View
216
Download
2
Tags:
Embed Size (px)
Citation preview
© 2006 Prentice-Hall, Inc.
1
Technology In Action Chapter 12
Review: DatabaseReview: DatabaseReview: DatabaseReview: Database
• Electronic collections of related dataElectronic collections of related data• Help us organize dataHelp us organize data• Turn data into informationTurn data into information
• Electronic collections of related dataElectronic collections of related data• Help us organize dataHelp us organize data• Turn data into informationTurn data into information
© 2006 Prentice-Hall, Inc.
2
Technology In Action Chapter 12
Advantages of Using DatabasesAdvantages of Using DatabasesAdvantages of Using DatabasesAdvantages of Using Databases
• Store and retrieve large quantities of Store and retrieve large quantities of informationinformation
• Data centralizationData centralization• Data integrityData integrity• FlexibilityFlexibility
• Store and retrieve large quantities of Store and retrieve large quantities of informationinformation
• Data centralizationData centralization• Data integrityData integrity• FlexibilityFlexibility
Student housing
Financial AidRecording grades
Student Registration
Parents
Student Information Database
NEXT SLIDE
© 2006 Prentice-Hall, Inc.
3
Technology In Action Chapter 12
Database componentsDatabase componentsDatabase componentsDatabase components
• FieldField– Data type: text, numeric, date, object, hyperlink…Data type: text, numeric, date, object, hyperlink…
• RecordRecord• TableTable
– Primary keyPrimary key– Foreign key (referential integrity)Foreign key (referential integrity)
• FieldField– Data type: text, numeric, date, object, hyperlink…Data type: text, numeric, date, object, hyperlink…
• RecordRecord• TableTable
– Primary keyPrimary key– Foreign key (referential integrity)Foreign key (referential integrity)
© 2006 Prentice-Hall, Inc.
4
Technology In Action Chapter 12
Database TypesDatabase TypesDatabase TypesDatabase Types
• Relational databaseRelational database• Object-oriented databaseObject-oriented database• Object-relational databaseObject-relational database
• Relational databaseRelational database• Object-oriented databaseObject-oriented database• Object-relational databaseObject-relational database
© 2006 Prentice-Hall, Inc.
5
Technology In Action Chapter 12
Database Management Systems Database Management Systems (DBMS)(DBMS)
Database Management Systems Database Management Systems (DBMS)(DBMS)
• Application software designed to acquire Application software designed to acquire and analyze dataand analyze data
• Microsoft Access, OracleMicrosoft Access, Oracle• Four main operations of a DBMS are:Four main operations of a DBMS are:
– Creating databases and entering dataCreating databases and entering data– Viewing and sorting dataViewing and sorting data– Extracting or querying data (SQL)Extracting or querying data (SQL)– Outputting dataOutputting data
• Application software designed to acquire Application software designed to acquire and analyze dataand analyze data
• Microsoft Access, OracleMicrosoft Access, Oracle• Four main operations of a DBMS are:Four main operations of a DBMS are:
– Creating databases and entering dataCreating databases and entering data– Viewing and sorting dataViewing and sorting data– Extracting or querying data (SQL)Extracting or querying data (SQL)– Outputting dataOutputting data
© 2006 Prentice-Hall, Inc.
6
Technology In Action Chapter 12
Managing Data:Managing Data:Information SystemsInformation Systems
Managing Data:Managing Data:Information SystemsInformation Systems
• Office support systems (OSS)Office support systems (OSS)– Microsoft OfficeMicrosoft Office
• Transaction processing system (TPS)Transaction processing system (TPS)• Management information system (MIS)Management information system (MIS)• Decision support systems (DSS)Decision support systems (DSS)
• Office support systems (OSS)Office support systems (OSS)– Microsoft OfficeMicrosoft Office
• Transaction processing system (TPS)Transaction processing system (TPS)• Management information system (MIS)Management information system (MIS)• Decision support systems (DSS)Decision support systems (DSS)
© 2006 Prentice-Hall, Inc.
7
Technology In Action Chapter 12
Technology In ActionTechnology In ActionTechnology In ActionTechnology In Action
Chapter 12 & 13Chapter 12 & 13
Behind the Scenes: Behind the Scenes:
Networking and SecurityNetworking and Security
The Internet: How it WorksThe Internet: How it Works
Chapter 12 & 13Chapter 12 & 13
Behind the Scenes: Behind the Scenes:
Networking and SecurityNetworking and Security
The Internet: How it WorksThe Internet: How it Works
NEXT SLIDE
© 2006 Prentice-Hall, Inc.
8
Technology In Action Chapter 12
Ch.12 TopicsCh.12 TopicsCh.12 TopicsCh.12 Topics
• Advantages of a networkAdvantages of a network• Client/server and peer-to-peer networksClient/server and peer-to-peer networks• Classifications of client/server networksClassifications of client/server networks• Client/server network componentsClient/server network components• Moving data in a client/server networkMoving data in a client/server network• Securing networksSecuring networks
• Advantages of a networkAdvantages of a network• Client/server and peer-to-peer networksClient/server and peer-to-peer networks• Classifications of client/server networksClassifications of client/server networks• Client/server network componentsClient/server network components• Moving data in a client/server networkMoving data in a client/server network• Securing networksSecuring networks
NEXT SLIDE
© 2006 Prentice-Hall, Inc.
