technology infrastructure
Download
Skip this Video
Download Presentation
Technology Infrastructure

Loading in 2 Seconds...

play fullscreen
1 / 49

Technology Infrastructure - PowerPoint PPT Presentation


  • 332 Views
  • Uploaded on

Technology Infrastructure Internet Learning Objectives In this section, we will learn about: The origin, growth, and current structure of the Internet How packet-switched networks combined to form the Internet Internet protocols and Internet addressing Technology Overview

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Technology Infrastructure' - Rita


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
technology infrastructure

Technology Infrastructure

Internet

Computer Science 1611

Internet & Web

learning objectives
Learning Objectives

In this section, we will learn about:

  • The origin, growth, and current structure of the Internet
  • How packet-switched networks combined to form the Internet
  • Internet protocols and Internet addressing

Computer Science 1611

Internet & Web

technology overview
Technology Overview
  • Computer networks and the Internet form the basic technology structure for what is now the WWW.
  • The computers in these networks run such software as:
    • Operating systems, database managers, encryption software, multimedia creation and viewing software, and the graphical user interface

Computer Science 1611

Internet & Web

technology overview4
Technology Overview
  • The Internet includes:
    • The hardware that connects the computers together
    • the hardware that connects the networks together
  • Rapid change in these technologies requires businesses to be flexible

Computer Science 1611

Internet & Web

packet switched networks
Packet-Switched Networks
  • A local area network (LAN) is a network of computers close together.
  • A wide area network (WAN) is a network of computers connected over a great distance.
  • Circuit switching is used in telephone communication.
  • The Internet uses packet switching
      • Files are broken down into small pieces (called packets) that are labeled with their origin, sequence, and destination addresses.

Computer Science 1611

Internet & Web

internet protocols
Internet Protocols

http:// World Wide Web

mailto: E-mail address

ftp:// File Transfer Protocol

telnet: Telnet

Computer Science 1611

Internet & Web

top level domain names
Top Level Domain Names

.edu Educational Institution (in US)

.ca Country Codes (two letters such as .ca, .de, .mx, .jp)

.gov Governmental Agency

.mil Military Entity

.com Commercial Entity

.net Internet Service Provider

.org Non-Profit Organization

Computer Science 1611

Internet & Web

when computers communicate
When Computers Communicate
  • When two or more computers communicate, they must have a common way in which to communicate.
  • To do this computers use protocols
  • A protocol is an agreement by which two or more computers can communicate.
  • Transfer Control Protocol/Internet Protocol (TCP/IP) is the underlying protocol for the Internet.

Computer Science 1611

Internet & Web

how tcp ip works
How TCP/IP Works

101010101001101010011010011010210101010101011010111101010111011101110110110000101110110101010101001110101001010111101000

1) Transfer Control Protocol (TCP) breaks data into small pieces of no bigger than 1500 characters each. These “pieces” are called packets.

101010101001101010011010011

101010101001101010011010011

101010101001101010011010011

Computer Science 1611

Internet & Web

how tcp ip works ii
134.68.140.247

134.68.140.247

134.68.140.247

How TCP/IP Works(II)

2) Each packet is inserted into different Internet Protocol (IP) “envelopes.” Each contains the address of the intended recipient and has the exact same header as all other envelopes.

101010101001101010011010011

101010101001101010011010011

101010101001101010011010011

Computer Science 1611

Internet & Web

how tcp ip works11
How TCP/IP Works
  • A router receives the packets and then determines the most efficient way to send the packets to the recipient.
  • After traveling along a series of routers, the packets arrive at their destination.

Packet 101010101001101010011010011

Router 1

Router 3

Packet 101010101001101010011010011

Router 2

Router 4

Computer Science 1611

Internet & Web

packets
Packets
  • Everything you do on the Internet involves packets. For example, every Web page that you receive comes as a series of packets, and every e-mail you send leaves as a series of packets. Networks that ship data around in small packets are called packet switched networks. On the Internet, the network breaks an e-mail message into parts of a certain size in bytes. These collections of bytes are the packets. Each packet carries the information that will help it get to its destination –
    • the sender's IP address,
    • the intended receiver's IP address,
    • something that tells the network how many packets this e-mail message has been broken into and
    • the sequence number of this particular packet.

Computer Science 1611

Internet & Web

packets purpose
Packets Purpose
  • The packets carry the data in the protocols that the Internet uses: Transmission Control Protocol/Internet Protocol (TCP/IP). Each packet contains part of the body of your message. A typical packet contains perhaps 1,000 or 1,500 bytes.
  • Each packet is then sent off to its destination by the best available route -- a route that might be taken by all the other packets in the message or by none of the other packets in the message. This makes the network more efficient. First, the network can balance the load across various pieces of equipment on a millisecond-by-millisecond basis. Second, if there is a problem with one piece of equipment in the network while a message is being transferred, packets can be routed around the problem, ensuring the delivery of the entire message.

