Session2-InternetworkingAndWWW

Download Report

Transcript Session2-InternetworkingAndWWW

1
Electronic Commerce
Session 2: Internetworking and the WWW
Session Objectives

After completing this session you will be
able to:




Describe the Internet and discuss its history
Describe the World Wide Web (WWW) and
write a simple HTML document
Describe different types of computer
networks
Discuss different methods of connecting to
the Internet
3
The Internet



What is the Internet?
The history of the
Internet
The growth of the
Internet
4
What is the Internet


The Internet is a large system of interconnected networks that span the globe
Internet-ready computers and personal
digital assistants (palm and pocket PCs)
can access this network2
5
What is the Internet Cont’d

The Federal Networking Council (FNC)
defines the Internet more formally as the
global information system that3:

is logically linked together by a globally
unique address space based on the Internet
Protocol (IP) or its subsequent
extensions/follow-ons
6
What is the Internet Cont’d


is able to support communications using the
Transmission Control Protocol/Internet
Protocol (TCP/IP) suite or its subsequent
extensions/follow-ons, and/or other IPcompatible protocols; and
provides, uses or makes accessible, either
publicly or privately, high level services
layered on the communications and related
infrastructure described herein
7
What is the Internet Cont’d

The Internet allows:






communication by e-mail
the reading of on-line newspapers, academic journals
and books
the joining of discussion groups,
participation in simulations and games
downloading of software, electronic books and music
businesses to market and sell products and services
(e-commerce)
8
The History of the Internet


In the early 1960s the US department of defense
began investigating ways of creating networks of
computers that coordinate and control nuclear
weapons
This network was to withstand attack, so that
even if part of it was down it will continue to
function


This network was to have no central control
These new networks required multiple channels
to send information (leased lines inadequate)
9
The History of the Internet Cont’d




In 1969 the advanced research agency
(ARPA) used this network model to
connect four computers
This network was called ARPANET
During the 1970s and 1980s the academic
community contributed to this network
In the late 1980s this network became the
Internet
10
Internet Growth



In 1969 ARPANET (the Internet)
connected 4 computers
In 1990 the Internet connected 300,000
In 1995 the intranet was privatised


The structure was based on four network
access points (NAPs) operated by different
telecom companies in the US
As the Intranet grew, more NAPs were added
11
Internet Growth Cont’d

The NAPs began selling Internet access rights to
large customers





Internet service provides (ISPs) sold on the service to
small businesses and individuals
Growth in Internet hosts rose from under 10
million in 1995 to over 180 million in 2004
Millions of people now use the Internet
Billions of dollars are exchanged from the sales
of products and services
Estimated number of Web sites is 40 million and
billions of web pages
12
The World Wide Web




www.ransen.com/Repligator/Spider.htm
What is the World
Wide Web?
What is hypertext?
Hypertext markup
language (HTML)
example
What types of Web
sites exist?
13
What is the World Wide Web

The World Wide Web (WWW) was an
Internet-based hypertext project that
allowed global information sharing2


It is software that runs on machines
connected to the WWW
The WWW is based on two concepts1:


Hypertext and
a graphical user interface (a Web browser)
14
What is Hypertext


In 1945, Vannevar Bush wrote an article in
the Atlantic Monthly describing a system,
called Memex, that would store all a
person’s books, records, letters and
research results on microfilm
Microfilm and indexes would then be used
to quickly access this information
15
What is Hypertext Cont’d

In the 1960s, Ted Nelson described a
similar system:


He incorporated a page linking system called
hypertext
Tim Berners-Lee wrote a hypertext server
in 1989 which
stored files written in hypertext markup language
(HTML)
 allowed other computers to read these files

16
What is Hypertext Cont’d

Tim Berners-Lee hypertext server was
called httpd and his client browser
“WorldWideWeb”
17
HyperText Markup Language



HTML is a language that includes a set of
tags attached to text
These tags describe the relationship
between text elements
A hypertext link (or hyperlink) points to
another location in the same or another
HTML document (that might be stored on
the same or another computer)
18
HTML Example
<html>
<!-- An HTML document typically contains a head and a body -->
<head>
<title>Hypertext Markup Language (HTML) Example</title>
</head>
<!-- This is the body part of the document -->
<body bgcolor="#0000AA">
<font color="#FFFFFF">
<h1><u>Hypertext Markup Language</u></h1>
Hypertext Markup Language (HTML) allows users to:
<ol>
<li>format and display text
<li>display images
<li>and so much more …
</ol>
<img src="HTMLexample.jpg">
<a href="#top">Go to top of page</a>
</font>
</body>
</html>
19
Graphical Interface for Hypertext



