SlideShare a Scribd company logo
1 of 54
Download to read offline
Advanced Diploma of Information Technology


             MIT Nguyễn Hữu Phát
           Kent International College
                    80 hours
In this chapter, you will learn about:
 The origin, growth, and current structure
   of the Internet
 How packet-switched networks are
   combined to form the Internet
 How Internet protocols and Internet
   addressing work
 The history and use of markup languages
   on the Web, including SGML, HTML, and
   XML

     E-Commerce: The Second Wave, Fifth Annual Edition   3
   How HTML tags and links work on the
    World Wide Web

   The differences among internets,
    intranets, and extranets

   Options for connecting to the Internet,
    including cost and bandwidth factors

   About Internet2 and the Semantic Web
        E-Commerce: The Second Wave, Fifth Annual Edition   4
   Computer network
    › Any technology that allows people to
      connect computers to each other

   The Internet
    › A large system of interconnected computer
      networks spanning the globe

   World Wide Web
    › A subset of computers on the Internet
        E-Commerce: The Second Wave, Fifth Annual Edition   5
   Early 1960s
    › U.S. Department of Defense funded research
      to explore creating a worldwide network
   In1969, Defense Department researchers
    › Connected four computers into network
      called ARPANET
   Throughout 1970s and 1980s
    › Academic researchers connected to
      ARPANET and contributed to its technological
      developments

       E-Commerce: The Second Wave, Fifth Annual Edition   6
   1972
    › E-mail was born
   Mailing list
    › E-mail address that forwards any message
      received to any user who has subscribed
      to the list
   Usenet
    › Started by group of students and
      programmers at Duke University and the
      University of North Carolina

       E-Commerce: The Second Wave, Fifth Annual Edition   7
   In 1991, NSF
    › Eased restrictions on commercial Internet
      activity
    › Began implementing plans to privatize the
      Internet
   Network access points (NAPs)
    › Basis of new structure Internet
   Network access providers
    › Sell Internet access rights directly to larger
      customers and indirectly to smaller firms
      and individuals through ISPs


       E-Commerce: The Second Wave, Fifth Annual Edition   8
http://www.internetworldstats.com
E-Commerce: The Second Wave, Fifth Annual Edition   10
The $23.4 billion in annual internet advertising spending exceeded advertising on cable
TV for the first time (which was $21.4 billion), and took the No. 3 spot behind national
          and local TV ads ($29.8 billion) and newspaper ads ($34.4 billion).
Internet advertising is almost twice as large as broadcast TV advertising was in its 14th
     year ($13.3 billion) and nearly four times as large as cable TV ($6.5 billion).
   The Web
    › Software that runs on
      computers connected to
      the Internet
   Vannevar Bush
    › Speculated that engineers
      would eventually build a
      memory extension device
      (the Memex)
   In the 1960s
    › Ted Nelson described a
      similar system called
      hypertext
   Tim Berners-Lee
     › Developed code for
       hypertext server program
   Hypertext server
     › Stores files written in
       hypertext markup language
     › Lets other computers
       connect to it and read files
   Hypertext Markup Language
    (HTML)
     › Includes set of codes (or
       tags) attached to text
   Local area network (LAN)
    › Network of computers
      located close together
   Wide area networks (WANs)
    › Networks of computers
      connected over greater
      distances
   Circuit
    › Combination of telephone
      lines and closed switches that
      connect them to each other
 Circuit switching
   › Centrally controlled, single-connection model
 Packets
   › Files and e-mail messages on a packet-switched network that are
     broken down into small pieces
   › Travel from computer to computer along the interconnected
     networks until they reach their destinations
   Routing computers
    › Computers that decide how
      best to forward packets
   Routing algorithms
    › Rules contained in programs
      on router computers that
      determine the best path on
      which to send packet
    › Programs apply their routing
      algorithms to information
      they have stored in routing
      tables
E-Commerce: The Second Wave, Fifth Annual Edition   18
 Protocol
   › Collection of rules for
      formatting, ordering, and error-
      checking data sent across a
      network
 Rules contributing to success of
  Internet
   › Independent networks should
      not require any internal
      changes to be connected to
      the network
   › Packets that do not arrive at
      their destinations must be
      retransmitted from their source
      network
   › Router computers act as
      receive-and-forward devices
   › No global control exists over the
      network
   TCP
    › Controls disassembly of a message or a file
         into packets before transmission over
         Internet
    › Controls reassembly of packets into their
         original formats when they reach their
         destinations

