Escolar Documentos
Profissional Documentos
Cultura Documentos
LECTURE 1: INTERNET
Internet - is a collection of computers throughout the world which are mostly connected using telephone lines for the purpose of sharing. - Historically, the Internet was used mainly by governments and educational institutions. 1993 the graphical browser called Mosaic was developed by Marc Andreessen and his team at the National Center for Supercomputing Applications (NCSA) gave the its big boost. Later, Andreessen moved to become the brains behind Netscape Corp., which produced the most successful graphical type of browser and server. Microsoft declared war and developed its MicroSoft Internet Explorer. Microsofts full scale entry into the browser, server, and Internet Service Provider market completed the major shift over to a commercially based Internet. Bill Gates shows the determination to capitalize on the enormous growth of Internet. Today, the Internet is used by millions of people including individuals, small and large businesses, associations, schools, universities, and governments. The most popular part of the Internet is the World Wide Web.
World Wide Web (WWW) - is one of the protocols that let you link to many sites in the Internet. - The basic unit is the web page. A page can be one or many screens as it displays in your monitor. - The Web was invented by Tim Berners-Lee and others at the European Laboratory for Particle Physics (CERN) in Switzerland. The Web consists of the following: 1. Your personal computer. 2. Web Browser Software to access the Web. 3. A connection to an Internet Service Provider (ISP). Internet Service Provider (ISP) - is a company that provides a telecommunication connection to the Internet that allows a user to "be online". - The connection may be provided in many different forms. It could use existing telephone lines, existing cable TV lines, new fiber optic cable may be strung or the user has to use a modem and dial a phone number. - Examples of ISPs are: AOL, Earthlink, MSN, Time Warner Cable, Verizon, etc. 4. Servers to host data. 5. Routers and switches to direct the flow of data. How Does the Web Works? Uniform Resource Locator (URL) - the global address of documents and other resources on the World Wide Web.
http:// indicates that the browser and web server willcommunicate using Hypertext Transfer Protocol. www indicates a resources coming from the World Wide Web. .yahoo.com called the domain, identifies which computer called web server, host the site.
=========================================================================================== - aebihis
Domain Name - denotes the name of specific Internet area controlled by a company, school, or organization. - Typical domain names cosnsist of some form of organizations name and a suffix that describes the type of organization: .com corporation .edu educational institutions .gov government institution .mil military organization .net network provider .org non profit organization The end of a domain name can often tell you the country of origin: .ph Philippines .uk United Kingdom .fr France .jp Japan What can we do on the Internet: 1. Electronic-mail (E-mail) 2. Information 3. Group Discussion 4. Entertainment 5. News 6. On Line Shopping 7. Free Programs (software) Computer Virus - is a program that invades your computer system, hides there, and makes copies of (replicates) itself. - Viruses spread when you launch an infected application or start up your computer from a disk that has infected system files. - Some viruses are programmed specifically to damage the data on your computer by corrupting programs, deleting files, or erasing your entire hard disk.
=========================================================================================== - aebihis
=========================================================================================== - aebihis
Two types of search engines: 1. Individual search engines compile their own searchable databases on the web. 2. Meta-searchers - do not compile databases. Instead, they search the databases of multiple sets of individual engines simultaneously. - provide a quick way of finding out which engines are retrieving the best results for you in your search. - Example: http://www.alenka.cz Alenka it enables you to search through various Internet databases. In the Philippines, some of the famous Search Engines are: Yehey.com pinoycentral.com Edsaworld.com Library Gateways - are collectins of reviewd and recommended links that have been created by subject specialists, usually librarians, to support research needs and to pinpoint high quality sites on the web. ===========================================================================================
- aebihis
point to realize databases on the web created by professors, researchers, expert, government agencies, business interests, or other subject specialists and individuals who have a deep interest in a particular field and have accumulated and compiled web links to it.
Cache - downloaded files are stored in a cache (pronounced cash) on your hard drive.
Netiquette
its network etiquette that is, the etiquette of cyberspace. is a set of rules for behaving properly online.
