互联网在日本的发展趋势(1).ppt

上传人:仙人指路1688 文档编号:2696531 上传时间:2023-02-22 格式:PPT 页数:94 大小:3.20MB
返回 下载 相关 举报
互联网在日本的发展趋势(1).ppt_第1页
第1页 / 共94页
互联网在日本的发展趋势(1).ppt_第2页
第2页 / 共94页
互联网在日本的发展趋势(1).ppt_第3页
第3页 / 共94页
互联网在日本的发展趋势(1).ppt_第4页
第4页 / 共94页
互联网在日本的发展趋势(1).ppt_第5页
第5页 / 共94页
点击查看更多>>
资源描述

《互联网在日本的发展趋势(1).ppt》由会员分享,可在线阅读,更多相关《互联网在日本的发展趋势(1).ppt(94页珍藏版)》请在三一办公上搜索。

1、Trends of Internet Use in Japan,26 June,2007Shigeyuki SuzukiFUJITSU LIMITED,For Educational Use Only,1,Network of Networks,AccessNetwork,Sprint,C&W,UUNET,BT,AOL,T-Online,BIGLOBE,IIJ,WIDE,nifty,SINET,So-net,OCN,The Internet,2,Features of the Internet,Global NetworkOpen TechnologiesMultimedia-oriented

2、Common Resources for Everyone,3,Basic Internet Applications,Electronic MailWorldwide Web(WWW)Network NewsFile Transfer(FTP)Remote Login(TELNET),4,Internet Service Provider,Information Services,Other ISPs,Database Services,LAN,Internet Service Provider,LAN,LAN,Servers(E-mail,WWW,etc.),Routers,IX,Inte

3、rnet Exchange,5,Low-speed,Character-basedCentralized ControlMaster-slave Communications,Internet vs.Legacy Online Info.Services,A,B,C,PC,PC,PC,BBS Files,Mailbox for A,Online Info.Services Center,Access Network,6,Internet vs.Legacy Online Info.Services,Internet,News File,A,B,C,WS,Mailbox,News File,Ne

4、ws File,WS,WS,High-speed,Multimedia-orientedDistributed ControlPeer-to-Peer Communications,7,IP Address,A unique number to identify a computer connected to the InternetAn IP address consists of 32 bits under the IPv4 architectureAn IP address is divided into four 8-bit sections and is written in fou

5、r decimal numbers separated by periods.e.g.204.248.24.16The address space will be expanded to 128 bits in the future IPv6,8,Domain Name,A unique name to identify an organization connected to the Internet e.g.fujitsu.co.jp icl.co.ukWith a host name attached before a domain name,it identifies a comput

6、er connected to the Internet.e.g.DNS(Domain Name System)is a database system to map a domain name(host name)to an IP address.,9,Internet Host Counts,(Millions),Source:Network Wizard,433,193,199(Jan.2007),10,Worldwide Internet Users,Source:Internet White Paper 2006(c)Access Media International,2006,1

7、1,Internet Users by Region,World Total:1,000.6million(December,2005),Source:Internet White Paper 2006(c)Access Media International,2006,12,Internet Users by Country,U.S.203.1 millionChina110.1Japan 72.9India 51.5Germany 48.6 U.K.37.5Korea 33.2Italy 28.3France 26.7Russia 24.5,Source:Internet White Pa

8、per 2006(c)Access Media International,2006,13,Internet User Population&Penetration Rate in Japan,(million),(%),(as of December),Source:Ministry of Internal Affairs and Communications,14,Internet User Population in Asia Pacific,Source:Internet White Paper 2006(c)Access Media International,2006,Asia P

9、acific Total:366.7million(December,2005),15,Spread of Internet by Country,Source:Internet White Paper 2006(c)Access Media International,2006,16,Market Trends(1),Slowdown of Internet User GrowthUntil 2000 the growth rate had been explosive.Major driving forces were:Spread of all-in-one PCs(Windows 98

10、SE/Me/XP,WWW browser,56Kbps modem,Ethernet interface)Reduction of Internet access chargesInternet access with mobile phone,17,Spread of IT Appliances into Home,Source:Ministry of Internal Affairs and Communications,18,Comparison of Internet Access Charges,Japan(nifty)USA(AOL)Dial-up 2,000/mo.(=$18*)

