互聯(lián)網(wǎng)在日本的發(fā)展趨勢(shì)ppt課件_第1頁(yè)
互聯(lián)網(wǎng)在日本的發(fā)展趨勢(shì)ppt課件_第2頁(yè)
互聯(lián)網(wǎng)在日本的發(fā)展趨勢(shì)ppt課件_第3頁(yè)
互聯(lián)網(wǎng)在日本的發(fā)展趨勢(shì)ppt課件_第4頁(yè)
互聯(lián)網(wǎng)在日本的發(fā)展趨勢(shì)ppt課件_第5頁(yè)
已閱讀5頁(yè),還剩89頁(yè)未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

1、Trends of Internet Use in Japan26 June, 2007Shigeyuki SuzukiFUJITSU LIMITEDFor Educational Use Only0Network of NetworksAccessNetworkSprintC&WUUNETBTAOLT-OnlineBIGLOBEIIJWIDEniftySINETSo-netOCN The Internet1Features of the InternetGlobal NetworkOpen TechnologiesMultimedia-orientedCommon Resources for

2、 Everyone2Basic Internet ApplicationsElectronic MailWorldwide Web(WWW)Network NewsFile Transfer(FTP)Remote Login(TELNET)3Internet Service ProviderInformation ServicesOther ISPsDatabase ServicesLANInternet Service ProviderLANLANServers(, WWW, etc.)RoutersIXInternet Exchange4Low-speed, Character-based

3、Centralized ControlMaster-slave CommunicationsInternet vs. Legacy Online Info. ServicesABCPCPCPCBBS FilesMailbox for AOnline Info. Services CenterAccess Network5Internet vs. Legacy Online Info. ServicesInternetNews FileABCWSMailboxNews FileNews FileWSWSHigh-speed, Multimedia-orientedDistributed Cont

4、rolPeer-to-Peer Communications6IP AddressA unique number to identify a computer connected to the InternetAn IP address consists of 32 bits under the IPv4 architectureAn IP address is divided into four 8-bit sections and is written in four decimal numbers separated by periods. e.g. 6The address space

5、 will be expanded to 128 bits in the future IPv67Domain NameA unique name to identify an organization connected to the Internet e.g. fujitsu fujitsu.co.jp icl.co.ukWith a host name attached before a domain name, it identifies a computer connected to the Internet. e.g. fujitsuDNS(Domain Name System)

6、is a database system to map a domain name(host name) to an IP address.8Internet Host Counts(Millions)Source : Network Wizard433,193,199(Jan. 2007)9Worldwide Internet UsersSource : Internet White Paper 2006 (c) Access Media International,200610Internet Users by RegionWorld Total : 1,000.6million (Dec

7、ember, 2005)Source : Internet White Paper 2006 (c) Access Media International,200611Internet Users by CountryU.S.203.1 millionChina110.1Japan 72.9India 51.5Germany 48.6 U.K. 37.5Korea 33.2Italy 28.3France 26.7Russia 24.5Source : Internet White Paper 2006 (c) Access Media International,200612Internet

8、 User Population & Penetration Rate in Japan(million)(%)(as of December)Source : Ministry of Internal Affairs and Communications13 Internet User Population in Asia Pacific1China110,100,0002Japan72,879,0003India51,500,0004Korea33,200,0005Indonesia18,500,0006Australia13,980,0007Taiwan13,900,0008Malays

9、ia9,978,0009Thai8,396,00010Philippine7,760,00011Pakistan7,390,00012Vietnam5,910,00013Hong Kong4,840,00014New Zealand3,170,00015Singapore2,880,00016Sri Lanka360,00017Bangladesh345,00018Macao240,00019Mongolia227,00020Papua New Guinea225,000Source : Internet White Paper 2006 (c) Access Media Internatio

10、nal,2006Asia Pacific Total : 366.7million (December, 2005)14Spread of Internet by CountrySource : Internet White Paper 2006 (c) Access Media International,200615Market Trends(1)Slowdown of Internet User GrowthUntil 2000 the growth rate had been explosive.Major driving forces were:Spread of all-in-on

11、e PCs (Windows 98SE/Me/XP, WWW browser, 56Kbps modem, Ethernet interface)Reduction of Internet access chargesInternet access with mobile phone16Spread of IT Appliances into HomeSource : Ministry of Internal Affairs and Communications17Comparison of Internet Access Charges Japan(nifty) USA(AOL)Dial-u

12、p 2,000/mo.(=$18*)$25.90/mo.(Unlimited Access) USA(AT&T)ADSL 3,000/mo.(=$27*) $14.95/mo. (Upstream:1Mbps (Upstream:128Kbps Downstream:8 - 40Mbps) Downstream:768Mbps) $24.99/mo. (Upstream:512Kbps Downstream:3Mbps)FTTH 6,170/mo.(=$56*) (100Mbps) (*) $=11018Shift to Broadband AccessBroadband access net