   IP
    › Specifies addressing details for each packet
           E-Commerce: The Second Wave, Fifth Annual Edition   20
   Internet Protocol version 4/6 (IPv4/6)
    › Uses a 32-bit number to identify
      computers connected to the Internet
   Base 2 (binary) number system
    › Used by computers to perform internal
      calculations
   Subnetting
    › Use of reserved private IP addresses within
      LANs and WANs to provide additional
      address space

       E-Commerce: The Second Wave, Fifth Annual Edition   21
   Private IP addresses
     › Series of IP numbers not
        permitted on packets that
        travel on the Internet
   Network Address Translation (NAT)
    device
     › Used in subnetting to convert
        private IP addresses into
        normal IP addresses
   Internet Protocol version 6 (IPv6)
     › Protocol that will replace IPv4
     › Uses a 128-bit number for
        addresses
   Sets of words assigned to
    specific IP addresses
   Top-level domain (or TLD)
    › Rightmost part of a domain
       name
   Internet Corporation for
    Assigned Names and Numbers
    (ICANN)
    › Responsible for managing
       domain names and
       coordinating them with IP
       address registrars
E-Commerce: The Second Wave, Fifth Annual Edition   24
   Web client computers
    › Run software called Web
       client software or Web
       browser software
   Web server computer
    › Runs software called Web
       server software
   Client/server architecture
    › Combination of client
       computers running Web
       client software and server
       computers running Web
       server software
   Hypertext Transfer Protocol
    (HTTP)
    › Set of rules for delivering
       Web page files over the
       Internet
   Uniform Resource Locator (URL)
    › Combination of the protocol
       name and domain name
    › Allows user to locate a
       resource (the Web page) on
       another computer (the Web
       server)
   Electronic mail (e-mail)
     › Must also be formatted
       according to common set
       of rules
    E-mail server
     › Computer devoted to
       handling e-mail
   E-mail client software
     › Used to read and send e-
       mail
     › Example: Microsoft
       Outlook, Netscape
       Messenger
   Simple Mail Transfer Protocol (SMTP)
     › Specifies format of a mail
       message
    Post Office Protocol (POP)
     › POP message can tell the e-mail
       server to
         Send mail to user’s computer
          and delete it from e-mail
          server
         Send mail to user’s computer
          and not delete it
         Simply ask whether new mail
          has arrived
     › Provides support for
       Multipurpose Internet Mail
       Extensions (MIME)
   Text markup language
     › Specifies set of tags that are inserted into text
   Standard Generalized Markup Language (SGML)
     › Older and complex text markup language
     › A meta language
   World Wide Web Consortium (W3C)
     › Not-for-profit group that maintains standards for the Web
   Offers a system of marking up documents
    that is independent of any software
    application

   Nonproprietary and platform independent

   Offers user-defined tags

   Costly to set up and maintain
   Prevalent markup language used to
    create documents on the Web today
   HTML tags
    › Interpreted by Web browser and used by it
     to format the display of the text

   HTML Links
    › Linear hyperlink structure
    › Hierarchical hyperlink structure
        E-Commerce: The Second Wave, Fifth Annual Edition   35
   Scripting languages and style sheets
    › Most common scripting languages
       JavaScript, JScript, Perl, and VBScript
    › Cascading Style Sheets (CSS)
       Sets of instructions that give Web
        developers more control over the format of
        displayed pages
       Style sheet
         Usually stored in a separate file
         Referenced using the HTML style tag


