51
© 2006 Prentice-Hall, Inc. 1 Technology In Action Chapter 12 Review: Database Review: Database Electronic collections of related Electronic collections of related data data Help us organize data Help us organize data Turn data into information Turn data into information

Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

  • View
    216

  • Download
    2

Embed Size (px)

Citation preview

Page 1: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

1

Technology In Action Chapter 12

Review: DatabaseReview: DatabaseReview: DatabaseReview: Database

• Electronic collections of related dataElectronic collections of related data• Help us organize dataHelp us organize data• Turn data into informationTurn data into information

• Electronic collections of related dataElectronic collections of related data• Help us organize dataHelp us organize data• Turn data into informationTurn data into information

Page 2: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

2

Technology In Action Chapter 12

Advantages of Using DatabasesAdvantages of Using DatabasesAdvantages of Using DatabasesAdvantages of Using Databases

• Store and retrieve large quantities of Store and retrieve large quantities of informationinformation

• Data centralizationData centralization• Data integrityData integrity• FlexibilityFlexibility

• Store and retrieve large quantities of Store and retrieve large quantities of informationinformation

• Data centralizationData centralization• Data integrityData integrity• FlexibilityFlexibility

Student housing

Financial AidRecording grades

Student Registration

Parents

Student Information Database

NEXT SLIDE

Page 3: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

3

Technology In Action Chapter 12

Database componentsDatabase componentsDatabase componentsDatabase components

• FieldField– Data type: text, numeric, date, object, hyperlink…Data type: text, numeric, date, object, hyperlink…

• RecordRecord• TableTable

– Primary keyPrimary key– Foreign key (referential integrity)Foreign key (referential integrity)

• FieldField– Data type: text, numeric, date, object, hyperlink…Data type: text, numeric, date, object, hyperlink…

• RecordRecord• TableTable

– Primary keyPrimary key– Foreign key (referential integrity)Foreign key (referential integrity)

Page 4: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

4

Technology In Action Chapter 12

Database TypesDatabase TypesDatabase TypesDatabase Types

• Relational databaseRelational database• Object-oriented databaseObject-oriented database• Object-relational databaseObject-relational database

• Relational databaseRelational database• Object-oriented databaseObject-oriented database• Object-relational databaseObject-relational database

Page 5: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

5

Technology In Action Chapter 12

Database Management Systems Database Management Systems (DBMS)(DBMS)

Database Management Systems Database Management Systems (DBMS)(DBMS)

• Application software designed to acquire Application software designed to acquire and analyze dataand analyze data

• Microsoft Access, OracleMicrosoft Access, Oracle• Four main operations of a DBMS are:Four main operations of a DBMS are:

– Creating databases and entering dataCreating databases and entering data– Viewing and sorting dataViewing and sorting data– Extracting or querying data (SQL)Extracting or querying data (SQL)– Outputting dataOutputting data

• Application software designed to acquire Application software designed to acquire and analyze dataand analyze data

• Microsoft Access, OracleMicrosoft Access, Oracle• Four main operations of a DBMS are:Four main operations of a DBMS are:

– Creating databases and entering dataCreating databases and entering data– Viewing and sorting dataViewing and sorting data– Extracting or querying data (SQL)Extracting or querying data (SQL)– Outputting dataOutputting data

Page 6: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

6

Technology In Action Chapter 12

Managing Data:Managing Data:Information SystemsInformation Systems

Managing Data:Managing Data:Information SystemsInformation Systems

• Office support systems (OSS)Office support systems (OSS)– Microsoft OfficeMicrosoft Office

• Transaction processing system (TPS)Transaction processing system (TPS)• Management information system (MIS)Management information system (MIS)• Decision support systems (DSS)Decision support systems (DSS)

• Office support systems (OSS)Office support systems (OSS)– Microsoft OfficeMicrosoft Office

• Transaction processing system (TPS)Transaction processing system (TPS)• Management information system (MIS)Management information system (MIS)• Decision support systems (DSS)Decision support systems (DSS)

Page 7: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

7

Technology In Action Chapter 12

Technology In ActionTechnology In ActionTechnology In ActionTechnology In Action

Chapter 12 & 13Chapter 12 & 13

Behind the Scenes: Behind the Scenes:

Networking and SecurityNetworking and Security

The Internet: How it WorksThe Internet: How it Works

Chapter 12 & 13Chapter 12 & 13

Behind the Scenes: Behind the Scenes:

Networking and SecurityNetworking and Security

The Internet: How it WorksThe Internet: How it Works

NEXT SLIDE

Page 8: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

8

Technology In Action Chapter 12

Ch.12 TopicsCh.12 TopicsCh.12 TopicsCh.12 Topics

• Advantages of a networkAdvantages of a network• Client/server and peer-to-peer networksClient/server and peer-to-peer networks• Classifications of client/server networksClassifications of client/server networks• Client/server network componentsClient/server network components• Moving data in a client/server networkMoving data in a client/server network• Securing networksSecuring networks

