Presentation is loading. Please wait.

Presentation is loading. Please wait.

Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Ninth Edition Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall.

Similar presentations


Presentation on theme: "Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Ninth Edition Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall."— Presentation transcript:

1 Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Ninth Edition Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

2 Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

3 Chapter Topics Management of the Internet Internet networking Data transmission and protocols Internet identity HTTP, HTML, and other Web building blocks Communications over the Internet Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall2

4 Which of the following is NOT a type of server? 1.Data server 2.File server 3.Web server 4.Commerce server Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 3

5 Which protocol ensures data is sent securely over the Internet? 1.HTTP 2.TCP 3.UDP 4.HTTPS Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 4

6 In the peer-to-peer model, users’ computers act as: 1.Clients 2.Servers 3.Both clients and servers 4.Neither clients nor servers Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 5

7 In _______ the IP address for a computer never changes and was most likely assigned manually by a network administrator or ISP 1.Dynamic addressing 2.Manual addressing 3.Static addressing 4.Network addressing Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 6

8 Which of the following is a type of encryption? 1.Turn-key 2.Security-key 3.Private-key 4.Encryption-key Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 7

9 Management of the Internet No single entity is in charge of Internet Local networks are owned by: –Individuals –Universities –Government agencies –Private companies Managed by nonprofit organizations and user groups Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall8

10 Internet Networking Much information is now stored out in the “cloud” You can summon up information stored on servers around the world –Enter a URL in your browser –Enter a search topic in a search engine Series of communication transactions enable Internet to function as global network Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall9

11 Connecting to the Internet Internet backbone –Collection of large national and international networks –T lines: Initially used for backbone ISP connections Carried digital data over twisted-pair wires –Optical carrier line (OC): Today’s most common backbone ISP connection High-speed, fiber-optic lines designed to provide high throughput Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall10

12 Network Model of the Internet Internet communications follow the client/server network model of network communications –Clients request services –Servers provide services to clients Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall11

13 Types of Servers Web servers –Host Web pages Commerce servers –Enable the purchase of goods and services over the Web File servers –Provide remote storage space for files that users can download Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall12

14 Peer-to-Peer File Sharing Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall13

15 Data Transmission and Protocols Computer protocol is a set of rules for exchanging electronic information Internet protocols had to be an open system design Networks can communicate even if they have different topologies, transmission media, or operating systems Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall14

16 In packet switching, packets are sent across the Internet: 1.Along identical routes 2.As a group 3.Along various routes 4.As a unified package Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 15

17 Circuit Switching Technology available in 1960s Dedicated connection is formed between two points Remains active for duration of transmission Used since early days of the telephone communications Inefficient for computers Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall16

18 Packet Switching Makes computer communication efficient Data is broken into small units (packets) Packets are sent over various routes to their destination Packets are reassembled by the receiving computer Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall17

19 VOIP uses: 1.Cell switching 2.Circuit switching 3.Packet switching 4.Voice switching Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 18

20 Packet Contents Contents vary depending on protocol At a minimum, all packets must contain: 1.Address to which packet is being sent 2.Address from where packet originates 3.Reassembling instructions, if original data was split 4.Data that is being transferred Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall19

21 TCP/IP Main suite of protocols used on Internet Transmission Control Protocol (TCP) –Prepares data for transmission –Provides error checking –Enables resending lost data Internet Protocol (IP) –Responsible for sending information from one computer to another Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall20

22 I know how to find my IP address. 1.Yes 2.No Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 21

23 Internet Identity Each computer, server, or device connected to the Internet is required to have unique identification number Numeric IP addresses were given more “human” word-based addressed Domain names were born Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall22

24 IP Address Unique number that identifies each device connected to the Internet Typical IP address – 197.24.72.157 Static addressing –IP Address never changes Dynamic addressing –Temporary address from available pool Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall23

25 Domain Names Domain name takes place of an IP address Easier to remember Organized by level –Top-level domain (TLD) Portion of the domain name that follows the dot Includes.com,.org,.gov,.edu, and.net –Second-level domain Unique name within a top-level domain Yahoo.com, Whitehouse.gov, Unesco.org Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall24

26 Domain Name System Servers Internet servers that translate domain names into IP addresses ISPs go first to a default DNS to resolve a name Name queries work up the hierarchy to the root DNS servers if required Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall25

27 DNS Servers in Action Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall26

28 HTTP, HTML, and Other Web Building Blocks World Wide Web is grouping of protocols and software that resides on Internet Web uses special languages and protocols to facilitate communication between computers Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall27

29 Communications across the Internet follow standard: 1.Rules 2.Protocols 3.Systems 4.Methods Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 28