       E-Commerce: The Second Wave, Fifth Annual Edition   36
   Uses paired start and stop tags
   Includes data management capabilities
    that HTML cannot provide
   Differences between XML and HTML
    › XML is not a markup language with defined
      tags
    › XML tags do not specify how text appears
      on a Web page
        E-Commerce: The Second Wave, Fifth Annual Edition   37
E-Commerce: The Second Wave, Fifth Annual Edition   38
   Intranet
    › Interconnected network
       that does not extend
       beyond organization that
       created it
   Extranet
    › Intranet extended to
       include entities outside
       boundaries of organization
    › Connects companies with
       suppliers, business partners,
       or other authorized users
   Public network
     › Any computer network or
        telecommunications
        network available to the
        public
   Private network
     › A private, leased-line
        connection between two
        companies that physically
        connects their intranets
   Leased line
     › A permanent telephone
        connection between two
        points
   Extranet that uses public
    networks and their protocols
   IP tunneling
     › Effectively creates a
        private passageway
        through the public Internet
   Encapsulation
     › Process used by VPN
        software
   VPN software
     › Must be installed on the
        computers at both ends of
        the transmission
   Bandwidth
     › Amount of data that can
       travel through a
       communication line per unit of
       time
   Net bandwidth
     › Actual speed that information
       travels
   Symmetric connections
     › Provide same bandwidth in
       both directions
   Asymmetric connections
     › Provide different bandwidths
       for each direction
   POTS, or plain old telephone
    service
    › Uses existing telephone
       lines and analog modem
    › Provide bandwidth
       between 28 and 56 Kbps
   Digital Subscriber Line (DSL)
    › Connection methods do
       not use modem
   Integrated Services Digital
    Network (ISDN)
    › Offers bandwidths
       between 128 Kbps and
       256 Kbps
   Operate at speeds of greater than 200
    Kbps
   Asymmetric digital subscriber (ADSL)
    › Transmission bandwidth is from 100 to 640 Kbps
      upstream and from 1.5 to 9 Mbps downstream
   Cable modems
    › Provide transmission speeds between 300 Kbps
      and 1 Mbps
   DSL
    › Private line with no competing traffic

          E-Commerce: The Second Wave, Fifth Annual Edition   44
   DS0 (digital signal zero)
    › Telephone line designed to carry 1 digital signal
   T1 line (also called a DS1)
    › Carries 24 DS0 lines and operates at 1.544 Mbps
   Fractional T1
    › Provides service speeds of 128 Kbps and upward in 128-
       Kbps increments
   T3 service (also called DS3)
    › Offers 44.736 Mbps
   Bluetooth
     › Designed for personal use over
       short distances
     › Low-bandwidth technology,
       with speeds of up to 722 Kbps
     › Networks are called personal
       area networks (PANs) or
       piconets
     › Consumes very little power
     › Devices can discover each
       other and exchange
       information automatically
 Most common wireless connection
  technology for use on LANs
 Wireless access point (WAP)
    › Device that transmits network packets
     between Wi-Fi-equipped computers and
     other devices
 Has potential bandwidth of 11 Mbps and
  range of about 300 feet
 Devices are capable of roaming
        E-Commerce: The Second Wave, Fifth Annual Edition   47
   802.11a protocol
    › Capable of transmitting data at speeds
     up to 54 Mbps
   802.11g protocol
    › Has 54 Mbps speed of 802.11a
    › Compatible with 802.11b devices
   802.11n
    › Expected to offer speeds up to 320 Mbps


       E-Commerce: The Second Wave, Fifth Annual Edition   48
   One version uses system of repeaters to
    forward radio signal from ISP to customers
   Repeaters
    › Transmitter-receiver devices (transceivers)

   Mesh Routing
    › Directly transmits Wi-Fi packets through
      hundreds, or even thousands, of short-range
      transceivers
   Third-generation (3G) cell phones
    › Combine latest technologies available
      today
   Short message service (SMS)
    › Protocol used to send and receive short text
      messages
   Mobile commerce (m-commerce)
    › Describes the kinds of resources people
      might want to access using wireless devices
   Internet2

    › Experimental test bed for new networking
      technologies

    › Has achieved bandwidths of 10 Gbps and
      more on parts of its network

    › Used by universities to conduct large
      collaborative research projects

        E-Commerce: The Second Wave, Fifth Annual Edition   51
   Semantic Web
     › Project by Tim Berners-Lee
     › If successful
         Would result in words on
          Web pages being
          tagged (using XML) with
          their meanings
   Resource description
    framework (RDF)
     › Set of standards for XML
       syntax
   Ontology
     › Set of standards that
       defines relationships
       among RDF standards
       and specific XML tags
   TCP/IP
    › Protocol suite used to create and transport
     information packets across the Internet
   POP, SMTP, and IMAP
    › Protocols that help manage e-mail