• Advantages of a networkAdvantages of a network• Client/server and peer-to-peer networksClient/server and peer-to-peer networks• Classifications of client/server networksClassifications of client/server networks• Client/server network componentsClient/server network components• Moving data in a client/server networkMoving data in a client/server network• Securing networksSecuring networks

NEXT SLIDE

Page 9: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

9

Technology In Action Chapter 12

NetworkNetworkNetworkNetwork

• Definition (Ch.7)Definition (Ch.7)• Advantages:Advantages:

– Increase productivityIncrease productivity– Enable the sharing of resourcesEnable the sharing of resources– Facilitate Internet connectivityFacilitate Internet connectivity

• Definition (Ch.7)Definition (Ch.7)• Advantages:Advantages:

– Increase productivityIncrease productivity– Enable the sharing of resourcesEnable the sharing of resources– Facilitate Internet connectivityFacilitate Internet connectivity

NEXT SLIDE

Page 10: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

10

Technology In Action Chapter 12

Two architecturesTwo architecturesTwo architecturesTwo architectures

Peer-to-PeerPeer-to-Peer Client/ServerClient/Server

Every node communicates Every node communicates with every other nodewith every other node

All nodes communicate All nodes communicate through the serverthrough the server

Used for fewer than 10 usersUsed for fewer than 10 users Used for more than 10 usersUsed for more than 10 users

Not easily scalableNot easily scalable Easily scalableEasily scalable

DecentralizedDecentralized CentralizedCentralized

Page 11: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

11

Technology In Action Chapter 12

Client/Server NetworksClient/Server NetworksClient/Server NetworksClient/Server Networks

• Server based network:Server based network:– ClientsClients– ServersServers

• Servers respond to Servers respond to requests from clientsrequests from clients

• Servers perform Servers perform specific tasksspecific tasks

• Scalable networkScalable network

• Server based network:Server based network:– ClientsClients– ServersServers

• Servers respond to Servers respond to requests from clientsrequests from clients

• Servers perform Servers perform specific tasksspecific tasks

• Scalable networkScalable network

NEXT SLIDE

Page 12: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

12

Technology In Action Chapter 12

Classifications of Client/Server Classifications of Client/Server NetworksNetworks

Classifications of Client/Server Classifications of Client/Server NetworksNetworks

• LAN:LAN:– Local area networkLocal area network

• WAN:WAN:– Wide area networkWide area network

• MAN:MAN:– Metropolitan area networkMetropolitan area network– Computers linked together within a city or countyComputers linked together within a city or county

• PANPAN– Personal area networkPersonal area network

• IntranetIntranet

• LAN:LAN:– Local area networkLocal area network

• WAN:WAN:– Wide area networkWide area network

• MAN:MAN:– Metropolitan area networkMetropolitan area network– Computers linked together within a city or countyComputers linked together within a city or county

• PANPAN– Personal area networkPersonal area network

• IntranetIntranet

NEXT SLIDE

Page 13: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

13

Technology In Action Chapter 12

Constructing Client/Server Constructing Client/Server NetworksNetworks

Constructing Client/Server Constructing Client/Server NetworksNetworks

• ServersServers• Network topologiesNetwork topologies• Transmission mediaTransmission media• Network operating system (NOS)Network operating system (NOS)• Network adaptersNetwork adapters• Network navigation devicesNetwork navigation devices

Page 14: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

14

Technology In Action Chapter 12

ServersServersServersServers

• Number and type of servers depend on Number and type of servers depend on network size and workloadnetwork size and workload

• Dedicated server:Dedicated server:– Perform one specific functionPerform one specific function

• Examples:Examples:– Authentication serverAuthentication server– File serverFile server– Printer serverPrinter server– Database serverDatabase server– Email serverEmail server– Web serverWeb server

• Number and type of servers depend on Number and type of servers depend on network size and workloadnetwork size and workload

• Dedicated server:Dedicated server:– Perform one specific functionPerform one specific function

• Examples:Examples:– Authentication serverAuthentication server– File serverFile server– Printer serverPrinter server– Database serverDatabase server– Email serverEmail server– Web serverWeb server

Page 15: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

15

Technology In Action Chapter 12

Network TopologiesNetwork TopologiesNetwork TopologiesNetwork Topologies

• The physical layout of computers, The physical layout of computers, transmission media, and other transmission media, and other componentscomponents

• Types of network topologies include:Types of network topologies include:– Bus topologyBus topology– Ring topologyRing topology– Star topology Star topology

Page 16: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

16

Technology In Action Chapter 12

Bus TopologyBus TopologyBus TopologyBus Topology• All nodes are connected All nodes are connected

in sequence on a single in sequence on a single cablecable

• Used most often on Used most often on peer-to-peer networkspeer-to-peer networks