A Web browser is a graphical user interface used
to read and navigate through files written in
HTML
In 1993 the first graphical web browser was
developed; called Mosiac
Popular web browsers include:



Internet Explorer
Netscape
Firefox
20
Hypertext Servers (Web Servers)

There are several Web servers available
today, however the most popular are (April
2004 survey)4:



Apache HTTP Server (69.01%)
Microsoft Internet Information Server (IIS)
(23.26%)
Sun Java System Web Server (JSWS) (former
names are Sun One, iPlanet Enterprise Server
and Netscape Enterprise Server) (0.86%)
21
Apache (“A Patchy” Server)





Developed in 1994 by Rob McCool
The original core system has many patches
applied to it, and thus its name
Apache has dominated the Web since 1996
Available free
Runs on operating systems including
FreeBSD-UNIX, HP-UX, Linux, Microsoft
Windows, SCO-UNIX and Solaris
22
Microsoft Internet Information
Server (IIS)




Comes bundled with Microsoft Windows Server
operating system
IIS used on many corporate intranets (Microsoft
standard product)
Originally written to run on Windows NT and
Windows 2000; runs on Windows 2003 Server
and Windows XP
Supports ASP, ActiveX Data objects and SQL
queries
23
Sun Java System Web Server




This is a descendant of the original NCSA
server
Cost US$1500-per-CPU licensing fee
Runs on HP-UX, Solaris and Windows
Is ODBC compatible (i.e. full access to
ODBC databases)
24
Web Site Types

There are numerous different types of Web sites
including:


Development sites: are used by companies to
evaluate web site designs. The initial investment in
these sites are small since they use existing hardware
(i.e. no special hardware is purchased)
Intranets: these are corporate networks that hold
documents such as internal memos, corporate
handbooks, expense account worksheets, budgets and
newsletters
25
Web Site Types Cont’d


Extranets: which allow external entities, e.g.
suppliers and strategic partners to access a
subset of the information on the Intranet
Transaction-processing: These sites operate
24 hours a day, seven days a week and
require fast, reliable hardware and ecommerce software

Web sites hosting B2B and B2C activities must
have spare capacity to support an increase in
customer volume.
26
Web Site Types Cont’d

Content-delivery: sites must be available
seven days a week, 24 hours a day and
require fast and precise search engines to help
visitors locate information quickly

These sites deliver content such as news, histories
and other digital information.
27
Networking



What is a computer
network?
What are some of the
types of networks?
Characteristics of
networks




http://www-structure.llnl.gov/Xray/comp/network.gif


Network topology
Network protocols
Network architecture
Routers
Domain Names
Intranets, Extranets and
VPNs
28
What is a Network

A network is a group of two or more
computer systems linked together
29
Types of Networks

There are several types of computer
networks:

Local-area network (LANs)


Computers that are geographically close to each
other (in the same building)
Wide-area network (WANs)
Computers are farther apart than LANs; typically
connected by telephone lines or radio waves
 Provides a single path between caller and receiver
(circuit switching)

30
Types of Networks Cont’d

Campus-area network (CANs)


Metropolitan-area network (MANs)


These computers are within a limited geographic
area, e.g. a campus
These networks are designed for towns and cities
Home-area network (HANs)

A network created in a person’s home
31
Types of Networks Cont’d


Both LANs and WANs are examples of packetswitched networks
In packet-switched networks:



Messages are broken down into small pieces called
packets and are labeled electronically with their
origin, sequence and destination addresses
Each packet may take a different path
The destination computer puts the packets back
together in the correct order
32
Characteristics of Networks

A network is characterised by its:

Topology


Architecture


The geometric arrangement of the computer system
This refers to the two major type of networks, peer-to-peer
or client/server
Protocol

The set of rules and signals used to communicate (e.g.
Ethernet or IBM’s Token Ring)
33
Network Topologies

Common network
topologies include:




Star topology
Ring topology
Bus topology
Other topologies
include the:


Mesh topology
Tree topology
http://www.webopedia.com/TERM/s/star_network.html
34
Network Topologies Cont’d

Network topologies are considered either
logical or physical



The physical lay out of the network is its
physical topology
The way signals are routed through a network
is the logical topology
Just because a network has a particular
physical topology does not mean that its
logical topology must be the same
35
Network Topologies Cont’d

For example:


Twisted-pair Ethernet has a logical bus
topology on a physical star topology layout
IBM’s token ring has a logical ring topology
on a physical star topology
36
Star Topology

In a Star network all nodes are connected
through a central hub


A node is a computer or device, e.g. a printer;
each node has a unique address called the
Data Link Control (DLC) address or the
Media Access Control (MAC) address
The main advantage of the star network is
that a malfunctioning node does not affect
the rest of the network
37
Star Topology Cont’d

The main disadvantage of the star network
is that:



It requires more cabling than other topologies
(e.g. the ring network), and
If the hub goes down, the network no longer
functions
Standard twisted-pair Ethernet uses the star
topology
38
Ring Topology





Each node in a ring network is connected to two
other nodes to form a closed loop
Messages pass around the ring and each node
reads the message addressed to it
One advantage of a ring network is that it can
span larger distances than other networks (e.g.
bus) because each node regenerates the signal
One disadvantage is that malfunctioning nodes
can make other nodes inaccessible
IBM’s token ring uses a logical ring topology
39
Bus Topology





The nodes in a bus topology are connected to a
central cable call a bus or backbone
The bus has two end points
One advantage of the bus network is that if one
node goes down the network still functions
One disadvantage of the bus network is it can not
travel as long a distance as say a ring network due
to the diminishing signal strength
Ethernet 10Base-2 and 10Base-5 uses the bus
topology
40
Mesh Topology

In the mesh topology
many redundant
connections exist
between nodes; in a
true mesh, each node
is connected to every
other node
http://www.webopedia.com/quick_ref/topologies.asp
41
Tree Topology

The tree topology is a
hybrid where groups
of star-configured
networks are
connected to a linear
bus backbone
http://www.webopedia.com/quick_ref/topologies.asp
42
Architecture

The two main types
of architecture are


Peer-to-Peer
Client/Server
http://www.rebri.org.nz/images/builder-big.jpg
43
Peer-To-Peer (P2P) Networks


In a P2P network each node has equivalent
capabilities and responsibilities
These networks are simpler than
Client/Server but do not offer the same
performance under heavy loads
44
Client/Server Networks




A network architecture where each node is either
a client or server
Client computers run applications, but rely on
servers for resources such as files and printing
capabilities
Servers are powerful computers that manage
files, printers or network traffic
This architecture is sometimes called the two-tier
architecture
45
Protocols


Protocols are agreed
formats for transmitting
data between devices6
The protocol determines:




The error checking
required
Data compression
method used
The way the end of a
message is signaled T
The way the device
indicates that it has
received the message
46
Protocols Cont’d

A protocol is a collection of rules for:

Formatting, ordering and error checking data
that is sent across a network


e.g. The protocol might indicate when a sending
device has completed sending data
The ARPANET network used the network
control protocol (NCP)

It was based on an open architecture which
later became the Internet
47
Protocols Cont’d

Four key rules used by ARPANET were:




Independent networks (e.g. A LAN or WAN) should
not require internal changes in order to be connected
to the network
Packets that do not arrive at their destination must be
resent from their source network
Router computers act only as receiving and
forwarding devices; They do not retain information
about the packets they handle
No global control of the network exist
48
Internet Protocols

There are many protocols used by the
Internet and the WWW, including




TCP/IP
HTTP
FTP
Electronic mail protocols
IMAP
 POP

49
TCP/IP

The Internet uses two main protocols (developed
by Vicent Cerf and Robert Kahn)

Transmission control protocol (TCP)



Controls disassembly of message into packets at the origin
Reassembles at the destination
Internet protocol (IP)

Specifies the addressing details for each packet

Each packet is labeled with its origin and destination
50
Internet Protocol version 4 (IPv4)

Uses a 32 bit number to identify each
computer


Called the IP address (4 billion addresses)
IP addresses uses the dotted decimal notation,
e.g. 0.0.0.0 or 255.255.255.255
51
Internet Protocol version 6 (IPv6)