   Languages derived from SGML
    › Hypertext Markup Language (HTML)
    › Extensible Markup Language (XML)
        E-Commerce: The Second Wave, Fifth Annual Edition   53
   Intranets
    › Private internal networks

   Extranet
    › Used when companies want to collaborate
      with suppliers, partners, or customers

   Internet2
    › Experimental network built by a consortium
      of research universities and businesses
        E-Commerce: The Second Wave, Fifth Annual Edition   54

More Related Content

What's hot (16)

02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
 
Internet
InternetInternet
Internet
 
Bcs 052 solved assignment
Bcs 052 solved assignmentBcs 052 solved assignment
Bcs 052 solved assignment
 
Application layer in network system
Application layer in network systemApplication layer in network system
Application layer in network system
 
Osi model
Osi modelOsi model
Osi model
 
20CS2008 Computer Networks
20CS2008 Computer Networks20CS2008 Computer Networks
20CS2008 Computer Networks
 
Application protocols
Application protocolsApplication protocols
Application protocols
 
Dc ch02 : protocol architecture
Dc ch02 : protocol architectureDc ch02 : protocol architecture
Dc ch02 : protocol architecture
 
Communication protocol presentation
Communication protocol presentationCommunication protocol presentation
Communication protocol presentation
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
Computer Networks basics
Computer Networks basicsComputer Networks basics
Computer Networks basics
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
 
Application layer
Application layerApplication layer
Application layer
 
Application layer
Application layerApplication layer
Application layer
 

Viewers also liked

Infusionsoft: How to prepare a file to import
Infusionsoft: How to prepare a file to importInfusionsoft: How to prepare a file to import
Infusionsoft: How to prepare a file to importMarvin Libron
 
L 10 co-operation competition and conflict
L 10 co-operation competition and conflictL 10 co-operation competition and conflict
L 10 co-operation competition and conflictNihar Nirmal
 
Dia de la Madre 2013
Dia de la Madre 2013Dia de la Madre 2013
Dia de la Madre 2013clautela
 
Teaching Unity at Mind Candy
Teaching Unity at Mind CandyTeaching Unity at Mind Candy
Teaching Unity at Mind CandyMark Baker
 
Klimato kaitos pavojai
Klimato kaitos pavojaiKlimato kaitos pavojai
Klimato kaitos pavojaibiomokykla
 
Rèdais & IED_Cuomo
Rèdais & IED_CuomoRèdais & IED_Cuomo
Rèdais & IED_CuomoRèdais
 
Actividade 2ª avaliación
Actividade 2ª avaliaciónActividade 2ª avaliación
Actividade 2ª avaliaciónjuanapardo
 
برنامج معالجة الكلمات
برنامج معالجة الكلماتبرنامج معالجة الكلمات
برنامج معالجة الكلماتSunflower Al-mahrouqi
 
NEW: History #84 and 85
 NEW: History #84 and 85 NEW: History #84 and 85
NEW: History #84 and 85tidalrip
 
Preparazione precampionato anno 1978 1979
Preparazione precampionato anno 1978 1979Preparazione precampionato anno 1978 1979
Preparazione precampionato anno 1978 1979Stefano Merlo
 
Bahan kuiz p2 27 march
Bahan kuiz p2 27 marchBahan kuiz p2 27 march
Bahan kuiz p2 27 marchnm170209
 
Podcast tutorial
Podcast tutorialPodcast tutorial
Podcast tutorialMayci Neal
 
Rèdais & IED_Pericoli
Rèdais & IED_PericoliRèdais & IED_Pericoli
Rèdais & IED_PericoliRèdais
 
How to graph a graph on any standard
How to graph a graph on any standardHow to graph a graph on any standard
How to graph a graph on any standardgoesha93
 

Viewers also liked (20)