• Networked computers Networked computers communicate with each communicate with each otherother

• One computer transmits One computer transmits data at a time:data at a time:– Access methods avoid data Access methods avoid data

collisionscollisions– Data is transmitted in Data is transmitted in

“packets”“packets”

• All nodes are connected All nodes are connected in sequence on a single in sequence on a single cablecable

• Used most often on Used most often on peer-to-peer networkspeer-to-peer networks

• Networked computers Networked computers communicate with each communicate with each otherother

• One computer transmits One computer transmits data at a time:data at a time:– Access methods avoid data Access methods avoid data

collisionscollisions– Data is transmitted in Data is transmitted in

“packets”“packets”

Page 17: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

17

Technology In Action Chapter 12

Ring TopologyRing TopologyRing TopologyRing Topology

• Nodes are laid out in Nodes are laid out in a ringa ring

• Token (data packet) Token (data packet) flows in one direction flows in one direction from device to devicefrom device to device

• Nodes are laid out in Nodes are laid out in a ringa ring

• Token (data packet) Token (data packet) flows in one direction flows in one direction from device to devicefrom device to device

Page 18: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

18

Technology In Action Chapter 12

Star TopologyStar TopologyStar TopologyStar Topology

• Nodes connect to a Nodes connect to a central communications central communications device (hub/switch)device (hub/switch)

• A node sends a signal to A node sends a signal to the hub which the hub which retransmits it to the retransmits it to the other nodesother nodes

• A node accepts the A node accepts the signal addressed to itsignal addressed to it

• Nodes connect to a Nodes connect to a central communications central communications device (hub/switch)device (hub/switch)

• A node sends a signal to A node sends a signal to the hub which the hub which retransmits it to the retransmits it to the other nodesother nodes

• A node accepts the A node accepts the signal addressed to itsignal addressed to it

Page 19: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

19

Technology In Action Chapter 12

Transmission MediaTransmission MediaTransmission MediaTransmission Media

• The routes data takes to flow between The routes data takes to flow between devices on a network:devices on a network:

• WiredWired– Twisted pair cableTwisted pair cable– Coaxial cableCoaxial cable– Fiber-optic cableFiber-optic cable

• Wireless:Wireless: – Wireless Fidelity (Wi-Fi)Wireless Fidelity (Wi-Fi)– Uses radio wavesUses radio waves– 802.11 standard802.11 standard

Page 20: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

20

Technology In Action Chapter 12

Choosing a CableChoosing a CableChoosing a CableChoosing a Cable

• Maximum run lengthMaximum run length• Bandwidth Bandwidth • Bend radiusBend radius• Cable costCable cost• Installation costsInstallation costs• Susceptibility to Susceptibility to

interferenceinterference• Signal transmission Signal transmission

methodsmethods

• Maximum run lengthMaximum run length• Bandwidth Bandwidth • Bend radiusBend radius• Cable costCable cost• Installation costsInstallation costs• Susceptibility to Susceptibility to

interferenceinterference• Signal transmission Signal transmission

methodsmethods

Page 21: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

21

Technology In Action Chapter 12

Network Operating Systems (NOS)Network Operating Systems (NOS)Network Operating Systems (NOS)Network Operating Systems (NOS)

• Provide the protocol that controls the Provide the protocol that controls the communication between devices on the communication between devices on the networknetwork

• Major network operating systems:Major network operating systems:– Windows Server 2003Windows Server 2003– UNIXUNIX– Novell NetWareNovell NetWare

• Provide the protocol that controls the Provide the protocol that controls the communication between devices on the communication between devices on the networknetwork

• Major network operating systems:Major network operating systems:– Windows Server 2003Windows Server 2003– UNIXUNIX– Novell NetWareNovell NetWare

Page 22: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

22

Technology In Action Chapter 12

Network AdaptersNetwork AdaptersNetwork AdaptersNetwork Adapters

• Devices that enable computers to Devices that enable computers to communicate on a networkcommunicate on a network

• Network interface cards (NICs):Network interface cards (NICs):– Generate network transmission signalsGenerate network transmission signals– Create data packetsCreate data packets– Act as information gatekeepersAct as information gatekeepers– Ethernet compliantEthernet compliant– Wireless NICsWireless NICs

• Devices that enable computers to Devices that enable computers to communicate on a networkcommunicate on a network

• Network interface cards (NICs):Network interface cards (NICs):– Generate network transmission signalsGenerate network transmission signals– Create data packetsCreate data packets– Act as information gatekeepersAct as information gatekeepers– Ethernet compliantEthernet compliant– Wireless NICsWireless NICs

Page 23: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

23

Technology In Action Chapter 12

Network Navigation DevicesNetwork Navigation DevicesNetwork Navigation DevicesNetwork Navigation Devices

