Download presentation
Presentation is loading. Please wait.
Published byBarbara Cornelia Carpenter Modified over 9 years ago
1
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Ninth Edition Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
2
Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
3
Chapter Topics Management of the Internet Internet networking Data transmission and protocols Internet identity HTTP, HTML, and other Web building blocks Communications over the Internet Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall2
4
Which of the following is NOT a type of server? 1.Data server 2.File server 3.Web server 4.Commerce server Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 3
5
Which protocol ensures data is sent securely over the Internet? 1.HTTP 2.TCP 3.UDP 4.HTTPS Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 4
6
In the peer-to-peer model, users’ computers act as: 1.Clients 2.Servers 3.Both clients and servers 4.Neither clients nor servers Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 5
7
In _______ the IP address for a computer never changes and was most likely assigned manually by a network administrator or ISP 1.Dynamic addressing 2.Manual addressing 3.Static addressing 4.Network addressing Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 6
8
Which of the following is a type of encryption? 1.Turn-key 2.Security-key 3.Private-key 4.Encryption-key Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 7
9
Management of the Internet No single entity is in charge of Internet Local networks are owned by: –Individuals –Universities –Government agencies –Private companies Managed by nonprofit organizations and user groups Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall8
10
Internet Networking Much information is now stored out in the “cloud” You can summon up information stored on servers around the world –Enter a URL in your browser –Enter a search topic in a search engine Series of communication transactions enable Internet to function as global network Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall9
11
Connecting to the Internet Internet backbone –Collection of large national and international networks –T lines: Initially used for backbone ISP connections Carried digital data over twisted-pair wires –Optical carrier line (OC): Today’s most common backbone ISP connection High-speed, fiber-optic lines designed to provide high throughput Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall10
12
Network Model of the Internet Internet communications follow the client/server network model of network communications –Clients request services –Servers provide services to clients Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall11
13
Types of Servers Web servers –Host Web pages Commerce servers –Enable the purchase of goods and services over the Web File servers –Provide remote storage space for files that users can download Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall12
14
Peer-to-Peer File Sharing Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall13
15
Data Transmission and Protocols Computer protocol is a set of rules for exchanging electronic information Internet protocols had to be an open system design Networks can communicate even if they have different topologies, transmission media, or operating systems Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall14
16
In packet switching, packets are sent across the Internet: 1.Along identical routes 2.As a group 3.Along various routes 4.As a unified package Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 15
17
Circuit Switching Technology available in 1960s Dedicated connection is formed between two points Remains active for duration of transmission Used since early days of the telephone communications Inefficient for computers Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall16
18
Packet Switching Makes computer communication efficient Data is broken into small units (packets) Packets are sent over various routes to their destination Packets are reassembled by the receiving computer Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall17
19
VOIP uses: 1.Cell switching 2.Circuit switching 3.Packet switching 4.Voice switching Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 18
20
Packet Contents Contents vary depending on protocol At a minimum, all packets must contain: 1.Address to which packet is being sent 2.Address from where packet originates 3.Reassembling instructions, if original data was split 4.Data that is being transferred Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall19
21
TCP/IP Main suite of protocols used on Internet Transmission Control Protocol (TCP) –Prepares data for transmission –Provides error checking –Enables resending lost data Internet Protocol (IP) –Responsible for sending information from one computer to another Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall20
22
I know how to find my IP address. 1.Yes 2.No Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 21
23
Internet Identity Each computer, server, or device connected to the Internet is required to have unique identification number Numeric IP addresses were given more “human” word-based addressed Domain names were born Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall22
24
IP Address Unique number that identifies each device connected to the Internet Typical IP address – 197.24.72.157 Static addressing –IP Address never changes Dynamic addressing –Temporary address from available pool Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall23
25
Domain Names Domain name takes place of an IP address Easier to remember Organized by level –Top-level domain (TLD) Portion of the domain name that follows the dot Includes.com,.org,.gov,.edu, and.net –Second-level domain Unique name within a top-level domain Yahoo.com, Whitehouse.gov, Unesco.org Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall24
26
Domain Name System Servers Internet servers that translate domain names into IP addresses ISPs go first to a default DNS to resolve a name Name queries work up the hierarchy to the root DNS servers if required Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall25
27
DNS Servers in Action Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall26
28
HTTP, HTML, and Other Web Building Blocks World Wide Web is grouping of protocols and software that resides on Internet Web uses special languages and protocols to facilitate communication between computers Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall27
