Você está na página 1de 20

Lecture 1 Computer network allowing people to connect to computers Internet- interconnected is connected to a global network e.g.

. Google,yahoo (I) Two networks connected to together such as DMU and Leicester, which is a small network(i) WWW web browser easy to use and accessible Mailing list Emails received from other companies e.g. Argos Network Access Providers provides internet to larger business e.g. DMU ISP sells to small business and individuals. Hypertext Server Stores HTMl Files and allows computer to connect and read files Web sever they use hypertext protocol on the web HTMl is a set of code Hypertext links is hyper link Web Browser GUI Lecture 2 Local Area Network Networks within a small location Wide area network Networks connected over a great distance Circuit- is a normal circuit Circuit Switching- single line which only activates when something gets sent down the line e.g. telephone call. It does not work well when sending data over a large network. Packet are small pieced that are labelled electronically, Origin - Travel along interconnected networks, Sequence - Can take different paths, Destination - May arrive out of order. Routing Computers Decides on how to forward each packet also known as ( Router computers, routers, gateway computers, border routers) Border routers makes a route your network and the external network Routing algorithms- programs the routing computer and determines the path for the packet Routing table includes a list of connection (Packets) it uses the table to determine which connection to use first and handles heavy packets through traffic and network congestion . Hubs, switches and bridges- they move the packets

Internet backbone internet routers handle packets traffic along main connecting points. Protocol- is a special collection of network rules which include transmission rules. Also computers must use the same protocol. Network Control Protocol- it allows users to access and use computers at remote locations and to transmit files between computers. Proprietary architecture (closed architecture) it is when a manufacture creates a protocol, which they can only develop or manufacture. Open architecture - uses the common protocol and four key messages handling rules . Transmission control protocol - it enables two host to establish a connection and exchange data , it also guarantees delivery of data and guarantees the delivery will be sent in the same order. Internet Protocol specifies addressing details for each packet and labels the packet with the senders and receivers address. TCP/IP- refers to both protocols. IP addressing is a unique address which is assigned to a computer to communicate over a network. It is also a 32 bit number. Base 2 is a number system which computers use for internal calculations. Router breaks messages in to packets which contain the source and destination of the IP Address. Dotted decimal is four numbers separated by periods for example IP address range: 0.0.0.0 to 255.255.255.255 Byte (8 bit number) called an octet, its binary values are 00000000 to 11111111 its equivalents to decimal is 0 to 255. Subnetting - is when a single IP address is modified. It changes the subnet mask of the local network Private IP address are when IP numbers are not permitted on internet packets. Network Address Translation (NAT) Converts private IP address into normal IP addresses Domain Names is a set of words assigned to specific IP address e.g. www.sandiego.edu Web client software - sends web page file request to other users. Web server software receives requests from many different web clients Client / server architecture this is a combination of client and server computers. Hypertext Transfer protocol (HTTP) HTTP determines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. E.g. when you type a URL in your browser, this actually sends an HTTP command to the Web server directing it to get and transmit the requested Web page.

Uniform resources locator (URL)- it is a combination of protocol name and domain name.it also locates resources on another computer. Electronic mail Email server it stores and forwards email messages Email client software - it reads and sends email and communicated to the email server software Simple mail transfer protocol is a TCP/IP protocol used in sending and receiving email. Post Office Protocol (POP) It sends mail to user computers and deletes from servers, checks if new mail has arrived. Multipurpose Internet Mail Extension (MIME) is a set of rules for handling binary files. Interactive Mail Access Protocol - a protocol for retrieving e-mail messages. It also includes POP functions and includes additional functions. Spam is also known unwanted mail or junk mail, it also consumes large amount of internet capacity, and it distracts employees. Lecture 3 Intranet is an Interconnected network (DMU Blackboard) which Uses TCP/IP protocol set and it does not extend beyond the organisation. Extranet is the intranet extended, and it includes boundaries outside the organisation. Public Network the network is publicly available Private Network is a connection between two computers, this is a leased line. Leased-Line Connection A leased line is a permanent connection between two locations, it is always on. The connection is very secure but costs a lot to setup (problem: adding more companies). Virtual Private Network - A VPN is an Extranet using public networks and protocols. It uses IP tunneling. IP Tunneling (encapsulation) System has a private passageway through the internet as well as a secure transmission. Encapsulation this encrypts packets and places them inside another packet (outer packet). IP Wrapper This is the outer packet. Internet access providers or internet service providers (IAPs or ISPs) - they provide a connection to the internet for individuals, businesses etc. They offer several connection options. Connection Options - Voice-grade telephone lines, various types of broadband connections, leased lines, wireless.