• Media Access Control (MAC) address:Media Access Control (MAC) address:– Six 2-digit numbers (01:40:87:44:79:A5)Six 2-digit numbers (01:40:87:44:79:A5)– Physical address of network adapterPhysical address of network adapter– Internal network identificationInternal network identification

• Repeaters and Hubs:Repeaters and Hubs:– Amplify signals and retransmit themAmplify signals and retransmit them

• Switches and Bridges:Switches and Bridges:– Send data on a specific route through the networkSend data on a specific route through the network– Bridges send data between collision domainsBridges send data between collision domains

• Routers:Routers:– Send information between two networksSend information between two networks

• Media Access Control (MAC) address:Media Access Control (MAC) address:– Six 2-digit numbers (01:40:87:44:79:A5)Six 2-digit numbers (01:40:87:44:79:A5)– Physical address of network adapterPhysical address of network adapter– Internal network identificationInternal network identification

• Repeaters and Hubs:Repeaters and Hubs:– Amplify signals and retransmit themAmplify signals and retransmit them

• Switches and Bridges:Switches and Bridges:– Send data on a specific route through the networkSend data on a specific route through the network– Bridges send data between collision domainsBridges send data between collision domains

• Routers:Routers:– Send information between two networksSend information between two networks

Page 24: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

24

Technology In Action Chapter 12

Network SecurityNetwork SecurityNetwork SecurityNetwork Security

• Authentication:Authentication:– User ID and password used to access the networkUser ID and password used to access the network

• Access privileges:Access privileges:– Enable access to certain network systemsEnable access to certain network systems

• Physical protection measures:Physical protection measures:– Restrict physical access to sensitive network Restrict physical access to sensitive network

equipmentequipment– Magnetic card readersMagnetic card readers– Biometric access devicesBiometric access devices

• Authentication:Authentication:– User ID and password used to access the networkUser ID and password used to access the network

• Access privileges:Access privileges:– Enable access to certain network systemsEnable access to certain network systems

• Physical protection measures:Physical protection measures:– Restrict physical access to sensitive network Restrict physical access to sensitive network

equipmentequipment– Magnetic card readersMagnetic card readers– Biometric access devicesBiometric access devices

NEXT SLIDE

Page 25: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

25

Technology In Action Chapter 12

Network SecurityNetwork SecurityNetwork SecurityNetwork Security

• FirewallsFirewalls::– Prevent access to the network by unauthorized usersPrevent access to the network by unauthorized users– Composed of software and/or hardwareComposed of software and/or hardware– Screens and validates data packetsScreens and validates data packets– Bastion host/proxy serverBastion host/proxy server

NEXT SLIDE

Page 26: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

26

Technology In Action Chapter 12

Network Firewall LayoutNetwork Firewall LayoutNetwork Firewall LayoutNetwork Firewall Layout

Firewall

External Screening

Router

Bastion Host /Proxy Server

Internal Screening

Router

Perimeter Network

Internal Network

Page 27: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

27

Technology In Action Chapter 12

Chapter 12 Summary QuestionsChapter 12 Summary QuestionsChapter 12 Summary QuestionsChapter 12 Summary Questions

• How does a client/server network differ How does a client/server network differ from a peer-to-peer network?from a peer-to-peer network?

• What are the different classifications of What are the different classifications of client/server networks?client/server networks?

• What components are needed to construct What components are needed to construct a client/server network?a client/server network?

• What are the various network topologies?What are the various network topologies?• What types of transmission media are What types of transmission media are

used in client/server networks?used in client/server networks?

• How does a client/server network differ How does a client/server network differ from a peer-to-peer network?from a peer-to-peer network?

• What are the different classifications of What are the different classifications of client/server networks?client/server networks?

• What components are needed to construct What components are needed to construct a client/server network?a client/server network?

• What are the various network topologies?What are the various network topologies?• What types of transmission media are What types of transmission media are

used in client/server networks?used in client/server networks?

NEXT SLIDE

Page 28: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

28

Technology In Action Chapter 12

Ch. 13 TopicsCh. 13 TopicsCh. 13 TopicsCh. 13 Topics

• Managing the InternetManaging the Internet• Interaction between Internet componentsInteraction between Internet components• IP addresses and domain names IP addresses and domain names • Data transmission and protocolsData transmission and protocols• HTML and XMLHTML and XML• E-mail and instant messagingE-mail and instant messaging

• Managing the InternetManaging the Internet• Interaction between Internet componentsInteraction between Internet components• IP addresses and domain names IP addresses and domain names • Data transmission and protocolsData transmission and protocols• HTML and XMLHTML and XML• E-mail and instant messagingE-mail and instant messaging

NEXT SLIDE

Page 29: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

29

Technology In Action Chapter 12

Management of the InternetManagement of the InternetManagement of the InternetManagement of the Internet

Who owns the Who owns the Internet?Internet?