Infusionsoft: How to prepare a file to import
Infusionsoft: How to prepare a file to importInfusionsoft: How to prepare a file to import
Infusionsoft: How to prepare a file to import
 
L 10 co-operation competition and conflict
L 10 co-operation competition and conflictL 10 co-operation competition and conflict
L 10 co-operation competition and conflict
 
Indonesia JCM
Indonesia JCM Indonesia JCM
Indonesia JCM
 
Dia de la Madre 2013
Dia de la Madre 2013Dia de la Madre 2013
Dia de la Madre 2013
 
Teaching Unity at Mind Candy
Teaching Unity at Mind CandyTeaching Unity at Mind Candy
Teaching Unity at Mind Candy
 
Klimato kaitos pavojai
Klimato kaitos pavojaiKlimato kaitos pavojai
Klimato kaitos pavojai
 
Crescita solutions
Crescita solutionsCrescita solutions
Crescita solutions
 
Rèdais & IED_Cuomo
Rèdais & IED_CuomoRèdais & IED_Cuomo
Rèdais & IED_Cuomo
 
Actividade 2ª avaliación
Actividade 2ª avaliaciónActividade 2ª avaliación
Actividade 2ª avaliación
 
برنامج معالجة الكلمات
برنامج معالجة الكلماتبرنامج معالجة الكلمات
برنامج معالجة الكلمات
 
Facebook
FacebookFacebook
Facebook
 
NEW: History #84 and 85
 NEW: History #84 and 85 NEW: History #84 and 85
NEW: History #84 and 85
 
الأسبوع التاسع
الأسبوع التاسعالأسبوع التاسع
الأسبوع التاسع
 
Preparazione precampionato anno 1978 1979
Preparazione precampionato anno 1978 1979Preparazione precampionato anno 1978 1979
Preparazione precampionato anno 1978 1979
 
παρουσιαση 2016
παρουσιαση   2016παρουσιαση   2016
παρουσιαση 2016
 
Bahan kuiz p2 27 march
Bahan kuiz p2 27 marchBahan kuiz p2 27 march
Bahan kuiz p2 27 march
 
Podcast tutorial
Podcast tutorialPodcast tutorial
Podcast tutorial
 
Rèdais & IED_Pericoli
Rèdais & IED_PericoliRèdais & IED_Pericoli
Rèdais & IED_Pericoli
 
How to graph a graph on any standard
How to graph a graph on any standardHow to graph a graph on any standard
How to graph a graph on any standard
 
Question 4
Question 4Question 4
Question 4
 

Similar to Puc IU

INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSbadri narayan
 
Telecommunications, Internet and Wireless Technology
Telecommunications, Internet and Wireless TechnologyTelecommunications, Internet and Wireless Technology
Telecommunications, Internet and Wireless TechnologyPiyushHooda
 
basic concepts of networking.ppt
basic concepts of networking.pptbasic concepts of networking.ppt
basic concepts of networking.pptImXaib
 
9781423903055 ppt ch02
9781423903055 ppt ch029781423903055 ppt ch02
9781423903055 ppt ch02临枫 盖
 
9781423903055 ppt ch02
9781423903055 ppt ch029781423903055 ppt ch02
9781423903055 ppt ch02临枫 盖
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internetTallat Satti
 
Ch03 laudon traver_ppt (e-commerce)
Ch03 laudon traver_ppt (e-commerce)Ch03 laudon traver_ppt (e-commerce)
Ch03 laudon traver_ppt (e-commerce)Beacon House
 
M.Florence Dayana Computer Networks Introduction
M.Florence Dayana   Computer Networks IntroductionM.Florence Dayana   Computer Networks Introduction
M.Florence Dayana Computer Networks IntroductionDr.Florence Dayana
 
You Name Here1. Name a company that uses data as a source of c.docx
You Name Here1. Name a company that uses data as a source of c.docxYou Name Here1. Name a company that uses data as a source of c.docx
You Name Here1. Name a company that uses data as a source of c.docxjeffevans62972
 
Exp2003 Int Ppt 01
Exp2003 Int Ppt 01Exp2003 Int Ppt 01
Exp2003 Int Ppt 01lonetree
 
Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLexume1
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocolGLIM Digital
 

Similar to Puc IU (20)

ch02.ppt
ch02.pptch02.ppt
ch02.ppt
 
Session 2
Session 2Session 2
Session 2
 
Basic's of internet
Basic's of internet Basic's of internet
Basic's of internet
 
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
 
Telecommunications, Internet and Wireless Technology
Telecommunications, Internet and Wireless TechnologyTelecommunications, Internet and Wireless Technology
Telecommunications, Internet and Wireless Technology
 
basic concepts of networking.ppt
basic concepts of networking.pptbasic concepts of networking.ppt
basic concepts of networking.ppt
 
9781423903055 ppt ch02
9781423903055 ppt ch029781423903055 ppt ch02
9781423903055 ppt ch02
 
9781423903055 ppt ch02
9781423903055 ppt ch029781423903055 ppt ch02
9781423903055 ppt ch02
 
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyTelecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technology
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
 
Ch03 laudon traver_ppt (e-commerce)
Ch03 laudon traver_ppt (e-commerce)Ch03 laudon traver_ppt (e-commerce)
Ch03 laudon traver_ppt (e-commerce)
 
CIS 1203 Introduction to the Web
CIS 1203 Introduction to the WebCIS 1203 Introduction to the Web
CIS 1203 Introduction to the Web
 
M.Florence Dayana Computer Networks Introduction
M.Florence Dayana   Computer Networks IntroductionM.Florence Dayana   Computer Networks Introduction
M.Florence Dayana Computer Networks Introduction
 
Networks
NetworksNetworks
Networks
 
You Name Here1. Name a company that uses data as a source of c.docx
You Name Here1. Name a company that uses data as a source of c.docxYou Name Here1. Name a company that uses data as a source of c.docx
You Name Here1. Name a company that uses data as a source of c.docx
 
Exp2003 Int Ppt 01
Exp2003 Int Ppt 01Exp2003 Int Ppt 01
Exp2003 Int Ppt 01
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocols
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
 
Networking
NetworkingNetworking
Networking
 

More from Linh Vo

goskateboardingshop shop.vinaskate.com vietnam skateboard
goskateboardingshop shop.vinaskate.com vietnam skateboardgoskateboardingshop shop.vinaskate.com vietnam skateboard
goskateboardingshop shop.vinaskate.com vietnam skateboardLinh Vo
 
Projects templates
Projects templatesProjects templates
Projects templatesLinh Vo
 
Tiem Tap Hoa sg online
Tiem Tap Hoa sg online Tiem Tap Hoa sg online
Tiem Tap Hoa sg online Linh Vo
 
TiemTapHoaSG
TiemTapHoaSGTiemTapHoaSG
TiemTapHoaSGLinh Vo
 
TiemTapHoa
TiemTapHoaTiemTapHoa
TiemTapHoaLinh Vo
 
TiemTapHoa
TiemTapHoaTiemTapHoa
TiemTapHoaLinh Vo
 
Chapter02
Chapter02Chapter02
Chapter02Linh Vo
 

More from Linh Vo (10)

goskateboardingshop shop.vinaskate.com vietnam skateboard
goskateboardingshop shop.vinaskate.com vietnam skateboardgoskateboardingshop shop.vinaskate.com vietnam skateboard
goskateboardingshop shop.vinaskate.com vietnam skateboard
 
Projects templates
Projects templatesProjects templates
Projects templates
 
Tiem Tap Hoa sg online
Tiem Tap Hoa sg online Tiem Tap Hoa sg online
Tiem Tap Hoa sg online
 