9
Technology In Action Chapter 12
NetworkNetworkNetworkNetwork
• Definition (Ch.7)Definition (Ch.7)• Advantages:Advantages:
– Increase productivityIncrease productivity– Enable the sharing of resourcesEnable the sharing of resources– Facilitate Internet connectivityFacilitate Internet connectivity
• Definition (Ch.7)Definition (Ch.7)• Advantages:Advantages:
– Increase productivityIncrease productivity– Enable the sharing of resourcesEnable the sharing of resources– Facilitate Internet connectivityFacilitate Internet connectivity
NEXT SLIDE
© 2006 Prentice-Hall, Inc.
10
Technology In Action Chapter 12
Two architecturesTwo architecturesTwo architecturesTwo architectures
Peer-to-PeerPeer-to-Peer Client/ServerClient/Server
Every node communicates Every node communicates with every other nodewith every other node
All nodes communicate All nodes communicate through the serverthrough the server
Used for fewer than 10 usersUsed for fewer than 10 users Used for more than 10 usersUsed for more than 10 users
Not easily scalableNot easily scalable Easily scalableEasily scalable
DecentralizedDecentralized CentralizedCentralized
© 2006 Prentice-Hall, Inc.
11
Technology In Action Chapter 12
Client/Server NetworksClient/Server NetworksClient/Server NetworksClient/Server Networks
• Server based network:Server based network:– ClientsClients– ServersServers
• Servers respond to Servers respond to requests from clientsrequests from clients
• Servers perform Servers perform specific tasksspecific tasks
• Scalable networkScalable network
• Server based network:Server based network:– ClientsClients– ServersServers
• Servers respond to Servers respond to requests from clientsrequests from clients
• Servers perform Servers perform specific tasksspecific tasks
• Scalable networkScalable network
NEXT SLIDE
© 2006 Prentice-Hall, Inc.
12
Technology In Action Chapter 12
Classifications of Client/Server Classifications of Client/Server NetworksNetworks
Classifications of Client/Server Classifications of Client/Server NetworksNetworks
• LAN:LAN:– Local area networkLocal area network
• WAN:WAN:– Wide area networkWide area network
• MAN:MAN:– Metropolitan area networkMetropolitan area network– Computers linked together within a city or countyComputers linked together within a city or county
• PANPAN– Personal area networkPersonal area network
• IntranetIntranet
• LAN:LAN:– Local area networkLocal area network
• WAN:WAN:– Wide area networkWide area network
• MAN:MAN:– Metropolitan area networkMetropolitan area network– Computers linked together within a city or countyComputers linked together within a city or county
• PANPAN– Personal area networkPersonal area network
• IntranetIntranet
NEXT SLIDE
© 2006 Prentice-Hall, Inc.
13
Technology In Action Chapter 12
Constructing Client/Server Constructing Client/Server NetworksNetworks
Constructing Client/Server Constructing Client/Server NetworksNetworks
• ServersServers• Network topologiesNetwork topologies• Transmission mediaTransmission media• Network operating system (NOS)Network operating system (NOS)• Network adaptersNetwork adapters• Network navigation devicesNetwork navigation devices
© 2006 Prentice-Hall, Inc.
14
Technology In Action Chapter 12
ServersServersServersServers
• Number and type of servers depend on Number and type of servers depend on network size and workloadnetwork size and workload
• Dedicated server:Dedicated server:– Perform one specific functionPerform one specific function
• Examples:Examples:– Authentication serverAuthentication server– File serverFile server– Printer serverPrinter server– Database serverDatabase server– Email serverEmail server– Web serverWeb server
• Number and type of servers depend on Number and type of servers depend on network size and workloadnetwork size and workload
• Dedicated server:Dedicated server:– Perform one specific functionPerform one specific function
• Examples:Examples:– Authentication serverAuthentication server– File serverFile server– Printer serverPrinter server– Database serverDatabase server– Email serverEmail server– Web serverWeb server
© 2006 Prentice-Hall, Inc.
15
Technology In Action Chapter 12
Network TopologiesNetwork TopologiesNetwork TopologiesNetwork Topologies
• The physical layout of computers, The physical layout of computers, transmission media, and other transmission media, and other componentscomponents
• Types of network topologies include:Types of network topologies include:– Bus topologyBus topology– Ring topologyRing topology– Star topology Star topology
© 2006 Prentice-Hall, Inc.