29
Communications across the Internet follow standard: 1.Rules 2.Protocols 3.Systems 4.Methods Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 28
30
Web Browser Security Protocols HyperText Transfer Protocol (HTTP) –For transfer of hypertext documents HyperText Transfer Protocol Secure (HTTPS ) –Combination of HTTP and network security protocol Transport Layer Security (TLS) and Secure Sockets Layer (SSL) –Protect data integrity of data and security of transmissions over the Internet Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall29
31
HTML/XHTML Web page is a text document formatted using Web languages –HyperText Markup Language (HTML) –eXtensible HyperText Markup Language (XHTML) Sets of rules for marking up blocks of text so browser know how to display them Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall30
32
XML eXtensible Markup Language (XML) –Designed for exchanging information Can be used to create your own markup language Used in e-commerce transactions Custom packages for specific communities –MathML, Wireless Markup Language (WML) Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall31
33
Common Gateway Interface Provides methodology so browsers can request that a program file be executed CGI files are often called CGI scripts Adds Web page interaction –Adding names to guest books/mailing lists –Completing forms Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall32
34
Dynamic HTML A combination of technologies used to create interactive Web sites –HTML/XHTML –Cascading style sheets –JavaScript Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall33
35
AJAX and JavaScript Asynchronous JavaScript and XML (AJAX) –Newer group of technologies that facilitates creation of Web applications –Does not actually require JavaScript or XML JavaScript –Most commonly used scripting language for creating DHTML effects Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall34
36
Cascading Style Sheets List of statements that defines in a single location how to display HTML/XHTML elements Enable a Web developer to define a style for each HTML/XHTML element and apply it to multiple elements on many Web pages Allows for creation of formatting templates Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall35
37
Client Side Applications Programs that run on client computer with no interaction with a Web server Two main types: –Embedding programming language code directly within HTML or XHTML code of a Web page –Applet is a small application that resides on a server and when requested, compiled version is downloaded to client computer Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall36
38
Communications over the Internet Communications revolution began to explode in the mid 1990s Internet e-mail –Growing exponentially each month –97 percent is spam Texting and instant messaging Voice over Internet protocol Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall37
39
E-Mail Simple Mail Transfer Protocol (SMTP) is used for sending e-mail along Internet Popular client-based e-mail software: –Microsoft Outlook –Mozilla Thunderbird Web-based e-mail software –Gmail –Yahoo! –Hotmail Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall38
40
E-Mail (cont.) Multipurpose Internet Mail Extensions (MIME) simplifies attachments to e-mail messages Handles encoding and decoding Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall39
41
E-Mail Security: Encryption and Specialized Software Encryption is process of coding e-mail so only person with key to code can read the message Two basic types of encryption –Private-key encryption Only two parties involved have code –Public-key encryption Two keys (key pair) are created One key used for coding, other for decoding Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall40
42
I know how to encrypt a Microsoft Word document 1.Yes 2.No Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 41
43
Instant Messaging Act of communicating with one or more people in real time Top IM programs –AOL Instant Messenger (AIM) –GoogleTalk –Yahoo! Messenger –Jabber –Windows Live Messenger Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall42
44
How Instant Messaging Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall43
45
Voice over Internet Protocol (VoIP) Turns standard Internet connection into way to make free long-distance phone calls Collection of communication and transmission protocols Uses TCT/IP protocols to route phone calls across the Internet Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall44
46
Which of the following is an example of a domain name? 1.192.168.0.1 2.www.google.com 3..com 4.Google Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 45
47
A computer______ is a set of rules for exchanging electronic information. 1.Code 2.Protocol 3.System 4.Topology Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 46
48
IP addresses are assigned either statically or: 1.Randomly 2.Permanently 3.Judiciously 4.Dynamically Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 47
49
To convert a domain name to an IP address the computer consults a database housed on a ____ server. 1.IP 2.Translation 3.Conversion 4.DNS Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 48
50
Which of the following is a type of email protocol? 1.UDP 2.SMTP 3.HTTP 4.TCP Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 49
51
Chapter 13 Summary Questions 1.Who owns, manages, and pays for the Internet? Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall50
52
Chapter 13 Summary Questions 2.How do the Internet’s networking components interact? Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall51
53
Chapter 13 Summary Questions 3.What data transmissions and protocols does the Internet use? Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall52
54
Chapter 13 Summary Questions 4.Why are IP addresses and domain names important for Internet communications? Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall53
55
Chapter 13 Summary Questions 5.What are HTTP, HTML/XHTML and XML used for? Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall54
56
Chapter 13 Summary Questions 6.How do e-mail, instant messaging, and Voice over Internet Protocol work, and how is information using these technologies kept secure? Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall55
57
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Copyright © 2013 Pearson Education, Inc. Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.