Bandwidth The amount of data that can be transmitted in a fixed amount of time. Net Bandwidth the speed the information travels. Symmetric Connections provide the same bandwidth both directions. Asymmetric Connections provides different bandwidth for each direction. Upstream bandwidth (upload bandwidth) this information is given to the internet from the user in a certain amount of time Downstream bandwidth (download bandwidth) - the information given to the user from the internet in a certain amount of time. Plain old telephone service (POTS) which refers to the standard telephone service that most homes use. Digital Subscriber Line (DSL) - It is used for transferring data over a regular phone line and can be used to connect to the Internet. Integrated Services Digital Network (ISDN) - First technology developed using DSL protocol suite Asymmetric digital subscriber line (ADSL) is a used for transmitting digital information at a high bandwidth on existing phone lines to homes and businesses. High-speed DSL (HDSL) More than 768 Kbps symmetric bandwidth T1 line (DS1) can carry data at a rate of 1.544 megabits per second (Carries 24 DS0 lines (1.544 Mbps) Fractional T1 - 128 Kbps and upward in 128-Kbps increments T3 (DS3) - 44.736 Mbps Optical fiber - used instead of copper wire, data is transferred faster. ATM (Asynchronous Transfer Mode) - is a protocol which encodes data traffic into small cells Frame Relay - used to send digital information quickly and cheaply in a relay of frames to one or many destinations from one or many end-points. Personal area networks (PANs) or piconets are small Bluetooth networks which consumes little power. They can discover one another and also exchange information automatically. Ultra Wideband (UWB) is a connection over a small distance which provides a bandwidth speed up to 480Mbps Wi-Fi - also known as wireless Ethernet, 802.11b Wireless access point (WAP) they transmit packets between other Wi-Fi computers and other devices within range.

802.11b (11 Mbps) range of about 300 feet 802.11a (54 Mbps): - not 802.11b compatible 802.11g (54 Mbps): - 802.11b compatible Roaming switching between from one WAP to another Hot Spots WAPs open to public

Lecture 4 Webserver basics part 2 Client/server architectures used everywhere (lans, wans, we b). The client requests server services. Web browser It is also known as a web client. The computer and display webpages from the web server. Browsers are platform neutral allowing the internet to be accessed from anywhere e.g windows and macs Webserver- main job is to respond to web client requests. Dynamic page- content is always changing; the program shapes the web page. Static page- the web pages does not change every time it is received from the web server. Dynamic content- every time the page comes back it has different element to the page. The same page never returns UNLESS the same information is sent to the server. Approaches for creating dynamic content

Client-side scripting

Software changes what the user sees, resulting from the users actions Example of software , adobe flash , javascript Server-side scripting

Runs on the server Program creates webpages when given specific information from a webclient.
Examples of webserver software Microsoft Active Server Pages (ASP): ASP.NET Sun Microsystems JavaServer Pages (JSP): Java servlets Open-source Apache Software Foundation Hypertext Preprocessor (PHP)

Adobe Cold Fusion

Dynamic page generation tools AJAX (asynchronous JavaScript and XML) Creates interactive Web sites looking like applications Example: Google Maps Ruby on Rails Creates dynamic Web pages with interface looking like application Python Scripting language

Server- servers have many roles, could provide files to other computers (clients), control printing, email storage and make programs available. May connect through a router to the Internet Run Web server software

Webserver connects to the internet Runs programs allows sharing of files and programs. E-mail server: handles incoming, outgoing e-mail Database server