16
Technology In Action Chapter 12
Bus TopologyBus TopologyBus TopologyBus Topology• All nodes are connected All nodes are connected
in sequence on a single in sequence on a single cablecable
• Used most often on Used most often on peer-to-peer networkspeer-to-peer networks
• Networked computers Networked computers communicate with each communicate with each otherother
• One computer transmits One computer transmits data at a time:data at a time:– Access methods avoid data Access methods avoid data
collisionscollisions– Data is transmitted in Data is transmitted in
“packets”“packets”
• All nodes are connected All nodes are connected in sequence on a single in sequence on a single cablecable
• Used most often on Used most often on peer-to-peer networkspeer-to-peer networks
• Networked computers Networked computers communicate with each communicate with each otherother
• One computer transmits One computer transmits data at a time:data at a time:– Access methods avoid data Access methods avoid data
collisionscollisions– Data is transmitted in Data is transmitted in
“packets”“packets”
© 2006 Prentice-Hall, Inc.
17
Technology In Action Chapter 12
Ring TopologyRing TopologyRing TopologyRing Topology
• Nodes are laid out in Nodes are laid out in a ringa ring
• Token (data packet) Token (data packet) flows in one direction flows in one direction from device to devicefrom device to device
• Nodes are laid out in Nodes are laid out in a ringa ring
• Token (data packet) Token (data packet) flows in one direction flows in one direction from device to devicefrom device to device
© 2006 Prentice-Hall, Inc.
18
Technology In Action Chapter 12
Star TopologyStar TopologyStar TopologyStar Topology
• Nodes connect to a Nodes connect to a central communications central communications device (hub/switch)device (hub/switch)
• A node sends a signal to A node sends a signal to the hub which the hub which retransmits it to the retransmits it to the other nodesother nodes
• A node accepts the A node accepts the signal addressed to itsignal addressed to it
• Nodes connect to a Nodes connect to a central communications central communications device (hub/switch)device (hub/switch)
• A node sends a signal to A node sends a signal to the hub which the hub which retransmits it to the retransmits it to the other nodesother nodes
• A node accepts the A node accepts the signal addressed to itsignal addressed to it
© 2006 Prentice-Hall, Inc.
19
Technology In Action Chapter 12
Transmission MediaTransmission MediaTransmission MediaTransmission Media
• The routes data takes to flow between The routes data takes to flow between devices on a network:devices on a network:
• WiredWired– Twisted pair cableTwisted pair cable– Coaxial cableCoaxial cable– Fiber-optic cableFiber-optic cable
• Wireless:Wireless: – Wireless Fidelity (Wi-Fi)Wireless Fidelity (Wi-Fi)– Uses radio wavesUses radio waves– 802.11 standard802.11 standard
© 2006 Prentice-Hall, Inc.
20
Technology In Action Chapter 12
Choosing a CableChoosing a CableChoosing a CableChoosing a Cable
• Maximum run lengthMaximum run length• Bandwidth Bandwidth • Bend radiusBend radius• Cable costCable cost• Installation costsInstallation costs• Susceptibility to Susceptibility to
interferenceinterference• Signal transmission Signal transmission
methodsmethods
• Maximum run lengthMaximum run length• Bandwidth Bandwidth • Bend radiusBend radius• Cable costCable cost• Installation costsInstallation costs• Susceptibility to Susceptibility to
interferenceinterference• Signal transmission Signal transmission
methodsmethods
© 2006 Prentice-Hall, Inc.
21
Technology In Action Chapter 12
Network Operating Systems (NOS)Network Operating Systems (NOS)Network Operating Systems (NOS)Network Operating Systems (NOS)
• Provide the protocol that controls the Provide the protocol that controls the communication between devices on the communication between devices on the networknetwork
• Major network operating systems:Major network operating systems:– Windows Server 2003Windows Server 2003– UNIXUNIX– Novell NetWareNovell NetWare
• Provide the protocol that controls the Provide the protocol that controls the communication between devices on the communication between devices on the networknetwork
• Major network operating systems:Major network operating systems:– Windows Server 2003Windows Server 2003– UNIXUNIX– Novell NetWareNovell NetWare
© 2006 Prentice-Hall, Inc.
22
Technology In Action Chapter 12
Network AdaptersNetwork AdaptersNetwork AdaptersNetwork Adapters
• Devices that enable computers to Devices that enable computers to communicate on a networkcommunicate on a network
• Network interface cards (NICs):Network interface cards (NICs):– Generate network transmission signalsGenerate network transmission signals– Create data packetsCreate data packets– Act as information gatekeepersAct as information gatekeepers– Ethernet compliantEthernet compliant– Wireless NICsWireless NICs
• Devices that enable computers to Devices that enable computers to communicate on a networkcommunicate on a network
• Network interface cards (NICs):Network interface cards (NICs):– Generate network transmission signalsGenerate network transmission signals– Create data packetsCreate data packets– Act as information gatekeepersAct as information gatekeepers– Ethernet compliantEthernet compliant– Wireless NICsWireless NICs
© 2006 Prentice-Hall, Inc.