Computer Science 1611

Internet & Web

packet design
Packet Design

Most packets are split into three parts:

  • Header - The header contains instructions about the data carried by the packet. These instructions may include:
  • Body - Also called the payload or data of a packet. This is the actual data that the packet is delivering to the destination. If a packet is fixed-length, then the payload may be padded with blank information to make it the right size.
  • Footer - sometimes called the trailer, typically contains a couple of bits that tell the receiving device that it has reached the end of the packet. It may also have some type of error checking.

Computer Science 1611

Internet & Web

packet design15
Packet Design

Body

Footer

Header

Computer Science 1611

Internet & Web

how are packets used
How are Packets Used
  • If a message is sent over the internet, it will be broken into packets. Each packet's header will contain the proper protocols, the originating address (the IP address of your computer), the destination address (the IP address of the computer where you are sending the e-mail) and the packet number (1, 2, 3 or 4 since there are 4 packets). Routers in the network will look at the destination address in the header and compare it to their lookup table to find out where to send the packet. Once the packet arrives at its destination, the receiving computer will strip the header and footer off each packet and reassemble the message based on the numbered sequence of the packets.

Computer Science 1611

Internet & Web

packet header
Packet Header
  • Header(containsinstructions about the data carried by the packet)
    • Length of packet
    • Synchronization (a few bits that help the packet match up to the network)
    • Packet number (which packet this is in a sequence of packets)
    • Protocol (on networks that carry multiple types of information, the protocol defines what type of packet is being transmitted: e-mail, Web page, streaming video)
    • Destination address
    • Originating address

Computer Science 1611

Internet & Web

packet body and footer
Packet Body and Footer
  • Body - Also called the payload or data of a packet. This is the actual data that the packet is delivering to the destination. If a packet is fixed-length, then the payload may be padded with blank information to make it the right size.
  • Footer - sometimes called the trailer, typically contains a couple of bits that tell the receiving device that it has reached the end of the packet. It may also have some type of error checking.

Computer Science 1611

Internet & Web

error checking
Error Checking
  • The most common error checking used in packets is Cyclic Redundancy Check (CRC).
  • CRC takes the sum of all the 1s in the payload and adds them together. The result is stored as a hexadecimal value in the footer (trailer). The receiving device adds up the 1s in the payload and compares the result to the value stored in the trailer. If the values match, the packet is good. But if the values do not match, the receiving device sends a request to the originating device to resend the packet.

Computer Science 1611

Internet & Web

error checking example crc
Error checking example (CRC)

Suppose you have 4 bytes of data of the form

10101101 00111000 11001011 10010011

  • The sum of all the 1’s in this data is 17. This value can be represented in binary form as

00010001

The value 17 (00010001) is the CRC value which is inserted into the footer (trailer)

Computer Science 1611

Internet & Web

packet construction
Packet Construction
  • Suppose you send an e-mail to a friend, that the e-mail is about 3,500 bits (3.5 kbits) in size, and that the network you send it over uses fixed-length packets of 1,024 bits (1 kilobit). The header of each packet is 96 bits long and the footer is 32 bits long, leaving 896 bits for the payload. To break the 3,500 bits of message into packets, you will need four packets (divide 3,500 by 896). Three packets will contain 896 bits of data and the fourth will have 812 bits.

Computer Science 1611

Internet & Web

routing packets
Routing Packets
  • The computers that decide how best to forward each packet in a packet-switched network are called ‘routers’.
  • The programs on these routers use ‘routing algorithms’ that call upon their ‘routing tables’ to determine the best path to send each packet.
  • When packets leave a network to travel on the Internet, they are translated into a standard format by the router.
  • These routers and the telecommunication lines connecting them are referred to as ‘the Internet backbone’.

Computer Science 1611

Internet & Web

how tcp ip works23
How TCP/IP Works
  • Upon arrival at their destination, TCP checks the data for corruption against the header included in each packet. If TCP finds a bad packet, it sends a request that the packet be re-transmitted.

Computer Science 1611

Internet & Web

ip addresses
IP Addresses
  • Since computers process numbers more efficiently and quickly than characters, each machine directly connected to the Internet is given an IP Address
  • An IP address is a 32-bit address comprised of four 8-bit numbers (28) separated by periods. Each of the four numbers has a value between 0 and 255
  • Normally, an IP address is is given in “dotted decimal” form 138.73.1.35

Computer Science 1611

Internet & Web

ip addresses25
IP Addresses
  • Example of an IP Address:

http://138.73.1.35

The IP Address of the MtA Web Server

Computer Science 1611

Internet & Web

ip addresses vs urls
IP Addresses vs. URLs
  • While numeric IP addresses work very well for computers, most humans find it difficult to remember long patterns of numbers.
  • Instead, humans identify computers using Uniform Resource Locators (URLs), a.k.a. “Web Addresses”.
  • When a human types a URL into a browser, the request is sent to a Domain Name Server (DNS), which then translates the URL to an IP address understood by computers.
  • The DNS acts like a phonebook.