– IndividualsIndividuals– UniversitiesUniversities– Government agenciesGovernment agencies– Private companiesPrivate companies

Who manages the Who manages the Internet?Internet?

– Nonprofit Nonprofit organizationsorganizations

– User groupsUser groups

Who owns the Who owns the Internet?Internet?

– IndividualsIndividuals– UniversitiesUniversities– Government agenciesGovernment agencies– Private companiesPrivate companies

Who manages the Who manages the Internet?Internet?

– Nonprofit Nonprofit organizationsorganizations

– User groupsUser groups

Who pays for the Who pays for the Internet?Internet?

– US taxpayersUS taxpayers– BusinessesBusinesses– UniversitiesUniversities– Other countriesOther countries

Who pays for the Who pays for the Internet?Internet?

– US taxpayersUS taxpayers– BusinessesBusinesses– UniversitiesUniversities– Other countriesOther countries

NEXT SLIDE

Page 30: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

30

Technology In Action Chapter 12

Internet NetworkingInternet NetworkingInternet NetworkingInternet Networking

• A network of networks:A network of networks:– Worldwide network of computer systemsWorldwide network of computer systems– Communications protocolsCommunications protocols

• Network hierarchyNetwork hierarchy• T linesT lines• Network access pointsNetwork access points• Points of PresencePoints of Presence• The network modelThe network model

NEXT SLIDE

Page 31: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

31

Technology In Action Chapter 12

Network HierarchyNetwork HierarchyNetwork HierarchyNetwork Hierarchy

• Tier 1:Tier 1:– The Internet backboneThe Internet backbone– Moves large amounts of dataMoves large amounts of data– Provide access to Regional ISPsProvide access to Regional ISPs

• Tier 2:Tier 2:– Regional ISPsRegional ISPs– Provide access to local ISPsProvide access to local ISPs

• Tier 3:Tier 3:– Local ISPsLocal ISPs– Provide Internet access to homes Provide Internet access to homes

and businessesand businesses

• Tier 1:Tier 1:– The Internet backboneThe Internet backbone– Moves large amounts of dataMoves large amounts of data– Provide access to Regional ISPsProvide access to Regional ISPs

• Tier 2:Tier 2:– Regional ISPsRegional ISPs– Provide access to local ISPsProvide access to local ISPs

• Tier 3:Tier 3:– Local ISPsLocal ISPs– Provide Internet access to homes Provide Internet access to homes

and businessesand businesses

Tier 3 ISP

Tier 2 ISP

Page 32: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

32

Technology In Action Chapter 12

T LinesT LinesT LinesT Lines

• High speed fiber-optic linesHigh speed fiber-optic lines• T-1 line:T-1 line:

– 24 simultaneous voice or data channels24 simultaneous voice or data channels– 1.544 Mbps throughput1.544 Mbps throughput

• T-2 lines:T-2 lines:– 4 T-1 lines4 T-1 lines– 6.3 Mbps throughput6.3 Mbps throughput

• T-3 lines:T-3 lines:– 28 T-1 lines28 T-1 lines– 44.76Mbps throughput44.76Mbps throughput

• T-4 lines:T-4 lines:– 168 T-1 lines168 T-1 lines– 247.176 Mbps throughput247.176 Mbps throughput

• High speed fiber-optic linesHigh speed fiber-optic lines• T-1 line:T-1 line:

– 24 simultaneous voice or data channels24 simultaneous voice or data channels– 1.544 Mbps throughput1.544 Mbps throughput

• T-2 lines:T-2 lines:– 4 T-1 lines4 T-1 lines– 6.3 Mbps throughput6.3 Mbps throughput

• T-3 lines:T-3 lines:– 28 T-1 lines28 T-1 lines– 44.76Mbps throughput44.76Mbps throughput

• T-4 lines:T-4 lines:– 168 T-1 lines168 T-1 lines– 247.176 Mbps throughput247.176 Mbps throughput

Page 33: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

33

Technology In Action Chapter 12

Network Access Points (NAPs)Network Access Points (NAPs)Network Access Points (NAPs)Network Access Points (NAPs)

• Points of connection between ISPsPoints of connection between ISPs• Routers move data between networksRouters move data between networks

• Points of connection between ISPsPoints of connection between ISPs• Routers move data between networksRouters move data between networks

Tier 1 ISP

Tier 2 ISPs

Tier 2 ISPs

Routers

Routers Routers

Page 34: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

34

Technology In Action Chapter 12

Points of Presence (POP)Points of Presence (POP)Points of Presence (POP)Points of Presence (POP)

• Bank of modems where individual users Bank of modems where individual users connect to an ISPconnect to an ISP

• Bank of modems where individual users Bank of modems where individual users connect to an ISPconnect to an ISP