23
Technology In Action Chapter 12
Network Navigation DevicesNetwork Navigation DevicesNetwork Navigation DevicesNetwork Navigation Devices
• Media Access Control (MAC) address:Media Access Control (MAC) address:– Six 2-digit numbers (01:40:87:44:79:A5)Six 2-digit numbers (01:40:87:44:79:A5)– Physical address of network adapterPhysical address of network adapter– Internal network identificationInternal network identification
• Repeaters and Hubs:Repeaters and Hubs:– Amplify signals and retransmit themAmplify signals and retransmit them
• Switches and Bridges:Switches and Bridges:– Send data on a specific route through the networkSend data on a specific route through the network– Bridges send data between collision domainsBridges send data between collision domains
• Routers:Routers:– Send information between two networksSend information between two networks
• Media Access Control (MAC) address:Media Access Control (MAC) address:– Six 2-digit numbers (01:40:87:44:79:A5)Six 2-digit numbers (01:40:87:44:79:A5)– Physical address of network adapterPhysical address of network adapter– Internal network identificationInternal network identification
• Repeaters and Hubs:Repeaters and Hubs:– Amplify signals and retransmit themAmplify signals and retransmit them
• Switches and Bridges:Switches and Bridges:– Send data on a specific route through the networkSend data on a specific route through the network– Bridges send data between collision domainsBridges send data between collision domains
• Routers:Routers:– Send information between two networksSend information between two networks
© 2006 Prentice-Hall, Inc.
24
Technology In Action Chapter 12
Network SecurityNetwork SecurityNetwork SecurityNetwork Security
• Authentication:Authentication:– User ID and password used to access the networkUser ID and password used to access the network
• Access privileges:Access privileges:– Enable access to certain network systemsEnable access to certain network systems
• Physical protection measures:Physical protection measures:– Restrict physical access to sensitive network Restrict physical access to sensitive network
equipmentequipment– Magnetic card readersMagnetic card readers– Biometric access devicesBiometric access devices
• Authentication:Authentication:– User ID and password used to access the networkUser ID and password used to access the network
• Access privileges:Access privileges:– Enable access to certain network systemsEnable access to certain network systems
• Physical protection measures:Physical protection measures:– Restrict physical access to sensitive network Restrict physical access to sensitive network
equipmentequipment– Magnetic card readersMagnetic card readers– Biometric access devicesBiometric access devices
NEXT SLIDE
© 2006 Prentice-Hall, Inc.
25
Technology In Action Chapter 12
Network SecurityNetwork SecurityNetwork SecurityNetwork Security
• FirewallsFirewalls::– Prevent access to the network by unauthorized usersPrevent access to the network by unauthorized users– Composed of software and/or hardwareComposed of software and/or hardware– Screens and validates data packetsScreens and validates data packets– Bastion host/proxy serverBastion host/proxy server
NEXT SLIDE
© 2006 Prentice-Hall, Inc.
26
Technology In Action Chapter 12
Network Firewall LayoutNetwork Firewall LayoutNetwork Firewall LayoutNetwork Firewall Layout
Firewall
External Screening
Router
Bastion Host /Proxy Server
Internal Screening
Router
Perimeter Network
Internal Network
© 2006 Prentice-Hall, Inc.
27
Technology In Action Chapter 12
Chapter 12 Summary QuestionsChapter 12 Summary QuestionsChapter 12 Summary QuestionsChapter 12 Summary Questions
• How does a client/server network differ How does a client/server network differ from a peer-to-peer network?from a peer-to-peer network?
• What are the different classifications of What are the different classifications of client/server networks?client/server networks?
• What components are needed to construct What components are needed to construct a client/server network?a client/server network?
• What are the various network topologies?What are the various network topologies?• What types of transmission media are What types of transmission media are
used in client/server networks?used in client/server networks?
• How does a client/server network differ How does a client/server network differ from a peer-to-peer network?from a peer-to-peer network?
• What are the different classifications of What are the different classifications of client/server networks?client/server networks?
• What components are needed to construct What components are needed to construct a client/server network?a client/server network?
• What are the various network topologies?What are the various network topologies?• What types of transmission media are What types of transmission media are
used in client/server networks?used in client/server networks?
NEXT SLIDE
© 2006 Prentice-Hall, Inc.
28
Technology In Action Chapter 12
Ch. 13 TopicsCh. 13 TopicsCh. 13 TopicsCh. 13 Topics
• Managing the InternetManaging the Internet• Interaction between Internet componentsInteraction between Internet components• IP addresses and domain names IP addresses and domain names • Data transmission and protocolsData transmission and protocols• HTML and XMLHTML and XML• E-mail and instant messagingE-mail and instant messaging
• Managing the InternetManaging the Internet• Interaction between Internet componentsInteraction between Internet components• IP addresses and domain names IP addresses and domain names • Data transmission and protocolsData transmission and protocols• HTML and XMLHTML and XML• E-mail and instant messagingE-mail and instant messaging
NEXT SLIDE
© 2006 Prentice-Hall, Inc.