Set to replace version 4
Changes the format of the packets


Removes unused fields
Uses 128 bit number (2^128 addresses)

Eight groups of 16 bits
e.g.
CD18:0000:0000:AF23:0000:FF9E:61B2:884D
 To simplify zeroes may be removed


CD18:::AF23::FF9E:61B2:884D
52
IP Addresses

IP addresses are assigned by:

American Registry for Internet Numbers (ARIN)


Reséaux IP Européens (RIPE)


North America, South America, the Caribbean and subSaharan Africa
Europe, Middle East and the rest of Africa
Asia-Pacific Network Information Centre (APNIC)

Asia-Pacific area
53
Hypertext Transfer Protocol (HTTP)



The hypertext transfer protocol (HTTP) was
developed by Tim Berners-Lee in 1991
HTTP was designed to transfer pages between
machines
The client (or Web browser) makes a request for a
given page and the Server is responsible for
finding it and returning it to the client
54
Hypertext Transfer Protocol (HTTP)


The browser connects and requests a page from the server
The server reads the page from the file system, sends it to
the client and terminated the connection
Request sent to Web server
Web Server
Client
Response sent with files (one for each
Web page, image, sound clip etc.)
55
File Transfer Protocol (FTP)

FTP is a protocol that allows a user to:





list files at a remote site
Transfer files between local and remote computers
Using FTP you can not run applications on a
remote site
Also you can only look at the names of the files
on the remote computer; rather than being able to
read them
FTP is still used today; e.g. to transfer large files
between computers, or to upload Web sites
56
Electronic Mail Protocols


Electronic mail uses the client/server model
The organisation has an email server
devoted to handling email


Stores and forwards email messages
Individuals uses email client software to
read and send email (e.g. Microsoft
Outlook, or Netscape Messenger)
57
Electronic Mail Protocols Cont’d

Simple Mail Transfer Protocol (SMTP)


Specifies format of mail messages
Post Office Protocol (POP)

tells the email server to:
Send mail to the user’s computer and delete it
from the server
 Send mail to the user’s computer and do not delete
it from the server
 Ask whether new mail has arrived

58
Electronic Mail Protocols Cont’d

Interactive Mail Access Protocol (IMAP)

Newer than POP, provides similar functions
with additional features
e.g. can send specific messages to the client rather
than all the messages
 A user can view email message headers and the
sender’s name before downloading the entire
message


Allows users to delete and search mailboxes
held on the email server
59
Electronic Mail Protocols Cont’d

The disadvantages of POP


You can only access messages from one PC
The disadvantage of IMAP

Since email is stored on the email server,
there is a need for more and more expensive
(high speed) storage space
60
Terminal Emulation




Telnet is a terminal emulation program for
TCP/IP networks
The telnet program runs on a local machine and
allows connection to a remote machine
Commands entered through the telnet program
will be executed on the Server; this gives the user
the ability to control the Server
To log into the Server a valid username and
password is required
61
Routers




Computers that decide how best to forward on a
packet to its destination is called a routing
computer
The Internet uses routers to isolate each LAN or
WAN
Each WAN or LAN can use their own protocol
for packet traffic within the LAN or WAN
The actual programs which contains the routing
rules are called routing algorithms
62
Routers Cont’d

These programs apply their routing
algorithms to information they have stored
in routing tables



This information includes lists of connections
that lead to particular groups of other routers
Which connections to use first
Rules for handling instances of heavy packet
traffic and network congestion
63
Routers Cont’d


When a company connects to the Internet it must
connect at least one router to routers owned by
other companies that make up the Internet
The Internet backbone are a set of routers that
handle packet traffic along the Internet’s main
connecting points


These are very large computers that can handle more
than 50 million packets per second
A router connected to the Internet always has more
than one path to direct packets
64
Domain Names


To make Internet addresses easier to remember an
alternative, domain names, was provided which
used words
Domain names

May have two or more groups separated by a period,
e.g. www.cavehill.uwi.edu




Edu – an education institution
Cavehill and uwi – the computer’s name
www – part of the world wide web
Not all computers follow this convention, e.g
games.yahoo.com
65
Domain Names Cont’d

The rightmost part of the domain name is called
the top-level domain (or TLD), e.g. .edu, or .com


also Country domains e.g. .bb
In 2000 seven new general TLDs were added:






.aero – air transport industry
.biz – businesses
.coop – cooperatives
.museum – museums
.name – individuals
.pro - professionals
66
Uniform Resource Locator

The combination of the domain name and
the protocol name is called the uniform
resource locator (URL)

E.g. http://www.yahoo.com
http is the protocol
 www.yahoo.com is the domain name

67
Intranets and Extranets


An Intranet is an interconnected network
(internet) that does not extend beyond the
organisation that created it
An extranet is an intranet that has extended
to include specific entities outside of the
organisation, e.g. business partners,
customers or suppliers

Extranets can replace faxes, telephones, email
and overnight carriers, at a lower cost
68
Intranets





Low cost distribution of internal corporate
information
Based on client server model
Intranets use Web browsers, internet-based
protocols including TCP/IP, FTP, Telnet, HTML
and HTTP
Distributing paper is often more expensive
Intranets can also be used to provide software
updates and patches, which update users
computers automatically – using scripts
69
Extranet



Networks that connect companies with
suppliers, business partners and authorised
users
Each user has access to the databases, files
and other information stored on computers
connected to the extranet
Fedex changed from an Intranet to Extranet
for package tracking on their Web site
70
Public and Private Networks


A public network is any network available to the
public, e.g. Internet
A private network is a private (e.g leased) line
between two computers




Leased line is a permanent connection between two
points
line is always active (unlike telephone connection)
The advantage is security (only the two parties can
connect to the network)
The disadvantage is the cost due to the scaling
problem: to connect 5 pairs, 5 lines are required
71
Virtual Private Networks


A VPN is an extranet that uses public
networks and their protocols to send
sensitive information using IP tunneling
IP tunneling creates a private passageway
through the public Internet that provides
secure transmissions
72
Virtual Private Networks Cont’d





VPN software encrypts the package content and
places it into another packet (encapsulation)
The outer packet is called an IP wrapper
The receiving computer decrypts it using the
(VPN software)
The connection is ‘virtual’ since it is only
temporary, it is created when information needs
to be transmitted
A VPN is an extranet, but not every extranet is a
VPN
73
Connecting to the Internet

What are some of the
ways of connecting to
the Internet?
http://www.co.delaware.ny.us/links.htm
74
Internet Connection Options

Internet service providers (ISPs) provide several
ways to connect to the Internet, including:





Voice grade telephone lines
Broadband connections
Leased lines
Wireless
The major distinguishing factor is bandwidth (the
amount of data that can be transferred per unit of
time)
75
Bandwidth and Connections


Symmetric connection: provides the same
bandwidth in both directions
Asymmetric connections: provide different
bandwidths for either direction


Upstream bandwidth (upload bandwidth): the amount
of information that can travel from the user to the
Internet in a given amount of time
Downstream bandwidth (download or downlink
bandwidth): the amount of information that can be
transferred from the Internet to the user in an amount
of time
76
Voice-grade Telephone Connections

Most common way to connect to ISP


Modem (analog) connected to telephone lines
POTS (plain old telephone service)


28 to 56Kbps
Digital subscriber line (DSL) protocol


Does not use a modem
Uses a piece of network equipment similar to a
network switch

Integrated services digital network (ISDN) first used DSL
protocol suite in 1984

More expensive, but offers bandwidth of 128Kbps – 256Kbps
77
Broadband Connections Cont’d


Connections that operate at speeds higher than
200Kbps are considered broadband
One of the latest is asymmetric digital subscriber
line (ADSL)


Bandwidths from 100-640Kbps upstream and from
1.5 to 9 Mbps downstream
For businesses a high-speed DSL (HDSL) is
available

768Kbps of symmetric bandwidth
78
Broadband Connections Cont’d

Cable modems (connected to the same
broadband coaxial cable that serves a
television)

Upstream bandwidth of 300Kbps to 1 Mbps
and downstream bandwidth of 10Mbps
79
DSL v Cable



DSL is a private line with no competing traffic
Cable connections bandwidth change with the
user load (number of subscribers using the
service)
Problems

Web users in rural areas often do not have cable
access and have limited telephone access (low cost
voice-grade lines, rather than data-grade lines) thus
bandwidth is limited (<14Kbps)
80
Leased-Line Connections