Computer Science 1611

Internet & Web

anatomy of a url
Anatomy of a URL

http://www.mta.ca/index.html

http protocol

www machine name

mta subdomain

ca top level domain name

Computer Science 1611

Internet & Web

internet protocols28
Internet Protocols
  • A protocol is a collection of rules for formatting, ordering, and error-checking data sent across a network.
  • ARPANET is the earliest packet-switched network.(ARPA = Advanced Research Projects Agency)
  • The open architecture of this experimental network used Network Control Protocol (NCP) which later was modified to become TCP/IP, the core of the Internet.

Computer Science 1611

Internet & Web

internet protocols29
Internet Protocols
  • This open architecture has four key rules that have contributed to the success of the Internet.
    • Independent networks should not require any internal changes to be connected to the network.
    • Packets that do not arrive at their destinations must be retransmitted from their source network.
    • Router computers act as receive-and-forward devices; they do not retain information about the packets that they handle.
    • No global control exists over the network.

Computer Science 1611

Internet & Web

internet protocols30
Internet Protocols
  • The Transmission Control Protocol (TCP) and the Internet Protocol (IP) are the two protocols that support the Internet operation (commonly referred to as TCP/IP).
  • The TCP controls the disassembly of a message into packets before it is transmitted over the Internet and the reassembly of those packets when they reach their destination.
  • The IP specifies the addressing details for each packet being transmitted.

Computer Science 1611

Internet & Web

ip addresses31
IP Addresses
  • IP addresses are based on a 32-bit binary number that allows over 4 billion unique addresses for computers to connect to the Internet. (138.73.27.246 is Art Miller’s office machine)
    • Ping 138.73.27.246
  • IP addresses appear in ‘dotted decimal’ notation (four numbers separated by periods).
    • Each number is in the range 0…255
    • Hex notation (aside)
    • IP Addresses in decimal form
  • IP addresses are assigned by three not-for-profit organizations (ARIN, RIPE, and APNIC).
    • Organization of IP numbers

Computer Science 1611

Internet & Web

ip addresses32
IP Addresses
  • Approximately two billion IP addresses are either in use or unavailable for use.
  • Private IP addresses are a series of IP numbers that have been set aside for subnet use and are not permitted on the Internet.
  • IPv6 is a possible solution that uses a 128-bit hexadecimal number for addresses.
    • A number written using 128 bits can be in the range from 1…2 128
    • Since 2 10 is approximately 103 = 1,000, it follows that
    • 2 128 ~ (2 10) 12 ~ (10 3) 12 ~ 10 36 ~
    • 1,000,000,000,000,000,000,000,000,000,000,000,000

Computer Science 1611

Internet & Web

domain names
Domain Names
  • To make the numbering system easier to use, an alternative addressing method that uses words was created.
  • An address, such as www.course.com, is called a domain name.www.mta.ca = 138.73.1.35
  • The last part of a domain name (i.e., ‘.com’) is the most general identifier in the name and is called a ‘top-level domain’ (TLD).

Computer Science 1611

Internet & Web

top level domain names34
Top-level Domain Names

Computer Science 1611

Internet & Web

history before the web
History: Before the Web
  • History of the Internet
  • Before the creation of the World Wide Web (when, whom?) there was a set of technologies which constituted the internet
    • telnet
    • ftp
    • Gopher
  • History of the Web
  • Early browsers for the Web were not as capable as those of today

Computer Science 1611

Internet & Web

web page delivery
Web Page Delivery
  • Hypertext Transfer Protocol (HTTP) is the set of rules for delivering Web pages over the Internet.
  • HTTP uses the client/server model
    • A user’s Web browser opens an HTTP session and sends a request for a Web page to a remote server.
    • In response, the server creates an HTTP response message that is sent back to the client’s Web browser.
      • In particular, this same action can be accomplished without a browser by using the (DOS command prompt)

TELNET www.mta.ca 80 (port 80) and once connected using the case sensitive command GET / (followed by two carriage returns) This will return the same thing that is returned by your web browser when you enter http://www.mta.ca

    • The combination of the protocol name and the domain name is called a uniform resource locator (URL).