29
Technology In Action Chapter 12
Management of the InternetManagement of the InternetManagement of the InternetManagement of the Internet
Who owns the Who owns the Internet?Internet?
– IndividualsIndividuals– UniversitiesUniversities– Government agenciesGovernment agencies– Private companiesPrivate companies
Who manages the Who manages the Internet?Internet?
– Nonprofit Nonprofit organizationsorganizations
– User groupsUser groups
Who owns the Who owns the Internet?Internet?
– IndividualsIndividuals– UniversitiesUniversities– Government agenciesGovernment agencies– Private companiesPrivate companies
Who manages the Who manages the Internet?Internet?
– Nonprofit Nonprofit organizationsorganizations
– User groupsUser groups
Who pays for the Who pays for the Internet?Internet?
– US taxpayersUS taxpayers– BusinessesBusinesses– UniversitiesUniversities– Other countriesOther countries
Who pays for the Who pays for the Internet?Internet?
– US taxpayersUS taxpayers– BusinessesBusinesses– UniversitiesUniversities– Other countriesOther countries
NEXT SLIDE
© 2006 Prentice-Hall, Inc.
30
Technology In Action Chapter 12
Internet NetworkingInternet NetworkingInternet NetworkingInternet Networking
• A network of networks:A network of networks:– Worldwide network of computer systemsWorldwide network of computer systems– Communications protocolsCommunications protocols
• Network hierarchyNetwork hierarchy• T linesT lines• Network access pointsNetwork access points• Points of PresencePoints of Presence• The network modelThe network model
NEXT SLIDE
© 2006 Prentice-Hall, Inc.
31
Technology In Action Chapter 12
Network HierarchyNetwork HierarchyNetwork HierarchyNetwork Hierarchy
• Tier 1:Tier 1:– The Internet backboneThe Internet backbone– Moves large amounts of dataMoves large amounts of data– Provide access to Regional ISPsProvide access to Regional ISPs
• Tier 2:Tier 2:– Regional ISPsRegional ISPs– Provide access to local ISPsProvide access to local ISPs
• Tier 3:Tier 3:– Local ISPsLocal ISPs– Provide Internet access to homes Provide Internet access to homes
and businessesand businesses
• Tier 1:Tier 1:– The Internet backboneThe Internet backbone– Moves large amounts of dataMoves large amounts of data– Provide access to Regional ISPsProvide access to Regional ISPs
• Tier 2:Tier 2:– Regional ISPsRegional ISPs– Provide access to local ISPsProvide access to local ISPs
• Tier 3:Tier 3:– Local ISPsLocal ISPs– Provide Internet access to homes Provide Internet access to homes
and businessesand businesses
Tier 3 ISP
Tier 2 ISP
© 2006 Prentice-Hall, Inc.
32
Technology In Action Chapter 12
T LinesT LinesT LinesT Lines
• High speed fiber-optic linesHigh speed fiber-optic lines• T-1 line:T-1 line:
– 24 simultaneous voice or data channels24 simultaneous voice or data channels– 1.544 Mbps throughput1.544 Mbps throughput
• T-2 lines:T-2 lines:– 4 T-1 lines4 T-1 lines– 6.3 Mbps throughput6.3 Mbps throughput
• T-3 lines:T-3 lines:– 28 T-1 lines28 T-1 lines– 44.76Mbps throughput44.76Mbps throughput
• T-4 lines:T-4 lines:– 168 T-1 lines168 T-1 lines– 247.176 Mbps throughput247.176 Mbps throughput
• High speed fiber-optic linesHigh speed fiber-optic lines• T-1 line:T-1 line:
– 24 simultaneous voice or data channels24 simultaneous voice or data channels– 1.544 Mbps throughput1.544 Mbps throughput
• T-2 lines:T-2 lines:– 4 T-1 lines4 T-1 lines– 6.3 Mbps throughput6.3 Mbps throughput
• T-3 lines:T-3 lines:– 28 T-1 lines28 T-1 lines– 44.76Mbps throughput44.76Mbps throughput
• T-4 lines:T-4 lines:– 168 T-1 lines168 T-1 lines– 247.176 Mbps throughput247.176 Mbps throughput
© 2006 Prentice-Hall, Inc.
33
Technology In Action Chapter 12
Network Access Points (NAPs)Network Access Points (NAPs)Network Access Points (NAPs)Network Access Points (NAPs)
• Points of connection between ISPsPoints of connection between ISPs• Routers move data between networksRouters move data between networks
• Points of connection between ISPsPoints of connection between ISPs• Routers move data between networksRouters move data between networks
Tier 1 ISP
Tier 2 ISPs
Tier 2 ISPs
Routers
Routers Routers
© 2006 Prentice-Hall, Inc.
34
Technology In Action Chapter 12
Points of Presence (POP)Points of Presence (POP)Points of Presence (POP)Points of Presence (POP)
• Bank of modems where individual users Bank of modems where individual users connect to an ISPconnect to an ISP
• Bank of modems where individual users Bank of modems where individual users connect to an ISPconnect to an ISP
Point of Presence
Your ISP
Your computer
Other computers
© 2006 Prentice-Hall, Inc.