Large firms with a large amounts of Internet
traffic can lease lines from telecommunication
carriers
Various technologies are used; classified by the
amount of telephone lines they include:




DS0 (digital signal zero) carries one digital signal
(64Kbps)
T1 (or DS1) carries 24 DS0 lines (1.544Mbps)
Fractional T1 (128Kbps and upwards)
T3 (or DS3) carries 30 T1 lines (44.736Mbps)

Connections more expensive than POTS, ISDN and DSL
81
Wireless Connections





Satellite
Bluetooth
Wireless Ethernet (Wi-Fi)
Fixed-Point Wireless
Cellular Telephone Networks
82
Satellite

Satellite microwave
transmissions




Customer placed
receiving dish in yard
Download bandwidth
of around 500 kbps
Maximum upload
bandwidth of 150kbps
Self installation
makes cost lower
http://www.ccpo.odu.edu/~arnoldo/ocean405/satellite.gif
83
Bluetooth




One of the first wireless
protocols
Operates reliably over 35
feet and can be part of up
to 10 networks of eight
devices each (personal
area networks, or PANs)
Bandwidth of 722kbps
Good for wireless
printing
http://www.bakercountyhealth.org/services/dental/blue-tooth.jpg
84
Bluetooth Advantages


Bluetooth technology consumes very little
power
Bluetooth devices can discover each other
and exchange information automatically
(e.g. a user can print to a printer on a
network without logging on)
85
Wireless Ethernet (Wi-Fi) (802.11b)



Most common
wireless on LANs
Bandwidth 11Mbps at
300 feet
A computer with a
Wi-Fi network can
communicate with a
wireless access point
(WAP) to become a
part of the network
http://www.homenethelp.com/web/diagram/images/shareing-soft-wireless.gif
86
Wireless Ethernet Advantages


Wi-Fi devices can roam, i.e. shift from one
WAP to another without user intervention
Increasingly WAPs are becoming available
in public places, e.g. airports
87
Wireless Ethernet Developments

In 2002 an improved version of Wi-Fi, called
802.11a was introduced




The 802.11a protocol is capable of transmitting at
speeds up to 54Mbps
802.11a is not compatible with 802.11b
Later in 2002, the 802.11g protocol was
introduced which is compatible with 802.11b
devices and has speeds of 54Mbps
In 2004-2005, 802.11n expected (320Mbps)
88
Fixed Point Wireless


Uses a system of
repeaters (transmitterreceiver devices) to
forward a radio signal
from the ISP to
customers
Users’ antennas are
connected to a device that
converts radio signals to
Wi-Fi packets which are
sent to their computers
http://www.erinc.com/apps_wireless/images/fixed_wireless2.gif
89
Cellular Telephone Networks



In 2003, about 500
million mobile (cell)
phones worldwide
Originally slow data
communication (10
kbps – 384kbps)
Third generation cell
phones

Up to 2 Mbps
http://www.mtco.com/graphics/cellularpic.jpg
90
Cellular Telephone Networks Cont’d



Cell phones send and receive messages using the
short message service (SMS) protocol
Some cell phones include Web browser which
provide web access, email, short message service
Companies also sell Internet access through their
cellular networks


Fixed fee plus charge for amount of data transferred
Business potential of mobile commerce

Companies are identifying the kinds of resources
individuals might want to access (and pay for) using
wireless devices
91
References
[1] Schneider, Gary, P., “Electronic Commerce: The second wave”, Thomson Course
Technology, Fifth Annual Edition, 2004
[2] Zhao, Jensen J., “Web design and development for e-business”, Prentice Hall, 2003
[3] Federal Networking Council, “FNC Resolution: Definition of the Internet”, 1995. Online
document available at http://www.itrd.gov/fnc/Internet_res.html
[4] NetCraft, “April 2004 Web Server Survey”, 2004. Online document available at
http://news.netcraft.com/archives/2004/04/01/april_2004_web_server_survey.html
[5] Furdyk, Michael, “Ultimate Guide to Networking: Part One”, 1999. Online document
available at http://www.hardwarecentral.com/hardwarecentral/print/158/
[6] Webopedia, “Network”, 2004. Online document available at
http://networking.webopedia.com/TERM/N/network.html
[7] Berlin, Dan, et al., “CGI Programming Unleased”, Sams.net Publishing, 1996, pp. 101-102
92