TiemTapHoaSG
TiemTapHoaSGTiemTapHoaSG
TiemTapHoaSG
 
TiemTapHoa
TiemTapHoaTiemTapHoa
TiemTapHoa
 
TiemTapHoa
TiemTapHoaTiemTapHoa
TiemTapHoa
 
Chapter02
Chapter02Chapter02
Chapter02
 
Puc iu
Puc iuPuc iu
Puc iu
 
Puc Iu
Puc IuPuc Iu
Puc Iu
 
LINH
LINHLINH
LINH
 

Recently uploaded

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 

Recently uploaded (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 

Puc IU

  • 1. Advanced Diploma of Information Technology MIT Nguyễn Hữu Phát Kent International College 80 hours
  • 2.
  • 3. In this chapter, you will learn about:  The origin, growth, and current structure of the Internet  How packet-switched networks are combined to form the Internet  How Internet protocols and Internet addressing work  The history and use of markup languages on the Web, including SGML, HTML, and XML E-Commerce: The Second Wave, Fifth Annual Edition 3
  • 4. How HTML tags and links work on the World Wide Web  The differences among internets, intranets, and extranets  Options for connecting to the Internet, including cost and bandwidth factors  About Internet2 and the Semantic Web E-Commerce: The Second Wave, Fifth Annual Edition 4
  • 5. Computer network › Any technology that allows people to connect computers to each other  The Internet › A large system of interconnected computer networks spanning the globe  World Wide Web › A subset of computers on the Internet E-Commerce: The Second Wave, Fifth Annual Edition 5
  • 6. Early 1960s › U.S. Department of Defense funded research to explore creating a worldwide network  In1969, Defense Department researchers › Connected four computers into network called ARPANET  Throughout 1970s and 1980s › Academic researchers connected to ARPANET and contributed to its technological developments E-Commerce: The Second Wave, Fifth Annual Edition 6
  • 7. 1972 › E-mail was born  Mailing list › E-mail address that forwards any message received to any user who has subscribed to the list  Usenet › Started by group of students and programmers at Duke University and the University of North Carolina E-Commerce: The Second Wave, Fifth Annual Edition 7
  • 8. In 1991, NSF › Eased restrictions on commercial Internet activity › Began implementing plans to privatize the Internet  Network access points (NAPs) › Basis of new structure Internet  Network access providers › Sell Internet access rights directly to larger customers and indirectly to smaller firms and individuals through ISPs E-Commerce: The Second Wave, Fifth Annual Edition 8
  • 10. E-Commerce: The Second Wave, Fifth Annual Edition 10
  • 11. The $23.4 billion in annual internet advertising spending exceeded advertising on cable TV for the first time (which was $21.4 billion), and took the No. 3 spot behind national and local TV ads ($29.8 billion) and newspaper ads ($34.4 billion).
  • 12. Internet advertising is almost twice as large as broadcast TV advertising was in its 14th year ($13.3 billion) and nearly four times as large as cable TV ($6.5 billion).
  • 13. The Web › Software that runs on computers connected to the Internet  Vannevar Bush › Speculated that engineers would eventually build a memory extension device (the Memex)  In the 1960s › Ted Nelson described a similar system called hypertext
  • 14. Tim Berners-Lee › Developed code for hypertext server program  Hypertext server › Stores files written in hypertext markup language › Lets other computers connect to it and read files  Hypertext Markup Language (HTML) › Includes set of codes (or tags) attached to text
  • 15. Local area network (LAN) › Network of computers located close together  Wide area networks (WANs) › Networks of computers connected over greater distances  Circuit › Combination of telephone lines and closed switches that connect them to each other
  • 16.  Circuit switching › Centrally controlled, single-connection model  Packets › Files and e-mail messages on a packet-switched network that are broken down into small pieces › Travel from computer to computer along the interconnected networks until they reach their destinations
  • 17. Routing computers › Computers that decide how best to forward packets  Routing algorithms › Rules contained in programs on router computers that determine the best path on which to send packet › Programs apply their routing algorithms to information they have stored in routing tables
  • 18. E-Commerce: The Second Wave, Fifth Annual Edition 18
  • 19.  Protocol › Collection of rules for formatting, ordering, and error- checking data sent across a network  Rules contributing to success of Internet › Independent networks should not require any internal changes to be connected to the network › Packets that do not arrive at their destinations must be retransmitted from their source network › Router computers act as receive-and-forward devices › No global control exists over the network