35
Technology In Action Chapter 12
Network ModelNetwork ModelNetwork ModelNetwork Model• Internet communications follows the client/server Internet communications follows the client/server
network modelnetwork model• Clients request servicesClients request services• Servers respond to requestsServers respond to requests• Types of servers include:Types of servers include:
– Web servers:Web servers: Host Web pagesHost Web pages
– Commerce servers:Commerce servers: Enables the purchase of goods and services over the Enables the purchase of goods and services over the
InternetInternet– File servers:File servers:
Provide remote storage space for files that users can Provide remote storage space for files that users can downloaddownload
• Internet communications follows the client/server Internet communications follows the client/server network modelnetwork model
• Clients request servicesClients request services• Servers respond to requestsServers respond to requests• Types of servers include:Types of servers include:
– Web servers:Web servers: Host Web pagesHost Web pages
– Commerce servers:Commerce servers: Enables the purchase of goods and services over the Enables the purchase of goods and services over the
InternetInternet– File servers:File servers:
Provide remote storage space for files that users can Provide remote storage space for files that users can downloaddownload
© 2006 Prentice-Hall, Inc.
36
Technology In Action Chapter 12
2. Your request goes to your ISP’s point of
presence (POP).
YOU ARE HERE
Click to view animation. Click once only.
Animation: Network ModelAnimation: Network ModelAnimation: Network ModelAnimation: Network Model
1. You request a Web page.
3. Your request goes to a Network
Access Point
4. Your request goes to the
National Backbone Network
5. Your request goes to the Web
site’s server
ISP’s Point of Presence (POP).
Web site’s server
Network Access Point (NAP)
National Backbone Network
The Web page is sent back to you
in packets.
© 2006 Prentice-Hall, Inc.
37
Technology In Action Chapter 12
Data Transmission and ProtocolsData Transmission and ProtocolsData Transmission and ProtocolsData Transmission and Protocols
• Computer protocols are rules for electronic Computer protocols are rules for electronic information exchangeinformation exchange
• Open system protocols:Open system protocols:– Any computer can communicate with other computers Any computer can communicate with other computers
using the same protocolsusing the same protocols
• Circuit switchingCircuit switching• Packet switchingPacket switching• TCP/IPTCP/IP
NEXT SLIDE
© 2006 Prentice-Hall, Inc.
38
Technology In Action Chapter 12
Circuit SwitchingCircuit SwitchingCircuit SwitchingCircuit Switching
• Dedicated connection between two pointsDedicated connection between two points• Remains active until the transmission is Remains active until the transmission is
terminatedterminated• Telephone communicationsTelephone communications
• Dedicated connection between two pointsDedicated connection between two points• Remains active until the transmission is Remains active until the transmission is
terminatedterminated• Telephone communicationsTelephone communications
© 2006 Prentice-Hall, Inc.
39
Technology In Action Chapter 12
Packet SwitchingPacket SwitchingPacket SwitchingPacket Switching
• Data is broken into small units called Data is broken into small units called packetspackets
• Packets are sent over various routes to Packets are sent over various routes to their destinationtheir destination
• Packets are reassembled by the Packets are reassembled by the receiving computerreceiving computer
• Packets contain:Packets contain:– Destination/source addressesDestination/source addresses– Reassembling instructionsReassembling instructions– Data Data
• Data is broken into small units called Data is broken into small units called packetspackets
• Packets are sent over various routes to Packets are sent over various routes to their destinationtheir destination
• Packets are reassembled by the Packets are reassembled by the receiving computerreceiving computer
• Packets contain:Packets contain:– Destination/source addressesDestination/source addresses– Reassembling instructionsReassembling instructions– Data Data
© 2006 Prentice-Hall, Inc.
40
Technology In Action Chapter 12
Animation: Packet SwitchingAnimation: Packet SwitchingAnimation: Packet SwitchingAnimation: Packet Switching
01 03 04 05 0602
07 09 10 11 1208
13 15 16 17 1814
19 21 22 23 2420
25 27 28 29 3026
07 09 10 11 1208
Data PacketsWeb Page ISP New York
Your ISP
ISP VirginiaISP Florida
Your Computer
Click to view animation
© 2006 Prentice-Hall, Inc.
41
Technology In Action Chapter 12
TCP/IPTCP/IPTCP/IPTCP/IP
• Transmission Control Protocol (TCP):Transmission Control Protocol (TCP):– Prepares data for transmissionPrepares data for transmission– Provides error checkingProvides error checking– Enables resending lost dataEnables resending lost data
• Internet Protocol (IP):Internet Protocol (IP):– Responsible for sending data from one computer to Responsible for sending data from one computer to
anotheranother
• Transmission Control Protocol (TCP):Transmission Control Protocol (TCP):– Prepares data for transmissionPrepares data for transmission– Provides error checkingProvides error checking– Enables resending lost dataEnables resending lost data
• Internet Protocol (IP):Internet Protocol (IP):– Responsible for sending data from one computer to Responsible for sending data from one computer to
anotheranother
© 2006 Prentice-Hall, Inc.