30 Web Browser Security Protocols HyperText Transfer Protocol (HTTP) –For transfer of hypertext documents HyperText Transfer Protocol Secure (HTTPS ) –Combination of HTTP and network security protocol Transport Layer Security (TLS) and Secure Sockets Layer (SSL) –Protect data integrity of data and security of transmissions over the Internet Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall29

31 HTML/XHTML Web page is a text document formatted using Web languages –HyperText Markup Language (HTML) –eXtensible HyperText Markup Language (XHTML) Sets of rules for marking up blocks of text so browser know how to display them Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall30

32 XML eXtensible Markup Language (XML) –Designed for exchanging information Can be used to create your own markup language Used in e-commerce transactions Custom packages for specific communities –MathML, Wireless Markup Language (WML) Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall31

33 Common Gateway Interface Provides methodology so browsers can request that a program file be executed CGI files are often called CGI scripts Adds Web page interaction –Adding names to guest books/mailing lists –Completing forms Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall32

34 Dynamic HTML A combination of technologies used to create interactive Web sites –HTML/XHTML –Cascading style sheets –JavaScript Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall33

35 AJAX and JavaScript Asynchronous JavaScript and XML (AJAX) –Newer group of technologies that facilitates creation of Web applications –Does not actually require JavaScript or XML JavaScript –Most commonly used scripting language for creating DHTML effects Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall34

36 Cascading Style Sheets List of statements that defines in a single location how to display HTML/XHTML elements Enable a Web developer to define a style for each HTML/XHTML element and apply it to multiple elements on many Web pages Allows for creation of formatting templates Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall35

37 Client Side Applications Programs that run on client computer with no interaction with a Web server Two main types: –Embedding programming language code directly within HTML or XHTML code of a Web page –Applet is a small application that resides on a server and when requested, compiled version is downloaded to client computer Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall36

38 Communications over the Internet Communications revolution began to explode in the mid 1990s Internet e-mail –Growing exponentially each month –97 percent is spam Texting and instant messaging Voice over Internet protocol Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall37

39 E-Mail Simple Mail Transfer Protocol (SMTP) is used for sending e-mail along Internet Popular client-based e-mail software: –Microsoft Outlook –Mozilla Thunderbird Web-based e-mail software –Gmail –Yahoo! –Hotmail Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall38

40 E-Mail (cont.) Multipurpose Internet Mail Extensions (MIME) simplifies attachments to e-mail messages Handles encoding and decoding Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall39

41 E-Mail Security: Encryption and Specialized Software Encryption is process of coding e-mail so only person with key to code can read the message Two basic types of encryption –Private-key encryption Only two parties involved have code –Public-key encryption Two keys (key pair) are created One key used for coding, other for decoding Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall40

42 I know how to encrypt a Microsoft Word document 1.Yes 2.No Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 41

43 Instant Messaging Act of communicating with one or more people in real time Top IM programs –AOL Instant Messenger (AIM) –GoogleTalk –Yahoo! Messenger –Jabber –Windows Live Messenger Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall42

44 How Instant Messaging Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall43

45 Voice over Internet Protocol (VoIP) Turns standard Internet connection into way to make free long-distance phone calls Collection of communication and transmission protocols Uses TCT/IP protocols to route phone calls across the Internet Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall44

46 Which of the following is an example of a domain name? 1.192.168.0.1 2.www.google.com 3..com 4.Google Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 45

47 A computer______ is a set of rules for exchanging electronic information. 1.Code 2.Protocol 3.System 4.Topology Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 46

48 IP addresses are assigned either statically or: 1.Randomly 2.Permanently 3.Judiciously 4.Dynamically Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 47

49 To convert a domain name to an IP address the computer consults a database housed on a ____ server. 1.IP 2.Translation 3.Conversion 4.DNS Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 48

50 Which of the following is a type of email protocol? 1.UDP 2.SMTP 3.HTTP 4.TCP Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 49

51 Chapter 13 Summary Questions 1.Who owns, manages, and pays for the Internet? Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall50

52 Chapter 13 Summary Questions 2.How do the Internet’s networking components interact? Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall51

53 Chapter 13 Summary Questions 3.What data transmissions and protocols does the Internet use? Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall52

54 Chapter 13 Summary Questions 4.Why are IP addresses and domain names important for Internet communications? Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall53

55 Chapter 13 Summary Questions 5.What are HTTP, HTML/XHTML and XML used for? Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall54

56 Chapter 13 Summary Questions 6.How do e-mail, instant messaging, and Voice over Internet Protocol work, and how is information using these technologies kept secure? Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall55

57 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Copyright © 2013 Pearson Education, Inc. Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall


Download ppt "Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Ninth Edition Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall."

Similar presentations


Ads by Google