Runs database management software

Web browser requests files from Web server

Sent over : the Internet Request formatted by browser using HTTP Request sent to server computer Server receives request Retrieves file containing requested Web page Formats using HTTP Sends back to client over the Internet Client Web browser software Displays page on client machine

Two-tier client/server architecture One client one server

3 tier architecture client to server Three-tier architecture extends the two tier architecture providing additional processes for example data of information stored in a database needed to generate a dynamic page). Third tier architecture includes databases and other application softwares that supplies information back to the web server that outputs when responding to the client. Web client requests and the request is formatted using http and sent over the internet to the web server. Web server determines that the request requires information from the database. It sends it to the database application. The database retrieves and finds the information and sends it back to the web server. The webserver responds back to and the message is formatted into http and sends it over the internet to the web client. The web browser displays the results in the screen. Example: catalog-style Web site search, update, display functions

Brief detail of Lecture 5: Operating systems for web servers. The operating system runs programs and allocates resources from the hard drive. It provides input and output services, such as keyboards and mouse are the input and the output could be a screen monitor. Larger system responsibilities such as tackling multiple users logged in, ensuring no interference with programs. Web server operating systems software types of server products include Microsoft windows server products Linux UNIX based operating systems FREEBSD SUNS SOLARIS. Microsoft server products

Simple to learn and use, but however raise a security threat due to the popularity of use, which hackers have produced viruses to damage equipment. High support is available. Linux -Open source software, which means you can modify some aspects of the software, to enhance or improve certain areas or just to install softwares. -Fast, efficient and easy to install -Free to download -Most companies buy it through a commercial distributor, includes additional utilities, such as terminal; limited support is available. Webserver Software Few of the commonly used Web server programs is the Apache HTTP Server, Microsoft Internet Information Server (IIS), Sun Java System Web Server (JSWS) Netcraft December 2009 Web survey indicates that Web server software market share stabilized in recent years Web server performance is dramatically decreased due to Workload, operating system, Web pages served Apache HTTP Server Created : 1994 by Rob McCool developed Apache Extension had original core system with patches known as a patchy server (Apache) Reasons Apache dominated Web since 1996 because it is Free and performs efficiently, Runs on many operating systems and supporting hardware Microsoft Internet Information Server has the following aspects -Bundled with Microsoft Windows Server OS -Used on many corporate intranets -Used by small and large sites -Run only on Windows server operating systems (by design) -Supports ASP, ActiveX Data Objects, SQL database queries -Produces dynamic Web pages by: -Including HTML pages, ActiveX components, scripts

Sun Java System Web Server has the following main aspects: -Original NCSA Web server program descendent -2009: key elements became open source

-Runs on many operating systems: -HP-UX, Solaris, Windows -Runs on about 1 percent of all Web servers -Supports dynamic application development for server-side applications -Provides connectivity to a number of database products

Website utility programs has the following Website utility tools aid/support developers These tools are used on client computers, which web developers use when they are creating Web sites Finger - who is logged on? finger programs that provide status reports on a particular computer system or a particular person at network sites. Ping connectivity, # of hops, which is done in the command interface to check connectivity of devices, via ip addresses Tracert trace route/timing-network diagnostic tool for displaying the route (path) and measuring transit delays of packets across an Internet Protocol (IP) network Telnet remote login-Telnet is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communications facility using a virtual terminal connection. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP). FTP - file transfer-File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one host to another host over a TCP-based network, such as the Internet. indexing + searching tools data analysis s/w tracking users link-checking utilities check website links remote server administration control a Web site from any Internet-connected computer Webserver hardware -Webserver hardware hosts electronic commerce operations

-Wide variety of computer brands, types, sizes used -Small companies run Web sites on desktop PCs -Most Web sites operate on computers designed for site hosting Server Computers Comparing desktop PCs to server computers, Servers use faster and highercapacity hardware Costs -Low-end: $800-$1,500 -More common: $2,000-$200,000 Companies selling Web server hardware provide Web site configuration tools Housing Web server computers Freestanding cases Installed in equipment racks Blade servers: servers-on-a-card Small: 300 installed in single 6-foot rack Fundamental Web server job Process and respond to HTTP Web client requests Virtual server (virtual host) Maintains more than one server on one machine Different groups have separate domain names All domain names refer to same physical Web server