42
Technology In Action Chapter 12
IP AddressesIP AddressesIP AddressesIP Addresses
• Unique number that identifies devices Unique number that identifies devices connected to the Internetconnected to the Internet
• Typical IP address:Typical IP address:– 197.24.72.157197.24.72.157
• Static address:Static address:– Address never changesAddress never changes
• Dynamic address:Dynamic address:– Temporary addressTemporary address
• Dynamic Host Configuration Protocol Dynamic Host Configuration Protocol (DHCP)(DHCP)
• Unique number that identifies devices Unique number that identifies devices connected to the Internetconnected to the Internet
• Typical IP address:Typical IP address:– 197.24.72.157197.24.72.157
• Static address:Static address:– Address never changesAddress never changes
• Dynamic address:Dynamic address:– Temporary addressTemporary address
• Dynamic Host Configuration Protocol Dynamic Host Configuration Protocol (DHCP)(DHCP)
NEXT SLIDE
© 2006 Prentice-Hall, Inc.
43
Technology In Action Chapter 12
Domain NamesDomain NamesDomain NamesDomain Names
• Name that takes the place of an IP addressName that takes the place of an IP address• Sample domain name:Sample domain name:
– www.mywebsite.comwww.mywebsite.com
• Top level domains (TLD):Top level domains (TLD):– Portion of the domain name that follows the period (dot)Portion of the domain name that follows the period (dot)– Sample top level domain names:Sample top level domain names:
.com.com; ; .org.org; ; .edu.edu; and ; and .net.net
• Second-level domains:Second-level domains:– Unique name within a top level domainUnique name within a top level domain– Sample second-level domain names:Sample second-level domain names:
Yahoo.comYahoo.com; ; Google.comGoogle.com; and ; and Unesco.orgUnesco.org
NEXT SLIDE
© 2006 Prentice-Hall, Inc.
44
Technology In Action Chapter 12
Other ProtocolsOther ProtocolsOther ProtocolsOther Protocols
• File Transfer Protocol (FTP):File Transfer Protocol (FTP):– File sharing protocolFile sharing protocol– Files are downloaded and uploaded using the InternetFiles are downloaded and uploaded using the Internet– ftp://ftp://garbo.uwasa.figarbo.uwasa.fi
• Telnet:Telnet:– Protocol for connecting to a remote computer and a Protocol for connecting to a remote computer and a
TCP/IP serviceTCP/IP service– Enables a client computer to control a server Enables a client computer to control a server
computercomputer
• File Transfer Protocol (FTP):File Transfer Protocol (FTP):– File sharing protocolFile sharing protocol– Files are downloaded and uploaded using the InternetFiles are downloaded and uploaded using the Internet– ftp://ftp://garbo.uwasa.figarbo.uwasa.fi
• Telnet:Telnet:– Protocol for connecting to a remote computer and a Protocol for connecting to a remote computer and a
TCP/IP serviceTCP/IP service– Enables a client computer to control a server Enables a client computer to control a server
computercomputer
NEXT SLIDE
© 2006 Prentice-Hall, Inc.
45
Technology In Action Chapter 12
HTTP and SSLHTTP and SSLHTTP and SSLHTTP and SSL
• Hypertext Transfer Protocol:Hypertext Transfer Protocol:– Protocol for transferring hypertext documentsProtocol for transferring hypertext documents– Hypertext documents are linked to other documentsHypertext documents are linked to other documents
Hyperlink Hyperlink
• Secure Socket Layer:Secure Socket Layer:– Security protocols that protect sensitive informationSecurity protocols that protect sensitive information– Encrypts dataEncrypts data– https://https://
• Hypertext Transfer Protocol:Hypertext Transfer Protocol:– Protocol for transferring hypertext documentsProtocol for transferring hypertext documents– Hypertext documents are linked to other documentsHypertext documents are linked to other documents
Hyperlink Hyperlink
• Secure Socket Layer:Secure Socket Layer:– Security protocols that protect sensitive informationSecurity protocols that protect sensitive information– Encrypts dataEncrypts data– https://https://
NEXT SLIDE
© 2006 Prentice-Hall, Inc.
46
Technology In Action Chapter 12
HTMLHTMLHTMLHTML• Hypertext Markup Language:Hypertext Markup Language:
– Format for creating Web pagesFormat for creating Web pages– Not a programming language but a set of rules for marking up Not a programming language but a set of rules for marking up
texttext
• Hypertext Markup Language:Hypertext Markup Language:– Format for creating Web pagesFormat for creating Web pages– Not a programming language but a set of rules for marking up Not a programming language but a set of rules for marking up
texttext
<h1>This is the Heading</h1><p><font face="Arial">This is text using Arial font.</font></p><p><font face="Arial"><i>This text is italicized</i>.</font></p><p><font face="Arial"><b>This text is bold</b>.</font></p><p><font face="Arial"><font color="#FF0000">This text color is red</font>.</font></p><p><font face="Arial">This is a hyperlink <a href="http://vig.prenhall.com/">www.prenhall.com</a></font></p>
HTML Web Page
NEXT SLIDE
© 2006 Prentice-Hall, Inc.