Point of Presence

Your ISP

Your computer

Other computers

Page 35: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

35

Technology In Action Chapter 12

Network ModelNetwork ModelNetwork ModelNetwork Model• Internet communications follows the client/server Internet communications follows the client/server

network modelnetwork model• Clients request servicesClients request services• Servers respond to requestsServers respond to requests• Types of servers include:Types of servers include:

– Web servers:Web servers: Host Web pagesHost Web pages

– Commerce servers:Commerce servers: Enables the purchase of goods and services over the Enables the purchase of goods and services over the

InternetInternet– File servers:File servers:

Provide remote storage space for files that users can Provide remote storage space for files that users can downloaddownload

• Internet communications follows the client/server Internet communications follows the client/server network modelnetwork model

• Clients request servicesClients request services• Servers respond to requestsServers respond to requests• Types of servers include:Types of servers include:

– Web servers:Web servers: Host Web pagesHost Web pages

– Commerce servers:Commerce servers: Enables the purchase of goods and services over the Enables the purchase of goods and services over the

InternetInternet– File servers:File servers:

Provide remote storage space for files that users can Provide remote storage space for files that users can downloaddownload

Page 36: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

36

Technology In Action Chapter 12

2. Your request goes to your ISP’s point of

presence (POP).

YOU ARE HERE

Click to view animation. Click once only.

Animation: Network ModelAnimation: Network ModelAnimation: Network ModelAnimation: Network Model

1. You request a Web page.

3. Your request goes to a Network

Access Point

4. Your request goes to the

National Backbone Network

5. Your request goes to the Web

site’s server

ISP’s Point of Presence (POP).

Web site’s server

Network Access Point (NAP)

National Backbone Network

The Web page is sent back to you

in packets.

Page 37: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

37

Technology In Action Chapter 12

Data Transmission and ProtocolsData Transmission and ProtocolsData Transmission and ProtocolsData Transmission and Protocols

• Computer protocols are rules for electronic Computer protocols are rules for electronic information exchangeinformation exchange

• Open system protocols:Open system protocols:– Any computer can communicate with other computers Any computer can communicate with other computers

using the same protocolsusing the same protocols

• Circuit switchingCircuit switching• Packet switchingPacket switching• TCP/IPTCP/IP

NEXT SLIDE

Page 38: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

38

Technology In Action Chapter 12

Circuit SwitchingCircuit SwitchingCircuit SwitchingCircuit Switching

• Dedicated connection between two pointsDedicated connection between two points• Remains active until the transmission is Remains active until the transmission is

terminatedterminated• Telephone communicationsTelephone communications

• Dedicated connection between two pointsDedicated connection between two points• Remains active until the transmission is Remains active until the transmission is

terminatedterminated• Telephone communicationsTelephone communications

Page 39: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

39

Technology In Action Chapter 12

Packet SwitchingPacket SwitchingPacket SwitchingPacket Switching

• Data is broken into small units called Data is broken into small units called packetspackets

• Packets are sent over various routes to Packets are sent over various routes to their destinationtheir destination

• Packets are reassembled by the Packets are reassembled by the receiving computerreceiving computer

• Packets contain:Packets contain:– Destination/source addressesDestination/source addresses– Reassembling instructionsReassembling instructions– Data Data

• Data is broken into small units called Data is broken into small units called packetspackets

• Packets are sent over various routes to Packets are sent over various routes to their destinationtheir destination

• Packets are reassembled by the Packets are reassembled by the receiving computerreceiving computer

• Packets contain:Packets contain:– Destination/source addressesDestination/source addresses– Reassembling instructionsReassembling instructions– Data Data

Page 40: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

40

Technology In Action Chapter 12

Animation: Packet SwitchingAnimation: Packet SwitchingAnimation: Packet SwitchingAnimation: Packet Switching

01 03 04 05 0602

07 09 10 11 1208

13 15 16 17 1814

19 21 22 23 2420

25 27 28 29 3026

07 09 10 11 1208

Data PacketsWeb Page ISP New York

Your ISP

ISP VirginiaISP Florida

Your Computer

Click to view animation

Page 41: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

41

Technology In Action Chapter 12

TCP/IPTCP/IPTCP/IPTCP/IP

• Transmission Control Protocol (TCP):Transmission Control Protocol (TCP):– Prepares data for transmissionPrepares data for transmission– Provides error checkingProvides error checking– Enables resending lost dataEnables resending lost data

• Internet Protocol (IP):Internet Protocol (IP):– Responsible for sending data from one computer to Responsible for sending data from one computer to

anotheranother

• Transmission Control Protocol (TCP):Transmission Control Protocol (TCP):– Prepares data for transmissionPrepares data for transmission– Provides error checkingProvides error checking– Enables resending lost dataEnables resending lost data

