Chapter two internet fundamentals operations management the web and wireless
1 / 4

Chapter Two: - PowerPoint PPT Presentation

  • Updated On :

Chapter Two: Internet Fundamentals: Operations, Management, the Web, and Wireless. By: Laura Marshall, Mary Mauro, and Doug Moore. “The Internet IS for everyone- but it won't be unless WE make it so.". Quote from Vinton Cerf, co-founder of the Internet.

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'Chapter Two: ' - medwin

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Chapter two internet fundamentals operations management the web and wireless l.jpg

Chapter Two:Internet Fundamentals: Operations, Management, the Web, and Wireless

By: Laura Marshall, Mary Mauro, and Doug Moore

The internet is for everyone but it won t be unless we make it so l.jpg
“The Internet IS for everyone- but it won't be unless WE make it so."

  • Quote from Vinton Cerf, co-founder of the Internet.

  • Believes the Internet is a “global megaphone for all voices”

  • Cerf identifies such barriers as:

    • affordability, restricted access, keeping up with demands, accessibility, legal restrictions, privacy and confidentiality, and irresponsible uses.

  • Chapter 2: These barriers exist for reasons- generate revenues, over crowding, promotion effectiveness, etc.

How web servers work l.jpg
How Web Servers Work make it so."

  • The Main Components

    -Internet – a gigantic collection of millions of computers that allows other computers to network together and communicate. Computers are linked to the internet through ISP’s (internet service providers)

    - Clients and Servers - each computer on the internet is either 1 of 2 things: a client or a server. Servers are machines that provide services to other machines. In turn, those other machines that request service are clients.

    - IP Addresses - to keep all the machines straight, they are all assigned a specific unique IP (internet protocol) address. IP addresses are uniquely assigned per session – this way ISP’s can have 1 IP address per modem, not per customer.

    - Domain Names – a human-worded address (i.e. that is easier to remember than an IP address (i.e. They are broken down into three parts:

    -The host name (“www”), the Domain Name (“blogger”), and the top level domain name (“.com”)

    - Name Servers – a set of servers called Domain Name Servers (DNS) are simple databases that map names to IP addresses and are distributed all over the internet

    - Ports –any service machine make its services available using numbered ports

    - Protocols – the pre-defined way that someone who wants to use the service talks to the server.

  • Putting it All Together – The browser breaks the URL into three parts (host, domain, and upper domain), then communicates with a name server to translate the domain name into an IP address, then forms a connection to the web server at an IP address on a specific port. Following HTTP protocol, the browser sends a GET request to the server, which in turn sends the HTML text from the server to the browser, in which the browser finally reads the HTML tags and formats the page onto your screen.

The incredible hidden wireless connection l.jpg
“The Incredible Hidden Wireless Connection” make it so."

  • There are many drawbacks to wireless connections.



  • Un-permitted people can access other people’s wireless connections through certain access points.

    -Fear of identity theft

    -Credit Card Information, etc.

  • Even if an administer thinks he is secured and regulated, people can still get connected and steal information through these hidden connections, known as access points.

  • Also, wireless connections are linked through a chip that connects to a GPS system that find any locations of people connected through a wireless connection.

  • The use of wireless connections is a huge problem for many companies. Many companies are afraid of using this new technology because of the detrimental problems that could occur within their company, such as stealing highly confidential information.