13、works such as CATV, ADSL, and FTTH Diversified Access NetworksWired : PSTN, ISDN, CATV, ADSL, FTTHWireless : Cellular mobile, satellite, 3rd generation mobile (IMT 2000), wireless LAN(IEEE 802.11.b/g/a)Market Trends(2)19Transition of Internet Access From HomeSource : Ministry of Internal Affairs and

14、 Communications20Broadband Households in JapanSource : Ministry of Internal Affairs and Communications14.2 mil. (Dec. 06)3.6 mil. (Dec. 06)7.9mil. (Dec. 06)(million)21Variety of Internet Access NetworksTransmission speed(bps)10K100K1M10M100MLeased line/ISDNADSLCATVPDCPHS64 - 128KcdmaOne64KIMT-2000WL

15、LSatelliteWLL:Wireless Local LoopIMT-2000 : International Mobile Telecommunications 2000PDC:Personal Digital CellularADSL:Asymmetric Digital Subscriber LineWirelessWiredFTTHFTTH:Fiber To The Home22Mobile Internet Services in JapanMobile Telephone Users (May, 2007) 97.6MDoCoMo52.8Mau28.6MSoftBank Mob

16、ile16.2MMobile Internet users (May, 2007) 85.2MDoCoMo (i-mode)47.7Mau (EZweb) 23.9MSoftBank Mobile13.6MSource: TCA (Telecommunications Carriers Association)23Internet Access via CATV NetworkRouterHeadEndCableMODEMInternetCableNetworkCATV CenterHome30Mbps Transmission speed:Upstream : max. 10Mbps, Do

17、wnstream : max. 30Mbps Monthly charge:4,0005,00024Internet Access via SatelliteProxyServerISP(Terrestrial Network)InformationServerThe InternetPSTN/ISDNUplink CenterDown-stream:30Mbps(shared)Individual UserCorporate UserRequest for InformationUp-stream is via ISP Network25ADSLNTT Central OfficeHome/

18、OfficeMetallic lines(1 pair)RouterCO SwitchUp:1MbpsDown: 40MbpsDSLAMADSLMODEMSplitterDSLAM : Digital Subscriber Line Access Multiplexer Internet connection via an existing telephone line Transmission speed : Upstream : max.1Mbps, Downstream : max.40Mbps Monthly charge : 3,000 (ISP charge included)(A

19、DSL:Asymmetric Digital Subscriber Line)26FTTH NTT Central OfficeHome/OfficeFiber Optic CableRouterUp:100Mbps(max.)Down: 100Mbps(max.)LAN SWMediaConverterCO SwitchMetallic lines(1 pair) Internet access via fiber optic cable User Interface is either 10Mbps or 100Mbps. 100Mbps(home use) : 6,170*/mo.*)I

20、SP charge is not included.(FTTH:Fiber To The Home)27IMT-2000(3rd Generation Mobile)IMT-2000(International Mobile Telecommunication 2000) - 3rd generation mobile communications systems using international standard - Transmission speed: In moving cars/trains : 144kbps, Walking : 384kbps, Still : 2Mbps

21、 - NTT DoCoMo : Launched commercial services October, 2001. Currently about 37.1 million subscribers. - au(KDDI Group) : Started commercial services April 2002. Currently about 27.9 million subscribers. - Vodafone : Started commercial services December 2002. Currently about 8.7 million subscribers.2

22、8Wireless LANAccessPointHome/OfficePublic Place(e.g. railway station, airport)ISPBroadband Connection(ADSL, FTTH)11/54Mbps(max.)Radio frequency band : 2.4GHz(IEEE 802.11.b/g), 5GHz(802.11.a)Transmission Speed : 11Mbps(b), 54Mbps(a/g)29Market Trends(3)Diversified Internet Access DevicesPDA, Game mach

23、ine, Mobile telephone, (Word processor, Internet TV)Multimedia-oriented ApplicationsJava : animations, realtime data transferWindows Media Player/Real Player : Video/audio on demandInternet Phone : IP Telephony (VoIP)VoIP : Voice over IP30Variety of Internet Access DevicesMobile Phone only19.2 milli

24、onPC only15.8 millionMobile Phone & PC48.6 millionGame Machine1.6 millionPC Users66.0 millionMobile Phone Users69.2 millionSource : Ministry of Internal Affairs and Communications31Subscribers of the InternetSource : Ministry of Internal Affairs and CommunicationsNo. of Subscribers (in millions)32Mo

25、bile Phone/Internet UsersSource: TCA (Telecommunications Carriers Association)33Spread of IP TelephonyNo. of Subscribers (in millions)Source : Ministry of Internal Affairs and Communications34New Services/BusinessesWWW Search Engine : Yahoo!, Google, Infoseek, Excite, etc.Electronic Commerce : Onlin