Web Server Performance Evaluation Benchmarking is a way of testing to compare hardware and software performance Elements affecting overall server performance

Hardware, operating system software, server software, connection speed, user capacity, type of Web pages delivered Connection speed (T3 faster than T1) Number of users server can handle Important and hard to measure -Throughput is when the HTTP requests hardware and software process in a unit of time -Response time is the time the server requires to process one request. -Choosing Web server hardware configurations, Run tests on various combinations, consider scalability, compare standard benchmarks -Objective is to provide site visitors with best service possible Web Server Hardware Architectures -Electronic commerce Web sites use tiered architecture, which divides work of serving Web pages and may use more than one computer within each tier -Server farms are large collections of servers Lined up row after row -Centralized architecture uses a few large and fast computers, but requires expensive computers, but has a high rate of technical problems due to sensitivity and requires adequate backup plans.

-Load-balancing systems load-balanced switch is a switch architecture which guarantees 100% throughput, (the equivalent of perfect arbitration), with no central arbitration at all, at the cost of sending each packet across the crossbar twice. Load-balanced switches are a subject of research for large routers scaled past the point of practical central arbitration. -Network hardware monitoring server workloads assigns incoming Web traffic to the server with most available capacity -Simple load-balancing system Traffic enters through sites router Encounters load-balancing switch

Directs traffic to best Web server

Simple Example:

Load-balancing systems More complex load-balancing systems, do the following: incoming Web traffic enters from two or more routers Directed to groups of dedicated Web servers

Advanced Example:

Summary There are several types of operating systems used on Web servers Web server utility programs are helpful for the programmer to troubleshoot/build the network Web server hardware is an important consideration in online business site design Understand Web server performance, such as Factors, evaluation tools and solutions

Lecture 6
Web hosting alternatives and basic functions of ecommerce software Web hosting alternatives Different ways for businesses to web hosting and help them in electronic commerce:

Self-hosting. Running the servers in houses. This is used by large organisation Third party web hosting. For e.g. godaddy.com this is usually used by medium size business and small businesses CSP is commerce service provider. They help businesses various things like internet access, online marketing, website developing and hosting etc. they basically help the

businesses to sell or buy any product through ecommerce. It also contains Managed service providers MSPs and Application service providers ASPs.
Service provider hosts arrangements

They host one clients website on a server which at the same time also holds other websites as well. This is operated by the service provider at its location. Service provider hosts do dedicated hosting in which client web server is not shared with other clients. Their responsibilities are to own server hardware, lease the hardware to client, maintain web server hardware & software and provide internet connection. Co-location service. This is where the service provider would provide physical space to the client and provide reliable power supply and inter connection for them. Google directory, web host directory and local phone directory can be used to find a service provider. Webs server-hosting decisions: they need to make sure that hardware & software platform are can be upgraded when the sites web traffic increases. Webs server requirements are related to the ecommerce site transaction volume and the web traffic. Scalable hardware & software combinations, basically software and hardware need to be adaptable when the requirements change and client wants to grow and wants better service which would lead to better hardware and software.

Basic functions of Ecommerce software Basic functions of an ecommerce website contain catalogue display, shopping cart and transaction processing.

In order to create successful ecommerce site it requires software and hardware products for building sites. There are externally hosted stores with software tools and sophisticated ecommerce software suites like ekmpowershop.com and several other website available online to help create an ecommerce site. Ecommerce software should be chosen after taking the following things in consideration: expected enterprise size, the projected traffic on the site and sales, the budget of the organisation they want to spend on to develop their website, this would contain online store creation costs, external and hosting costs etc. All ecommerce website must provide catalogue display, shopping cart, transaction processing or basket. Whereas larger complex websites would need to add software adding features and capabilities to basic commerce tool set.