11、$25.90/mo.(Unlimited Access)USA(AT&T)ADSL 3,000/mo.(=$27*)$14.95/mo.(Upstream:1Mbps(Upstream:128Kbps Downstream:8-40Mbps)Downstream:768Mbps)$24.99/mo.(Upstream:512Kbps Downstream:3Mbps)FTTH 6,170/mo.(=$56*)(100Mbps),(*)$=110,19,Shift to Broadband AccessBroadband access networks such as CATV,ADSL,and

12、 FTTH Diversified Access NetworksWired:PSTN,ISDN,CATV,ADSL,FTTHWireless:Cellular mobile,satellite,3rd generation mobile(IMT 2000),wireless LAN(IEEE 802.11.b/g/a),Market Trends(2),20,Transition of Internet Access From Home,Source:Ministry of Internal Affairs and Communications,21,Broadband Households

13、 in Japan,Source:Ministry of Internal Affairs and Communications,14.2 mil.(Dec.06),3.6 mil.(Dec.06),7.9mil.(Dec.06),(million),22,Variety of Internet Access Networks,Transmission speed(bps),10K,100K,1M,10M,100M,Leased line,Tel/ISDN,ADSL,CATV,PDC,PHS64-128K,cdmaOne64K,IMT-2000,WLL,Satellite,WLL:Wirele

14、ss Local Loop,IMT-2000:International Mobile Telecommunications 2000,PDC:Personal Digital Cellular,ADSL:Asymmetric Digital Subscriber Line,Wireless,Wired,FTTH,FTTH:Fiber To The Home,23,Mobile Internet Services in Japan,Mobile Telephone Users(May,2007)97.6MDoCoMo52.8Mau28.6MSoftBank Mobile16.2MMobile

15、Internet users(May,2007)85.2MDoCoMo(i-mode)47.7Mau(EZweb)23.9MSoftBank Mobile13.6M,Source:TCA(Telecommunications Carriers Association),24,Internet Access via CATV Network,Router,HeadEnd,CableMODEM,Internet,CableNetwork,CATV Center,Home,30Mbps,Transmission speed:Upstream:max.10Mbps,Downstream:max.30M

16、bps Monthly charge:4,0005,000,25,Internet Access via Satellite,ProxyServer,ISP(Terrestrial Network),InformationServer,The Internet,PSTN/ISDN,Uplink Center,Down-stream:30Mbps(shared),Individual User,Corporate User,Request for Information,Up-stream is via ISP Network,26,ADSL,NTT Central Office,Home/Of

17、fice,Metallic lines(1 pair),Router,CO Switch,Up:1MbpsDown:40Mbps,DSLAM,ADSLMODEM,Splitter,DSLAM:Digital Subscriber Line Access Multiplexer,Internet connection via an existing telephone line Transmission speed:Upstream:max.1Mbps,Downstream:max.40Mbps Monthly charge:3,000(ISP charge included),(ADSL:As

18、ymmetric Digital Subscriber Line),27,FTTH,NTT Central Office,Home/Office,Fiber Optic Cable,Router,Up:100Mbps(max.)Down:100Mbps(max.),LAN SW,MediaConverter,CO Switch,Metallic lines(1 pair),Internet access via fiber optic cable User Interface is either 10Mbps or 100Mbps.100Mbps(home use):6,170*/mo.,*)

19、ISP charge is not included.,(FTTH:Fiber To The Home),28,IMT-2000(3rd Generation Mobile),IMT-2000(International Mobile Telecommunication 2000)-3rd generation mobile communications systems using international standard-Transmission speed:In moving cars/trains:144kbps,Walking:384kbps,Still:2Mbps-NTT DoC

20、oMo:Launched commercial services October,2001.Currently about 37.1 million subscribers.-au(KDDI Group):Started commercial services April 2002.Currently about 27.9 million subscribers.-Vodafone:Started commercial services December 2002.Currently about 8.7 million subscribers.,29,Wireless LAN,AccessPo

21、int,Home/OfficePublic Place(e.g.railway station,airport),ISP,Broadband Connection(ADSL,FTTH),11/54Mbps(max.),Radio frequency band:2.4GHz(IEEE 802.11.b/g),5GHz(802.11.a)Transmission Speed:11Mbps(b),54Mbps(a/g),30,Market Trends(3),Diversified Internet Access DevicesPDA,Game machine,Mobile telephone,(W