26、e shopping, EDIBlog (Weblog)SNS (Social Network Service)Intranet/Extranet ApplicationsUse of Internet technologies in corporate information network systemsMarket Trends(4)EDI : Electronic Data Interchange 35Use of the Internet from PCs(%)Multiple answersSource: Ministry of Internal Affairs and Commu

27、nications36Use of the Internet from Mobile Phone(%)Multiple answersSource: Ministry of Internal Affairs and Communications37Web 2.0The Internet is “SOCIAL MEDIASource: Dion Hinchcliffes Web2.0 Blog38Blog (Weblog)A weblog, which is usually shortened to blog, is a website where regular entries are mad

28、e (such as in a journal or diary) and presented in reverse chronological order. Blogs often offer commentary or news on a particular subject, such as food, politics, or local news; some function as more personal online diaries. A typical blog combines text, images, and links to other blogs, web page

29、s, and other media related to its topic. Most blogs are primarily textual although many focus on photographs, videos or audio.Source: Wikipedia39Blog Posts by LanguageSource: “The State of the Live Web, April 2007 TechnoratiJapanese37%English36%Chinese8%Italian3%Spanish3%40SNS (Social Networking Ser

30、vice)Social networking is a category of Internet applications to help connect friends, business partners, or other individuals together using a variety of tools. These applications, known as online social networks are becoming increasingly popular.Most social network services are primarily web based

31、 and provide a collection of various ways for users to interact, such as chat, messaging, , video, voice chat, file sharing, blogging, discussion groups, and so on.Source: Wikipedia41Second LifeSecond Life is an Internet-based virtual world developed by Linden Research, Inc. A downloadable client pr

32、ogram enables its users, called Residents, to interact with each other through motional avatars, providing an advanced level of a social network service combined with 3D virtual spaces. Residents can explore, meet other Residents, socialize, participate in individual and group activities, create and

33、 trade items (virtual property) and services from one another.Source: Wikipedia42Electronic Commerce (B2B)(trillion yen)Source:2006 White Paper Information & Communications in Japan43Electronic Commerce (B2C)(billion yen)Source:2006 White Paper Information & Communications in Japan44The Long TailTra

34、ditional Market80% of Sales comes 20% of productsTOP 20%of productsOther products (80%)The Long TailAddress wide variety demandAmazon, Inc. earns1/3 of its sales from“The Long Tail area.Sales45Goods Purchased via Net Shopping(%)Source:2006 White Paper Information & Communications in Japan46Goods Bou

35、ght/Sold via Net Auction(%)Answers from experienced usersMultiple answersSource:2006 White Paper Information & Communications in Japan47Impediments to Net Shopping(%)Answers from inexperienced usersMultiple answersSource : Internet White Paper 2006 (c) Access Media /impress R&D,200648Issues about Ne

36、twork SecurityUnauthorized access using a stolen passwordStealing and crashing data files by invalid access to ISPs serversWiretapping of data transmitted on the InternetSoftware/data files infected with computer virusAttack to ISPs servers by /packet floodPhishingPharming49Phishing (Fishing)In comp

37、uting, phishing is a criminal activity using social engineering techniques. Phishers attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out

38、by or instant messaging, and often directs users to give details at a website, although phone contact has been used as well. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, and technical measures.Source : Wikipedia50Technique of Phishing se

39、nders server senderReal web site of bank, credit card company, etc. serverof recipientAccount no., etc. urging toenter account no., etc.Personal information such as account no. Falsely claiming to be a real bank and so on, send an asking for entering personal information such as account no. due to r

40、enewal of the system. Show a web link to direct the recipient to a false web site that is set up to steal the personal information.51Damage of PhishingApproximately 5.7 million people received phishing mails.19% of the phishing mail recipients (about 1.1 million) actually accessed false web sites. 3

41、% (about 1.8 million) of the recipients entered personal information.Financial damage of banks and credit companies amounted to 1.2 billion dollars.Estimation by the Gartner Group based on the hearing from 5,000 Internet users in the U.S.A. between the second half of 2003 and the first half of 2004.