• Internet Protocol (IP):Internet Protocol (IP):– Responsible for sending data from one computer to Responsible for sending data from one computer to

anotheranother

Page 42: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

42

Technology In Action Chapter 12

IP AddressesIP AddressesIP AddressesIP Addresses

• Unique number that identifies devices Unique number that identifies devices connected to the Internetconnected to the Internet

• Typical IP address:Typical IP address:– 197.24.72.157197.24.72.157

• Static address:Static address:– Address never changesAddress never changes

• Dynamic address:Dynamic address:– Temporary addressTemporary address

• Dynamic Host Configuration Protocol Dynamic Host Configuration Protocol (DHCP)(DHCP)

• Unique number that identifies devices Unique number that identifies devices connected to the Internetconnected to the Internet

• Typical IP address:Typical IP address:– 197.24.72.157197.24.72.157

• Static address:Static address:– Address never changesAddress never changes

• Dynamic address:Dynamic address:– Temporary addressTemporary address

• Dynamic Host Configuration Protocol Dynamic Host Configuration Protocol (DHCP)(DHCP)

NEXT SLIDE

Page 43: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

43

Technology In Action Chapter 12

Domain NamesDomain NamesDomain NamesDomain Names

• Name that takes the place of an IP addressName that takes the place of an IP address• Sample domain name:Sample domain name:

– www.mywebsite.comwww.mywebsite.com

• Top level domains (TLD):Top level domains (TLD):– Portion of the domain name that follows the period (dot)Portion of the domain name that follows the period (dot)– Sample top level domain names:Sample top level domain names:

.com.com; ; .org.org; ; .edu.edu; and ; and .net.net

• Second-level domains:Second-level domains:– Unique name within a top level domainUnique name within a top level domain– Sample second-level domain names:Sample second-level domain names:

Yahoo.comYahoo.com; ; Google.comGoogle.com; and ; and Unesco.orgUnesco.org

NEXT SLIDE

Page 44: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

44

Technology In Action Chapter 12

Other ProtocolsOther ProtocolsOther ProtocolsOther Protocols

• File Transfer Protocol (FTP):File Transfer Protocol (FTP):– File sharing protocolFile sharing protocol– Files are downloaded and uploaded using the InternetFiles are downloaded and uploaded using the Internet– ftp://ftp://garbo.uwasa.figarbo.uwasa.fi

• Telnet:Telnet:– Protocol for connecting to a remote computer and a Protocol for connecting to a remote computer and a

TCP/IP serviceTCP/IP service– Enables a client computer to control a server Enables a client computer to control a server

computercomputer

• File Transfer Protocol (FTP):File Transfer Protocol (FTP):– File sharing protocolFile sharing protocol– Files are downloaded and uploaded using the InternetFiles are downloaded and uploaded using the Internet– ftp://ftp://garbo.uwasa.figarbo.uwasa.fi

• Telnet:Telnet:– Protocol for connecting to a remote computer and a Protocol for connecting to a remote computer and a

TCP/IP serviceTCP/IP service– Enables a client computer to control a server Enables a client computer to control a server

computercomputer

NEXT SLIDE

Page 45: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

45

Technology In Action Chapter 12

HTTP and SSLHTTP and SSLHTTP and SSLHTTP and SSL

• Hypertext Transfer Protocol:Hypertext Transfer Protocol:– Protocol for transferring hypertext documentsProtocol for transferring hypertext documents– Hypertext documents are linked to other documentsHypertext documents are linked to other documents

Hyperlink Hyperlink

• Secure Socket Layer:Secure Socket Layer:– Security protocols that protect sensitive informationSecurity protocols that protect sensitive information– Encrypts dataEncrypts data– https://https://

• Hypertext Transfer Protocol:Hypertext Transfer Protocol:– Protocol for transferring hypertext documentsProtocol for transferring hypertext documents– Hypertext documents are linked to other documentsHypertext documents are linked to other documents

Hyperlink Hyperlink

• Secure Socket Layer:Secure Socket Layer:– Security protocols that protect sensitive informationSecurity protocols that protect sensitive information– Encrypts dataEncrypts data– https://https://

NEXT SLIDE

Page 46: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

46

Technology In Action Chapter 12

HTMLHTMLHTMLHTML• Hypertext Markup Language:Hypertext Markup Language:

– Format for creating Web pagesFormat for creating Web pages– Not a programming language but a set of rules for marking up Not a programming language but a set of rules for marking up

texttext

• Hypertext Markup Language:Hypertext Markup Language:– Format for creating Web pagesFormat for creating Web pages– Not a programming language but a set of rules for marking up Not a programming language but a set of rules for marking up

texttext

<h1>This is the Heading</h1><p><font face="Arial">This is text using Arial font.</font></p><p><font face="Arial"><i>This text is italicized</i>.</font></p><p><font face="Arial"><b>This text is bold</b>.</font></p><p><font face="Arial"><font color="#FF0000">This text color is red</font>.</font></p><p><font face="Arial">This is a hyperlink <a href="http://vig.prenhall.com/">www.prenhall.com</a></font></p>

