on the lower two layers of the OSI model (physical and data link). For each of these types of cables here the IEEE 802.3 or the IEEE 802.5 standard each can be associated with the type of network, and the amount of data the computers can pass to other computers on the network. All the different types of cable connections has a data speed range from 4 Mbps to 10 Gbps depending on the network configuration and cabling used. One more IEEE standard can be used to physically connect a LAN together, and it is the IEEE 802.11 wireless. Wireless network right now has the ability to transfer data at speeds of 11 Mbps to 300 Mbps depending on what generation of the IEEE 802.11 (b,g,n) variation is used. There is a future variant to that standard that is coming online this year IEEE 802.11 ac that is boasting a 1.3 Gbps data transfer...

Other assignments on Internet Technology And Web Browsers

Unit 5 Assignment 2 Define An Acceptable Use Policy (Aup)

339 words - 2 pages quadrating for unknown file types - Disablement for ping, probing, and port scanning on all exterior IP devices - Denying of outbound traffic using source IP addresses - Apply file transfer monitoring, scanning and alarming for unknown file types Web Surfing is the usage of the internet browsing a series of web browsers For Security (Administrators and Managers) - Apply domain-name content filtering at the internet entry/access point - Employees

10 Major Advantages Of Html5 Essay

889 words - 4 pages , User interface enhancements and reduced need for JavaScript (only needed in browsers that don’t support form types). There will be different type of text inputs, search and different fields for different purpose. 5. Consistency As websites adopt the new HTML5 elements we will see more greater consistency in terms of the HTML used to code a web page on one site compared to another. This will make it more easier for designers and developers to

Communication And Information Technology Paper

1137 words - 5 pages Internet is possible through different devices in addition to the traditional PC, such as mobile phones, digital televisions, and information booths. Specialized interfaces are needed for people with limited functionality; audio and virtual reality navigation around web pages. Speech control of browsers; for people with sight impairment - adjustable screens; for people with cognitive impairments these are intelligent agents that help to browse the

Effects Of Smart Phones In The Society

1218 words - 5 pages cameras with other mobile applications which can make it easier for journalism. Smart phones can eliminate the role of the powerful cameras used by journalist. This is because its technology can capture the news and reports and post them to the internet. Therefore, smart phones can provide a more point of view on some events such as crimes and national disasters. This can merge the thin line between a journalist and a consumer (Rauch, 2005). When one

Internet Income Incentive

861 words - 4 pages 1.0 Introduction “Information is a source of learning. But unless it is organized, processed, and available to the right people in a format for decision making, it is a burden, not a benefit.” – William Pollard. Nowadays, the way of business has been changed. Everyone talk about internet marketing. Hence, what is internet marketing? Internet marketing also known as online or web marketing, is referred to people sell their products or

Project Part 2 It Security

953 words - 4 pages to protect against malicious code use technology, policies and procedures, and training, all applied in a layered manner from perimeters inward to hosts and data. The controls are of the preventative and detective/corrective variety. Controls are applied at the host, network, and user levels: Host Level * Host hardening, including patch application and security-minded configurations of the operating system (OS), browsers, and other

Dsc340

2104 words - 9 pages transfer protocol- Web browsers and Web servers to communicate. Protocol: communication by defining the format of data and rules for exchange File transfer protocol(FTP): transfer protocol-copy files-one computer to other. Load balancing:distributing workload. Fault

(Chapter 6) Data Communications: Delivering Information

4052 words - 17 pages for Assigned Names and Numbers (ICANN) * 208.77.188.166 * Uniform Resource Locators (URL): Addresses used by Web browsers to identify location of a particular Web page * Address of a document or site on the Internet * http://www.ndsu.edu/new_students/application.pdf * Suffix indicating the top-level domain (TLD) * .edu means it is an educational institution What are the two types of top level domains

Multi-Layers Security

1139 words - 5 pages errors, usually in software and applications-appear every day. These vulnerabilities may be triggered passively during routine system operation or actively either by malicious users or even automated malicious code. According to the most recent Internet Security Threat Report from Symantec Corp., nearly 2,500 vulnerabilities were documented just in the first six months of 2007. Vulnerabilities in Web applications and Web browsers represent one

Ecomerce

1829 words - 8 pages processing and information flow between two or more organizations  intraorganizational information systems Communication systems that enable ecommerce activities to go on within individual organizations 1-13 The EC Framework, Classification, and Content  intranet An internal corporate or government network that uses Internet tools, such as Web browsers, and Internet protocols  extranet A network that uses the Internet to link multiple intranets

Information Technology Acts Paper

576 words - 3 pages Information Technology Acts Paper Advances in technology made it possible to obtain almost any information needed by accessing the World Wide Web. These advances have also paved the way for predators and unwarranted solicitors to retrieve private information. Most homes are either equipped with or have access to a computer and Internet. This technology used to be reserved for the government and businesses but is readily available for the

Similar Documents

The Internet Will Bring About A New Freedom Of Information And So Narrow The Technology Gap Between Developed And Developing Countries

415 words - 2 pages The Internet will bring about a new freedom of information and so narrow the technology gap between developed and developing countries. The Internet has emerged as the most rapidly adopted communication mean in history. For the last decades it has built bridges between almost all corners of the world and created the greatest depository of all kinds of information. Access to these new technologies enabled rapid development of all countries

The States Siide Essay

576 words - 3 pages THE STATES SIDE Microsoft has clearly mistreated monopoly influence in its usage of its operating system. The fact that Microsoft bundled Internet Explorer with its Windows system without a doubt gave them an advantage over the web browser market; given that many businesses, households and even PDA computers have the Window Software. Microsoft made other web browsers slow even over a modem. To give them a way out of monopolistic illegal

Lab Course Go Virtual Essay

631 words - 3 pages use of a computer connected to the Internet to allow students to carry out experimental studies in a remotely located physical laborato- ry. Permitting students to operate real laborato- ries at any time, from anywhere, using stan- dard, digital communication software such as Web browsers is a burgeoning topic as Interest increases in remote control and maintenance. This approach also permits a teacher and stu- dents at another institution

European Union Essay

391 words - 2 pages Microsoft Faces Large EU Fine Summary The European Union (EU) continues on its path of not being very popular with outside countries. Recently, the EU filed a formal complaint against Microsoft Corp. for failing to keep a promise that was made three years ago. Microsoft was supposed to offer alternative web browsers in the newest version of Windows for users in Europe. This is not the first time the EU has had an issue with Microsoft, and I