Now explaining catalogue display, shopping cart, transaction processing Catalogue display Catalogue organises all the products or service that is sold by the organisation into categories. Single product/service may appear in multiple categories. Static catalogue is a simple list of products

written in HTML web page or a series of web pages. Dynamic catalogue stores the item information in a database. Large ecommerce sites include many different features such as dynamic catalogue aids and tools, giving the website a professional look. Small online stores require a simple products or categories list. The item categorisation is not important. They can provide photo of the product with the link of the product. Or use a static catalogue with a simple list of products on webpage. Good ecommerce website also provides alternative ways to find the products for e.g. search bar. Shopping cart Early ecommerce websites used forms based shopping the user would fill out the form and then the website would process the order and it would be awkward ordering more than one or two items. Problems were the customer needs to write down the product codes, unit prices, and other information before ordering. Customer would forget if they have clicked the submit button. This would cause confusion and error prone.

Electronic shopping carts, Which is now the standard method for processing sales, keep track of items customer has selected, allows them to view content in the cart/basket and also add or remove items. Ordering requires a simple click which stores the item details in the cart, after finishing adding items it goes to billing and shipping information. BIZNET Internet Services, SalesCart, WebGenie software are all shopping cart software. Stateless systems unable to remember anything form one transmission or session to another. To save the shopping cart information for later cookies are used, it allows the information to be stored exactly the same way and also allows unique user identification. If the browser of the user does not allow cookie storage the ecommerce software automatically saves the temporary numbers for e.g. ShopSite.

Basic ecommerce website architecture Transaction processing or basket Transaction is done when the user wants to checkout from the website. Ecommerce software performs all the calculations. The web browser of the user and the merchant web server software switch into the secure communication state for e.g. HTTPS secured server. Most companies use accounting software package. It records sales and catalogue movements it needs to be integrated with accounting software. Business use software to update their tax rates like FedEx and UPS shipping rate software which integrates with the ecommerce software. Other calculations such as promotional and time sensitive offers are done in transaction as well. Large companies integrations may be complex. Lecture 7 - Online Security Issues

Computer Security - Protection from unauthorized access, use, alteration, destruction. This refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization. Most computer security measures involve data encryption and passwords.

Physical security This includes alarms, guards, fireproof doors, security fences, safes or vaults, and bombproof buildings. Physical security is the protection of personnel, hardware, programs, networks, and data from physical circumstances and events that could cause serious losses or damage to an enterprise, agency, or institution. This includes protection from fire, natural disasters, burglary, theft, vandalism, and terrorism.

Logical security - Asset protection using nonphysical means. It consists of software safeguards for an organizations systems, including user identification and password access, authentication, access rights and authority levels. These measures are to ensure that only authorized users are able to perform actions or access information in a network or a workstation. It is a subset of computer security.

Elements of logical security - User IDs, also known as logins, user names, logons or accounts etc.

Threat - Any act or object posing danger to computer assets. Threats to the security and the privacy of data can occur through malpractice and crime. Countermeasure - Procedure (physical or logical). Recognizes, reduces, eliminates threat A measure or action taken to counter or offset another one. Crackers or hackers - Obtain unauthorized access to computers and networks. The term hacker is used in popular media to describe someone who attempts to break into computer systems. Typically, this kind of hacker would be a proficient programmer or engineer with sufficient technical knowledge to understand the weak points in a security system. White hat hacker Good hacker, used by business to find any flaws or errors made, to improve the website or system etc. Identify risks Determine how to protect threatened assets. Calculate costs to protect assets. Black hat hacker Bad hacker- own purposes. Make money, change/manipulate data/information.

Security policy In business, a security policy is a document that states in writing how a company plans to protect the company's physical and information technology (IT) assets. A security policy is

often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.

Integrated security - Having all security measures work together. Prevents unauthorized disclosure, destruction, modification of assets

Example - Allows a SQL Server to use Windows NT authentication mechanisms to validate logins for all connections. Only trusted (multi-protocol or named pipes) connections are allowed. Also known as domain-managed security.

Você também pode gostar