42、 52Pharming (Farming)Similar in nature to phishing, pharming seeks to obtain personal or private (usually financial related) information through domain spoofing. Rather than being spammed with malicious and mischievous requests for you to visit spoof Web sites which appear legitimate, pharming poiso

43、ns a DNS server by infusing false information into the DNS server, resulting in a users request being redirected elsewhere. Your browser, however will show you are at the correct Web site, which makes pharming a bit more serious and more difficult to detect. Phishing attempts to scam people one at a

44、 time with an while pharming allows the scammers to target large groups of people at one time through domain spoofing. Source : Webopedia Computer Dictionary53Reporting of Computer Virus InfectionSource:2006 White Paper Information & Communications in Japan54Internet vs. IntranetWWW BrowserInhouse W

45、WWServerCorporate Applications ServersIntranet(LAN-WAN-LAN)FirewallInternetPublic ServerProxy ServerMail ServerNews ServerDNS Server etc.55FirewallA system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combinati

46、on of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the

47、 specified security criteria.56Remote Access to Corporate NetworkCustomers Data CenterRouterServersIntranetFENICSRemote LAN Access NetworkACE ServerTunnelingGWCellular PhonePHS123456Secure IDAPPSTNISDNDial-upRouterModemTACallers number CheckOnetime PasswordNetwork Monitoring Center24 hours/365 daysA

48、dministrationServerAuthenticationAdministratorPSTNISDNModem/TA(RADIUS)57Security TechnologiesEncryptionto protect from loss of privacyDigital Signatureto protect from loss of integrityAuthenticationto protect from spoofing58Encryption MethodsSecret- key(Symmetrical) cryptographyThe same key is used

49、to encrypt and decrypt e.g. DES(Data Encryption Standard)Public-key cryptographyA pair of keys, public and private keys, are used.A sender encrypts a message with the receivers public key and that message can only be decrypted with the receivers private key. e.g. RSA59Privacy-Enhanced Mail(PEM)DESDE

50、SRSARSA1. Encrypt a message with a data encryption key(DES)2. “A encrypts the data encryption key with “Bs public key. (RSA)3. “B decrypts the data encryption key with “Bs private key.(RSA)4. “B decrypts the message with the decrypted data encryption key(DES)Hello!?!*&#Bs public keyBs private keyDat

51、a Encryption KeyABHello!Data Encryption Key60Digital SignatureRSARSA1. “A creates a message digest(MD).2. “A encrypts the MD with “As private key(RSA). Digital Signature3. “B decrypts the MD with “As public key(RSA) and restore the MD.4. “B creates a message digest using the message that “B received

52、 separately.5. Compare the restored MD and the MD that “B created.?!*&#As public keyAs private keyABCreateMessage DigestCompareHello!Hello!AMessage Digest(MD)Message Digest(MD)HelloACreateMessageDigestHello!61SpoofingPurchase OrderI am A.AABBInvalid signatureInvoiceTo: AThis is As public key.?AB1. P

53、erson “B pretends to be Person “A using Bs private and public keys.2. “B places an order with a forged signature.3. Sellers authentication system understands “A placed the order and sends an invoice to “A.AuthenticationSystem62WCertificate AuthorityRSARSAAWAAAWWCertificateABCA(Certificate Authority)

54、WCAs private key CAs public keyDigital SignatureRegistration1. Sender “A registers his public key to the CA.2. The CA creates a digital signature with its private key and issues a certificate.3. If Receiver “B can decrypt the certificate with the CAs public key, it is authentic.63Troubles Related to

55、 Internet UsePosting harmful messages to BBSDamage someones reputation or credibilitySpam mail(unsolicited bulk mail)Problems related to home page contentPornographyInfringement of third partys copyright, trademarkInvasion of privacyUnlawful business64Domain Name DisputesCollision of domain nameShor

56、tage of name spaceTroubles related to trademarksmcdonaldmatsuzakaya.co.jpNeed for creating new gTLDs*Conventional gTLDs : , .org, .net, .gov, .edu, .mil, .intNew gTLDs : .aero, .biz, .info, .coop, .museum, .name, .pro(*)gTLDs : generic Top Level Domains65Internet Use in BusinessStrengthen the compan

57、ys core businessCommunications with clients/suppliersPublish information outsideIncrease efficiency of white-collarsIntra-company communicationsInformation gathering from the outsideInformation sharing among employeesExplore new business opportunitiesOnline shopping, online publishing, etc.66Example

58、s of Internet Use in Business(1/4)Public RelationsAdvertisement-Publication of corporate info.-Notification of events-Globalization-Reduced cost-QuicknessPersonnel-Recruitment-Reduced cost-Two-way commu- nicationSales-Electronic catalog-Online shopping-Reduced cost-GlobalizationDepartmentApplication

59、sEffect- Strengthen Core Business -67Examples of Internet Use in Business(2/4)Purchasing-Globalization-Reduced cost-2-way communi- cationCustomerSupport-Frequently asked questions(FAQ) -Procurement of components and softwareDepartmentApplicationsEffect- Strengthen Core Business -68Examples of Intern

60、et Use in Business(3/4)Personnel -Notice of organizational changes-Notice of personnel shift-Paperless-QuicknessGeneralAffairs-Electronic telephone directory-Directions to officesSales-Various notices-New products information-Communications with customers-QuicknessDepartmentApplicationsEffect-Paperl

溫馨提示

  • 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

最新文檔

評(píng)論

0/150

提交評(píng)論