Etiquette - the forms required by good breeding or prescribed by authority to be required in social or official life. Golden Rule: 1. Remember the human. Stand up for yourself, but try not to hurt peoples feelings. 2. Adhere to the same standards of behavior online that you follow in real life. Standards of behavior may be different in some areas of cyberspace, but they are not lower than in real life. 3. Know where you are in cyberspace. When you enter a domain of cyberspace thats new to you, take look around. Spend a while listening to the chat or reading the archives. Get a sense of how the people who are already there act. 4. Respect other peoples time and bandwidth. Its your responsibility to ensure that the time they spend reading your posting isnt wasted. 5. Make yourself look good online. 6. Know how to handle flames. Be pleasant and polite. Know what youre talking about and make sense. Dont post flame-bait. 7. Help keep flame wars under control. Flaming is what people do when they express a strongly held opinion without holding back any emotion. 8. Share expert knowledge. Dont afraid to share what you know. 9. Respect other peoples privacy. 10. Dont abuse your power. 11. Be forgiving of other peoples mistake.
=========================================================================================== - aebihis
Mobile Wireless Standards for Web Access Wireless Application Protocol (WAP) - is the set of rules that controls how wireless devices access Web applications. The Wireless Markup Language (WML) combines HTML and XML languages with the requirements for properly displaying information on the small screen. It's most important characteristic is that it describes data rather than just how the data are displayed. The microbrowser included on wireless devices is similar to a
=========================================================================================== - aebihis
regular Web browser you would use on a PC but is optimized for the limitations imposed on the smaller devices.
=========================================================================================== - aebihis
The recent proliferation of wireless technology is technically known as the 802.11 networking standard. It's more commonly, and easily, called Wi-Fi for wireless fidelity. can help save money by negating the need for additional phone lines for Internet access or to use a single peripheral device such as a printer among several different computers. Each computer requires a wireless network interface card (NIC) containing a built-in radio and antenna. These cards are relatively inexpensive and you can avoid duplicating more expensive equipment by using a wireless network.
EV-DO and Wireless Cellular Access Cellular telephone companies are continuing the march towards total convergence of all things digital with its Evolution Data Optimized (EV-DO) technology. EV-DO - allow even more ways for users to access digital content from the Internet and other networks whether that data is voice, videos, graphics, documents, text messaging, or photographs. It won't be long before the same connectivity people enjoy in their homes and offices will be available anywhere, anytime, in any form.
=========================================================================================== - aebihis
LECTURE 5: NETWORKING
Networking is the practice of linking two or more computing devices together for the purpose of sharing data. Networks are built with a mix of computer hardware and computer software.
1. Client/Server Computing
facilitates computing on all kinds of networks including the Internet. Instead of one huge mainframe with individual nodes, smaller computers called servers connect to many clients. This type of network is ideal for companies that are continually expanding their networks or replacing hardware components.
2. Packet Switching
is a method of breaking large blocks of text into smaller chunks of data and routing them in the most economical way through whichever communication channel is available. The data were broken into small packets on their way out of the server computer and then sent to and reassembled on the client computer. It happens so quickly and so efficiently that you don't even notice. also checks for transmission errors when data travel from one location to another.
Networking Models
When dealing with networking, you may hear the terms "network model" and "network layer" used often. Network models define a set of network layers and how they interact. There are several different network models depending on what organization or company started them. The most important two are:
=========================================================================================== - aebihis
The TCP/IP Model - sometimes called the DOD model since it was designed for the department of defense. - it is also called the internet model because TCP/IP is the protocol used on the internet. OSI Network Model - the International Standards Organization (ISO) has defined a standard called the Open Systems Interconnection (OSI) reference model. - this is a seven layer architecture
Open Systems Interconnect (OSI) - defines a networking framework for implementing protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in one station, and proceeding to the bottom layer, over the channel to the next station and back up the hierarchy. - is similar to TCP/IP in that it supports any hardware and software connected to the network. - was developed as an international reference model.
Application (Layer 7) - This layer supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. - This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer. Presentation (Layer 6) - This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. - This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. - It is sometimes called the syntax layer. Session (Layer 5) - This layer establishes, manages and terminates connections between applications. - The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. - It deals with session and connection coordination. Transport (Layer 4) - This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. - It ensures complete data transfer. Network (Layer 3) - This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node.
=========================================================================================== - aebihis
Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling,congestion control and packet sequencing.
Data Link (Layer 2) - Data packets are encoded and decoded into bits. - It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. - The data link layer is divided into two sub layers: o The Media Access Control (MAC) layer - controls how a computer on the network gains access to the data and permission to transmit it. o Logical Link Control (LLC) layer - controls frame synchronization, flow control and error checking. Physical (Layer 1) - This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and mechanical level. - It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects. - Fast Ethernet, RS232, and ATM are protocols with physical layer components.