Computer Science 1611

Internet & Web

smtp pop mime and imap
SMTP, POP, MIME, and IMAP
  • E-mail sent across the Internet must also be formatted to a common set of rules, otherwise e-mail created by one company (or Web site) could not be read by a person at another company.
  • Simple Mail Transfer Protocol (SMTP) specifies the exact format of a mail message and describes how mail is to be administered at the Internet and network level.

Computer Science 1611

Internet & Web

smtp pop mime and imap38
SMTP, POP, MIME, and IMAP
  • An e-mail program running on a user’s computer can request mail from the company’s main e-mail computer using the Post Office Protocol (POP).
  • Multipurpose Internet Mail Extensions (MIME) allow the user to attach binary files to e-mail.
  • The Interactive Mail Access Protocol (IMAP) performs the same basic functions as POP, but includes additional features.

Computer Science 1611

Internet & Web

markup languages and the web
Markup Languages and the Web
  • Web pages are marked with tags to indicate the display and formatting of page elements.
  • SGML is a meta language (a language that can be used to define other languages) and historically is the first markup language
  • HTML and XML are both derivatives of SGML.

Computer Science 1611

Internet & Web

html tags
HTML Tags
  • An HTML document contains both document text and elements.
  • Tags are codes that are used to define where an HTML element starts and (if necessary) where it ends.
  • In an HTML document, each tag is enclosed in brackets (<>).
  • A two-sided tag set has an opening tag and a closing tag.

Computer Science 1611

Internet & Web

document tags
Document Tags
  • Document tags are those divide up a Web page into its basic sections, such as the header information and the part of the page which contains the displayed text and graphics.
  • HTML
    • The first and last tags in a document should always be the HTML tags. These are the tags that tell a Web browser where the HTML in your document begins and ends. The absolute most basic of all possible Web documents is:
    • If we load such a page into a Web browser, it will give us a blank screen, but it is technically a valid Web page.

Computer Science 1611

Internet & Web

html links
HTML Links
  • Hypertext documents differ from regular docuements by offering hyperlinks
  • Hyperlinks are bits of text that connect the current document to:
    • another location in the same document
    • another document on the same host machine
    • another document anywhere on the Internet

Computer Science 1611

Internet & Web

internet connection options
Internet Connection Options
  • The Internet is a set of interconnected networks.
  • Large firms that provide Internet access to other businesses are called Internet Service Providers (ISPs).

Computer Science 1611

Internet & Web

connectivity overview
Connectivity Overview
  • The most common connection options that ISPs offer to the Internet are telephone, broadband, leased-line, and wireless.
  • The internet grew quickly in North America because local telephone calls were free, as opposed to Europe, where local calls were charged by the time unit
  • Bandwidth is the amount of data that can travel through a communication line per unit of time.

Computer Science 1611

Internet & Web

voice grade telephone connections
Voice-Grade Telephone Connections
  • The most common way to connect to an ISP is through a modem connected to your local telephone service provider.
  • POTS uses existing telephone lines and an analog modem to provide a bandwidth of 28-56 Kbps.
  • DSL protocol offers high speed bandwidth over standard phone lines.

Computer Science 1611

Internet & Web

broadband connections
Broadband Connections
  • Connections that operate at speeds of greater than 200 Kbps are called broadband services.
  • ADSL uses the DSL (Digital Subscriber Line) protocol to provide bandwidths (over standard phone lines) of between 100-640 Kbps upstream and 1.5-9 Mbps downstream.
  • Cable modems provide transmission speeds between 300 Kbps-1 Mbps from the client to the server and a downstream rate as high as 10 Mbps.
  • Satellite microwave transmissions handle Internet downloads at speeds around 500 Kbps.

Computer Science 1611

Internet & Web

networks local area and wide area connections
Networks: Local area and Wide area Connections
  • Large firms can connect to an ISP using higher-bandwidth connections that they can lease from telecommunications carriers.
  • A ‘T1’ line operates at 1.544 Mbps
  • A ‘T3’ line operates at 44.736 Mbps.
  • Ethernet (local) currently operates at 10 Mbps or 100 Mbps, and there are emerging standards for 10Gbps and 100 Gbps ethernet.

Computer Science 1611

Internet & Web

wireless connections
Wireless Connections
  • Many researchers and business managers see great potential for wireless networks and the devices connected to them.
  • The term m-commerce (mobile commerce) is used to describe the kinds of resources people might want to access using devices that have wireless connections.

Computer Science 1611

Internet & Web

internet2
Internet2
  • Internet2 is an experimental test bed for new networking technologies that is separate from the original Internet.
  • 200 universities and a number of corporations joined together to create this network.
  • It has achieved bandwidths of 10 Gbps.
  • Internet2 promises to be the proving ground for new technologies and applications of those technologies that will eventually find their way to the Internet.

Computer Science 1611

Internet & Web

ad