22、ord processor,Internet TV)Multimedia-oriented ApplicationsJava:animations,realtime data transferWindows Media Player/Real Player:Video/audio on demandInternet Phone:IP Telephony(VoIP),VoIP:Voice over IP,31,Variety of Internet Access Devices,Mobile Phone only19.2 million,PC only15.8 million,Mobile Ph

23、one&PC48.6 million,Game Machine1.6 million,PC Users66.0 million,Mobile Phone Users69.2 million,Source:Ministry of Internal Affairs and Communications,32,Subscribers of the Internet,Source:Ministry of Internal Affairs and Communications,No.of Subscribers(in millions),33,Mobile Phone/Internet Users,So

24、urce:TCA(Telecommunications Carriers Association),34,Spread of IP Telephony,No.of Subscribers(in millions),Source:Ministry of Internal Affairs and Communications,35,New Services/BusinessesWWW Search Engine:Yahoo!,Google,Infoseek,Excite,etc.Electronic Commerce:Online shopping,EDIBlog(Weblog)SNS(Socia

25、l Network Service)Intranet/Extranet ApplicationsUse of Internet technologies in corporate information network systems,Market Trends(4),EDI:Electronic Data Interchange,36,Use of the Internet from PCs,(%),Multiple answers,Source:Ministry of Internal Affairs and Communications,37,Use of the Internet fr

26、om Mobile Phone,(%),Multiple answers,Source:Ministry of Internal Affairs and Communications,38,Web 2.0,The Internet is“SOCIAL MEDIA”,Source:Dion Hinchcliffes Web2.0 Blog,39,Blog(Weblog),A weblog,which is usually shortened to blog,is a website where regular entries are made(such as in a journal or di

27、ary)and presented in reverse chronological order.Blogs often offer commentary or news on a particular subject,such as food,politics,or local news;some function as more personal online diaries.A typical blog combines text,images,and links to other blogs,web pages,and other media related to its topic.

28、Most blogs are primarily textual although many focus on photographs,videos or audio.,Source:Wikipedia,40,Blog Posts by Language,Source:“The State of the Live Web,April 2007”Technorati,41,SNS(Social Networking Service),Social networking is a category of Internet applications to help connect friends,b

29、usiness partners,or other individuals together using a variety of tools.These applications,known as online social networks are becoming increasingly popular.Most social network services are primarily web based and provide a collection of various ways for users to interact,such as chat,messaging,emai

30、l,video,voice chat,file sharing,blogging,discussion groups,and so on.,Source:Wikipedia,42,Second Life,Second Life is an Internet-based virtual world developed by Linden Research,Inc.A downloadable client program enables its users,called Residents,to interact with each other through motional avatars,

31、providing an advanced level of a social network service combined with 3D virtual spaces.Residents can explore,meet other Residents,socialize,participate in individual and group activities,create and trade items(virtual property)and services from one another.,Source:Wikipedia,43,Electronic Commerce(B

32、2B),(trillion yen),Source:2006 White Paper Information&Communications in Japan,44,Electronic Commerce(B2C),(billion yen),Source:2006 White Paper Information&Communications in Japan,45,The Long Tail,Traditional Market80%of Sales comes 20%of products,TOP 20%of products,Other products(80%),The Long Tai

33、lAddress wide variety demand,A,Inc.earns1/3 of its sales from“The Long Tail”area.,Sales,46,Goods Purchased via Net Shopping,(%),Source:2006 White Paper Information&Communications in Japan,47,Goods Bought/Sold via Net Auction,(%),Answers from experienced usersMultiple answers,Source:2006 White Paper

34、Information&Communications in Japan,48,Impediments to Net Shopping,(%),Answers from inexperienced usersMultiple answers,Source:Internet White Paper 2006(c)Access Media/impress R&D,2006,49,Issues about Network Security,Unauthorized access using a stolen passwordStealing and crashing data files by inv

35、alid access to ISPs serversWiretapping of data transmitted on the InternetSoftware/data files infected with computer virusAttack to ISPs servers by E-mail/packet floodPhishingPharming,50,Phishing(Fishing),In computing,phishing is a criminal activity using social engineering techniques.Phishers attem

36、pt to fraudulently acquire sensitive information,such as usernames,passwords and credit card details,by masquerading as a trustworthy entity in an electronic communication.Phishing is typically carried out by email or instant messaging,and often directs users to give details at a website,although ph