Networking Media
Cables have different specifications and expectations. Important considerations related to performance are as follows: What speeds for data transmission can be achieved? The speed of bit transmission through the cable is extremely important. The speed of transmission is affected by the kind of conduit used. Will the transmissions be digital or analog? Digital or baseband transmission and analog or broadband transmission require different types of cable. How far can a signal travel before attenuation becomes a concern? If the signal is degraded, network devices might not be able to receive and interpret the signal. The distance the signal travels through the cable affects attenuation of the signal. Degradation is directly related to the distance the signal travels and the type of cable used. The following Ethernet specifications relate to cable type: 10BASE-T - refers to the speed of transmission at 10 Mbps. - The type of transmission is baseband, or digitally interpreted. - The T stands for twisted pair. 10BASE5 - refers to the speed of transmission at 10 Mbps. - The type of transmission is baseband, or digitally interpreted. - The 5 indicates that a signal can travel for approximately 500 meters before attenuation could disrupt the ability of the receiver to interpret the signal. - is often referred to as Thicknet. Thicknet is a type of network and 10BASE5 is the Ethernet specification used in that network. 10BASE2 - refers to the speed of transmission at 10 Mbps. - The type of transmission is baseband, or digitally interpreted.
=========================================================================================== - aebihis
The 2, in 10BASE2, refers to the approximate maximum segment length being 200 meters before attenuation could disrupt the ability of the receiver to appropriately interpret the signal being received. The maximum segment length is actually 185 meters. is often referred to as Thinnet. Thinnet is a type of network and 10BASE2 is the Ethernet specification used in that network.
Physical Media: 1. Twisted pair - Wire is twisted to minimize crosstalk interference. It may be shielded or unshielded. Unshielded Twisted Pair (UTP). Normally UTP contains 8 wires or 4 pair. 100 meter maximum length. 4-100 Mbps speed.
Shielded Twisted Pair (STP). 100 meter maximum length. 16155 Mbps speed. Lower electrical interference than UTP.
2. Coaxial - Two conductors separated by insulation such as TV 75 ohm cable. Maximum length of 185 to 500 meters.
Thinnet. Thinnet uses a British Naval Connector (BNC) on each end. Thinnet is part of the RG-58 family of cable*. Maximum cable length is 185 meters. Transmission speed is 10Mbps. Thinnet cable should have 50 ohms impedance and its terminator has 50 ohms impedance. A T or barrel connector has no impedance. Thicknet. Half inch rigid cable. Maximum cable length is 500 meters. Transmission speed is 10Mbps. Expensive and is not commonly used. (RG-11 or RG-8). A vampire tap or piercing tap is used with a transceiver attached to connect computers to the cable. 100 connections may be made. The computer has an attachment unit interface (AUI) on its network card which is a 15 pin DB-15 connector. The computer is connected to the transceiver at the cable from its AUI on its network card using a drop cable.
3. Fiber-optic - Data is transmitted using light rather than electrons. This is the most expensive and most difficult to install, but is not subject to interference. Two types of cables are: Single mode cables for use with lasers. Multimode cables for use with Light Emitting Diode (LED) drivers.
=========================================================================================== - aebihis
Network Topologies
Network topology defines the structure of the network. One part of the topology definition is the physical topology, which is the actual layout of the wire or media. The other part is the logical topology, which defines how the hosts access the media to send data. A bus topology uses a single backbone cable that is terminated at both ends. All the hosts connect directly to this backbone. A ring topology connects one host to the next and the last host to the first. This creates a physical ring of cable. A star topology connects all cables to a central point. An extended star topology links individual stars together by connecting the hubs or switches. A hierarchical topology is similar to an extended star. However, instead of linking the hubs or switches together, the system is linked to a computer that controls the traffic on the topology. A mesh topology is implemented to provide as much protection as possible from interruption of service. For example, a nuclear power plant might use a mesh topology in the networked control systems. As seen in the graphic, each host has its own connections to all other hosts. Although the Internet has multiple paths to any one location, it does not adopt the full mesh topology.
=========================================================================================== - aebihis
Considerations When Choosing a Topology: Money. A linear bus network may be the least expensive way to install a network; you do not have to purchase concentrators. Length of cable needed. The linear bus network uses shorter lengths of cable. Future growth. With a star topology, expanding a network is easily done by adding another concentrator. Cable type. The most common cable in schools is unshielded twisted pair, which is most often used with star topologies.