HTML Web Page

NEXT SLIDE

Page 47: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

47

Technology In Action Chapter 12

Common Gateway Interface (CGI)Common Gateway Interface (CGI)Common Gateway Interface (CGI)Common Gateway Interface (CGI)

• Browsers request that a program file Browsers request that a program file executes (runs)executes (runs)

• Adds Web page interaction:Adds Web page interaction:– Adding names to guest books/mailing listsAdding names to guest books/mailing lists– Completing formsCompleting forms

• Browsers request that a program file Browsers request that a program file executes (runs)executes (runs)

• Adds Web page interaction:Adds Web page interaction:– Adding names to guest books/mailing listsAdding names to guest books/mailing lists– Completing formsCompleting forms

NEXT SLIDE

Page 48: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

48

Technology In Action Chapter 12

Client-Side ApplicationClient-Side ApplicationClient-Side ApplicationClient-Side Application

• A program that runs on a client computer A program that runs on a client computer with no interaction with the serverwith no interaction with the server

• Types of client-side applications include:Types of client-side applications include:– HTML document embedded with JavaScript codeHTML document embedded with JavaScript code– Applet:Applet:

Small program that resides on the serverSmall program that resides on the server

• A program that runs on a client computer A program that runs on a client computer with no interaction with the serverwith no interaction with the server

• Types of client-side applications include:Types of client-side applications include:– HTML document embedded with JavaScript codeHTML document embedded with JavaScript code– Applet:Applet:

Small program that resides on the serverSmall program that resides on the server

NEXT SLIDE

Page 49: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

49

Technology In Action Chapter 12

Extensible Markup Language Extensible Markup Language (XML)(XML)

Extensible Markup Language Extensible Markup Language (XML)(XML)

• Designed for information exchangeDesigned for information exchange• Tools used to create your own markup Tools used to create your own markup

languagelanguage• Used in e-commerce transactionsUsed in e-commerce transactions

• Designed for information exchangeDesigned for information exchange• Tools used to create your own markup Tools used to create your own markup

languagelanguage• Used in e-commerce transactionsUsed in e-commerce transactions

NEXT SLIDE

Page 50: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

50

Technology In Action Chapter 12

Communications Over the InternetCommunications Over the InternetCommunications Over the InternetCommunications Over the Internet

• E-mail:E-mail:– Created in 1971 by Ray TomlinsonCreated in 1971 by Ray Tomlinson– Simple Mail Transfer Protocol (SMTP)Simple Mail Transfer Protocol (SMTP)– Multipurpose Internet Mail Extensions (MIME)Multipurpose Internet Mail Extensions (MIME)

Protocol for attaching files to e-mailProtocol for attaching files to e-mail

• E-mail security:E-mail security:– Encryption: Encryption:

Private-key encryptionPrivate-key encryptionPublic-key encryption (128-bit key)Public-key encryption (128-bit key)

– Secure data transmission softwareSecure data transmission softwareSafeMessage SafeMessage

• E-mail:E-mail:– Created in 1971 by Ray TomlinsonCreated in 1971 by Ray Tomlinson– Simple Mail Transfer Protocol (SMTP)Simple Mail Transfer Protocol (SMTP)– Multipurpose Internet Mail Extensions (MIME)Multipurpose Internet Mail Extensions (MIME)

Protocol for attaching files to e-mailProtocol for attaching files to e-mail

• E-mail security:E-mail security:– Encryption: Encryption:

Private-key encryptionPrivate-key encryptionPublic-key encryption (128-bit key)Public-key encryption (128-bit key)

– Secure data transmission softwareSecure data transmission softwareSafeMessage SafeMessage

NEXT SLIDE

Page 51: Technology In Action Chapter 12 © 2006 Prentice-Hall, Inc.1 Review: Database Electronic collections of related dataElectronic collections of related data

© 2006 Prentice-Hall, Inc.

51

Technology In Action Chapter 12

Instant Messaging (IM)Instant Messaging (IM)Instant Messaging (IM)Instant Messaging (IM)

• Client/server application program for real-Client/server application program for real-time, text based conversationstime, text based conversations

• Popular instant messaging programs:Popular instant messaging programs:– AOL Instant MessengerAOL Instant Messenger– ICQICQ– Yahoo! MessengerYahoo! Messenger– Windows MessengerWindows Messenger

• Client/server application program for real-Client/server application program for real-time, text based conversationstime, text based conversations

• Popular instant messaging programs:Popular instant messaging programs:– AOL Instant MessengerAOL Instant Messenger– ICQICQ– Yahoo! MessengerYahoo! Messenger– Windows MessengerWindows Messenger

NEXT SLIDE