37、one contact has been used as well.Attempts to deal with the growing number of reported phishing incidents include legislation,user training,and technical measures.,Source:Wikipedia,51,Technique of Phishing,E-mail senders server,E-mail sender,Real web site of bank,credit card company,etc.,E-mail serv

38、erof recipient,Account no.,etc.,E-mail urging toenter account no.,etc.,Personal information such as account no.,Falsely claiming to be a real bank and so on,send an e-mail asking for entering personal information such as account no.due to renewal of the system.Show a web link to direct the recipient

39、 to a false web site that is set up to steal the personal information.,52,Damage of Phishing,Approximately 5.7 million people received phishing mails.19%of the phishing mail recipients(about 1.1 million)actually accessed false web sites.3%(about 1.8 million)of the recipients entered personal informa

40、tion.Financial damage of banks and credit companies amounted to 1.2 billion dollars.,Estimation by the Gartner Group based on the hearing from 5,000 Internet users in the U.S.A.between the second half of 2003 and the first half of 2004.,53,Pharming(Farming),Similar in nature to e-mail phishing,pharm

41、ing seeks to obtain personal or private(usually financial related)information through domain spoofing.Rather than being spammed with malicious and mischievous e-mail requests for you to visit spoof Web sites which appear legitimate,pharming poisons a DNS server by infusing false information into the

42、 DNS server,resulting in a users request being redirected elsewhere.Your browser,however will show you are at the correct Web site,which makes pharming a bit more serious and more difficult to detect.Phishing attempts to scam people one at a time with an e-mail while pharming allows the scammers to

43、target large groups of people at one time through domain spoofing.,Source:Webopedia Computer Dictionary,54,Reporting of Computer Virus Infection,Source:2006 White Paper Information&Communications in Japan,55,Internet vs.Intranet,WWW Browser,Inhouse WWWServer,Corporate Applications Servers,Intranet,(

44、LAN-WAN-LAN),Firewall,Internet,Public ServerProxy ServerMail ServerNews ServerDNS Server etc.,56,Firewall,A system designed to prevent unauthorized access to or from a private network.Firewalls can be implemented in both hardware and software,or a combination of both.Firewalls are frequently used to

45、 prevent unauthorized Internet users from accessing private networks connected to the Internet,especially intranets.All messages entering or leaving the intranet pass through the firewall,which examines each message and blocks those that do not meet the specified security criteria.,57,Remote Access

46、to Corporate Network,Customers Data Center,Router,Servers,Intranet,FENICSRemote LAN Access Network,ACE Server,Tunneling,GW,Cellular Phone,AP,PSTN,ISDN,Dial-upRouter,Modem,TA,Callers number CheckOnetime Password,Network Monitoring Center,24 hours/365 days,AdministrationServer,Authentication,Administr

47、ator,PSTNISDN,Modem/TA,(RADIUS),58,Security Technologies,Encryptionto protect from loss of privacyDigital Signatureto protect from loss of integrityAuthenticationto protect from spoofing,59,Encryption Methods,Secret-key(Symmetrical)cryptographyThe same key is used to encrypt and decrypt e.g.DES(Data

48、 Encryption Standard)Public-key cryptographyA pair of keys,public and private keys,are used.A sender encrypts a message with the receivers public key and that message can only be decrypted with the receivers private key.e.g.RSA,60,Privacy-Enhanced Mail(PEM),DES,DES,RSA,RSA,1.Encrypt a message with a

49、 data encryption key(DES)2.“A”encrypts the data encryption key with“B”s public key.(RSA)3.“B”decrypts the data encryption key with“B”s private key.(RSA)4.“B”decrypts the message with the decrypted data encryption key(DES),Hello!,?!*&#,Bs public key,Bs private key,Data Encryption Key,A,B,Hello!,Data

50、Encryption Key,61,Digital Signature,RSA,RSA,1.“A”creates a message digest(MD).2.“A”encrypts the MD with“A”s private key(RSA).Digital Signature3.“B”decrypts the MD with“A”s public key(RSA)and restore the MD.4.“B”creates a message digest using the message that“B”received separately.5.Compare the resto

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 建筑/施工/环境 > 项目建议


备案号:宁ICP备20000045号-2

经营许可证:宁B2-20210002

宁公网安备 64010402000987号