To determine the network segment a MAC address belongs to, bridges use one of: o o Transparent Bridging They build a table of addresses (bridging table) as they receive packets. If the address is not in the bridging table, the packet is forwarded to all segments other than the one it came from. This type of bridge is used on ethernet networks. Source route bridging The source computer provides path information inside the packet. This is used on Token Ring networks.
3. Hubs is a device that is used to connect multiple nodes to a single point and the hub is used to connect these nodes to the network.
=========================================================================================== - aebihis
The signal passes through the hub first and then reaches the nodes so it basically functions like a connector in many networks.
4. Switches are very similar in functionality to the bridges. However the switches use more ports of connectivity than a bridge. are now taking over all other devices including the hubs and the bridges.
5. Repeater - connects two segments of your network cable. - It retimes and regenerates the signals to proper amplitudes and sends them to the other segments. When talking about, ethernet topology, you are probably talking about using a hub as a repeater. Repeaters require a small amount of time to regenerate the signal. This can cause a propagation delay which can affect network communication when there are several repeaters in a row. Many network architectures limit the number of repeaters that can be used in a row. Repeaters work only at the physical layer of the OSI network model.
Types of Networks: 1. Local Area Networks (LANs) - allow businesses to locally share computer files and printers efficiently and make internal communications possible. - Example of this technology is e-mail. The LANs manage data, local communications, and computing equipment. LANs consist of the following components: Computers Network interface cards Peripheral devices Networking media Network devices 2. Wide Area Networks (WANs) - access to computers or file servers in other locations. Because WANs connect user networks over a large geographical area, they make it possible for businesses to communicate across great distances. - allow computers, printers, and other devices on a LAN to be shared with distant locations. - provide instant communications across large geographic areas. Collaboration software provides access to real-time information and resources and allows meetings to be held remotely. WANs have created a new class of workers called telecommuters. These people never have to leave their homes to go to work.
=========================================================================================== - aebihis
WANs are designed to do the following: Operate over a large and geographically separated area Allow users to have real-time communication capabilities with other users Provide full-time remote resources connected to local services Provide e-mail, Internet, file transfer, and e-commerce services 3. Metropolitan Area Networks (MANs) - areas can also be used to create a MAN. - usually consists of two or more LANs in a common geographic area. - Example, a bank with multiple branches may utilize a MAN. Typically, a service provider is used to connect two or more LAN sites using private communication lines or optical services. - can also be created using wireless bridge technology by beaming signals across public areas. 4. Storage Area Networks (SANs) - used to move data between servers and storage resources. Because it is a separate, dedicated network, it avoids any traffic conflict between clients and servers. - allows high-speed server-to-storage, storage-to-storage, or server-to-server connectivity. - This method uses a separate network infrastructure that relieves any problems associated with existing network connectivity. SANs offer the following features: Performance SANs allow concurrent access of disk or tape arrays by two or more servers at high speeds. This provides enhanced system performance. Availability SANs have built-in disaster tolerance. Data can be duplicated on a SAN up to 10 km (6.2 miles) away. Scalability A SAN can use a variety of technologies. This allows easy relocation of backup data, operations, file migration, and data replication between systems. 5. Virtual Private Networks (VPNs) - is a private network that is constructed within a public network infrastructure such as the global Internet. - Using VPN, a telecommuter can remotely access the network of the company headquarters. Through the Internet, a secure tunnel can be built between the PC of the telecommuter and a VPN router at the company headquarters. - is the most cost-effective way to establish a point-topoint connection between remote users and an enterprise network. Intranet and Extranet Intranet - one common configuration of a LAN - Intranet Web servers differ from public Web servers in that the public must have the proper permissions and passwords to access the intranet of an organization.
=========================================================================================== - aebihis
are designed to permit users who have access privileges to the internal LAN of the organization. Within an intranet, Web servers are installed in the network. Browser technology is used as the common front end to access information on servers such as financial, graphical, or text-based data.
Extranets - refer to applications and services that are Intranet based, and use extended, secure access to external users or enterprises. - This access is usually accomplished through passwords, user IDs, and other application-level security. - is the extension of two or more intranet strategies with a secure interaction between participant enterprises and their respective intranets.
The term server is used to refer to one of the following: a computer program running to serve the needs or requests of other programs (referred to in this context as "clients") which may or may not be running on the same computer. a physical computer dedicated to running one or more such services, to serve the needs of programs running on other computers on the same network. a software/hardware system (i.e. a software service running on a dedicated computer) such as a database server, file server, mail server, orprint server.
=========================================================================================== - aebihis