47
Technology In Action Chapter 12
Common Gateway Interface (CGI)Common Gateway Interface (CGI)Common Gateway Interface (CGI)Common Gateway Interface (CGI)
• Browsers request that a program file Browsers request that a program file executes (runs)executes (runs)
• Adds Web page interaction:Adds Web page interaction:– Adding names to guest books/mailing listsAdding names to guest books/mailing lists– Completing formsCompleting forms
• Browsers request that a program file Browsers request that a program file executes (runs)executes (runs)
• Adds Web page interaction:Adds Web page interaction:– Adding names to guest books/mailing listsAdding names to guest books/mailing lists– Completing formsCompleting forms
NEXT SLIDE
© 2006 Prentice-Hall, Inc.
48
Technology In Action Chapter 12
Client-Side ApplicationClient-Side ApplicationClient-Side ApplicationClient-Side Application
• A program that runs on a client computer A program that runs on a client computer with no interaction with the serverwith no interaction with the server
• Types of client-side applications include:Types of client-side applications include:– HTML document embedded with JavaScript codeHTML document embedded with JavaScript code– Applet:Applet:
Small program that resides on the serverSmall program that resides on the server
• A program that runs on a client computer A program that runs on a client computer with no interaction with the serverwith no interaction with the server
• Types of client-side applications include:Types of client-side applications include:– HTML document embedded with JavaScript codeHTML document embedded with JavaScript code– Applet:Applet:
Small program that resides on the serverSmall program that resides on the server
NEXT SLIDE
© 2006 Prentice-Hall, Inc.
49
Technology In Action Chapter 12
Extensible Markup Language Extensible Markup Language (XML)(XML)
Extensible Markup Language Extensible Markup Language (XML)(XML)
• Designed for information exchangeDesigned for information exchange• Tools used to create your own markup Tools used to create your own markup
languagelanguage• Used in e-commerce transactionsUsed in e-commerce transactions
• Designed for information exchangeDesigned for information exchange• Tools used to create your own markup Tools used to create your own markup
languagelanguage• Used in e-commerce transactionsUsed in e-commerce transactions
NEXT SLIDE
© 2006 Prentice-Hall, Inc.
50
Technology In Action Chapter 12
Communications Over the InternetCommunications Over the InternetCommunications Over the InternetCommunications Over the Internet
• E-mail:E-mail:– Created in 1971 by Ray TomlinsonCreated in 1971 by Ray Tomlinson– Simple Mail Transfer Protocol (SMTP)Simple Mail Transfer Protocol (SMTP)– Multipurpose Internet Mail Extensions (MIME)Multipurpose Internet Mail Extensions (MIME)
Protocol for attaching files to e-mailProtocol for attaching files to e-mail
• E-mail security:E-mail security:– Encryption: Encryption:
Private-key encryptionPrivate-key encryptionPublic-key encryption (128-bit key)Public-key encryption (128-bit key)
– Secure data transmission softwareSecure data transmission softwareSafeMessage SafeMessage
• E-mail:E-mail:– Created in 1971 by Ray TomlinsonCreated in 1971 by Ray Tomlinson– Simple Mail Transfer Protocol (SMTP)Simple Mail Transfer Protocol (SMTP)– Multipurpose Internet Mail Extensions (MIME)Multipurpose Internet Mail Extensions (MIME)
Protocol for attaching files to e-mailProtocol for attaching files to e-mail
• E-mail security:E-mail security:– Encryption: Encryption:
Private-key encryptionPrivate-key encryptionPublic-key encryption (128-bit key)Public-key encryption (128-bit key)
– Secure data transmission softwareSecure data transmission softwareSafeMessage SafeMessage
NEXT SLIDE
© 2006 Prentice-Hall, Inc.
51
Technology In Action Chapter 12
Instant Messaging (IM)Instant Messaging (IM)Instant Messaging (IM)Instant Messaging (IM)
• Client/server application program for real-Client/server application program for real-time, text based conversationstime, text based conversations
• Popular instant messaging programs:Popular instant messaging programs:– AOL Instant MessengerAOL Instant Messenger– ICQICQ– Yahoo! MessengerYahoo! Messenger– Windows MessengerWindows Messenger
• Client/server application program for real-Client/server application program for real-time, text based conversationstime, text based conversations
• Popular instant messaging programs:Popular instant messaging programs:– AOL Instant MessengerAOL Instant Messenger– ICQICQ– Yahoo! MessengerYahoo! Messenger– Windows MessengerWindows Messenger
NEXT SLIDE