  • 20. TCP › Controls disassembly of a message or a file into packets before transmission over Internet › Controls reassembly of packets into their original formats when they reach their destinations  IP › Specifies addressing details for each packet E-Commerce: The Second Wave, Fifth Annual Edition 20
  • 21. Internet Protocol version 4/6 (IPv4/6) › Uses a 32-bit number to identify computers connected to the Internet  Base 2 (binary) number system › Used by computers to perform internal calculations  Subnetting › Use of reserved private IP addresses within LANs and WANs to provide additional address space E-Commerce: The Second Wave, Fifth Annual Edition 21
  • 22. Private IP addresses › Series of IP numbers not permitted on packets that travel on the Internet  Network Address Translation (NAT) device › Used in subnetting to convert private IP addresses into normal IP addresses  Internet Protocol version 6 (IPv6) › Protocol that will replace IPv4 › Uses a 128-bit number for addresses
  • 23. Sets of words assigned to specific IP addresses  Top-level domain (or TLD) › Rightmost part of a domain name  Internet Corporation for Assigned Names and Numbers (ICANN) › Responsible for managing domain names and coordinating them with IP address registrars
  • 24. E-Commerce: The Second Wave, Fifth Annual Edition 24
  • 25. Web client computers › Run software called Web client software or Web browser software  Web server computer › Runs software called Web server software  Client/server architecture › Combination of client computers running Web client software and server computers running Web server software
  • 26. Hypertext Transfer Protocol (HTTP) › Set of rules for delivering Web page files over the Internet  Uniform Resource Locator (URL) › Combination of the protocol name and domain name › Allows user to locate a resource (the Web page) on another computer (the Web server)
  • 27. Electronic mail (e-mail) › Must also be formatted according to common set of rules  E-mail server › Computer devoted to handling e-mail  E-mail client software › Used to read and send e- mail › Example: Microsoft Outlook, Netscape Messenger
  • 28. Simple Mail Transfer Protocol (SMTP) › Specifies format of a mail message  Post Office Protocol (POP) › POP message can tell the e-mail server to  Send mail to user’s computer and delete it from e-mail server  Send mail to user’s computer and not delete it  Simply ask whether new mail has arrived › Provides support for Multipurpose Internet Mail Extensions (MIME)
  • 29. Text markup language › Specifies set of tags that are inserted into text  Standard Generalized Markup Language (SGML) › Older and complex text markup language › A meta language  World Wide Web Consortium (W3C) › Not-for-profit group that maintains standards for the Web
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. Offers a system of marking up documents that is independent of any software application  Nonproprietary and platform independent  Offers user-defined tags  Costly to set up and maintain
  • 35. Prevalent markup language used to create documents on the Web today  HTML tags › Interpreted by Web browser and used by it to format the display of the text  HTML Links › Linear hyperlink structure › Hierarchical hyperlink structure E-Commerce: The Second Wave, Fifth Annual Edition 35
  • 36. Scripting languages and style sheets › Most common scripting languages  JavaScript, JScript, Perl, and VBScript › Cascading Style Sheets (CSS)  Sets of instructions that give Web developers more control over the format of displayed pages  Style sheet  Usually stored in a separate file  Referenced using the HTML style tag E-Commerce: The Second Wave, Fifth Annual Edition 36
  • 37. Uses paired start and stop tags  Includes data management capabilities that HTML cannot provide  Differences between XML and HTML › XML is not a markup language with defined tags › XML tags do not specify how text appears on a Web page E-Commerce: The Second Wave, Fifth Annual Edition 37
  • 38. E-Commerce: The Second Wave, Fifth Annual Edition 38
  • 39. Intranet › Interconnected network that does not extend beyond organization that created it  Extranet › Intranet extended to include entities outside boundaries of organization › Connects companies with suppliers, business partners, or other authorized users
  • 40. Public network › Any computer network or telecommunications network available to the public  Private network › A private, leased-line connection between two companies that physically connects their intranets  Leased line › A permanent telephone connection between two points
  • 41. Extranet that uses public networks and their protocols  IP tunneling › Effectively creates a private passageway through the public Internet  Encapsulation › Process used by VPN software  VPN software › Must be installed on the computers at both ends of the transmission
  • 42. Bandwidth › Amount of data that can travel through a communication line per unit of time  Net bandwidth › Actual speed that information travels  Symmetric connections › Provide same bandwidth in both directions  Asymmetric connections › Provide different bandwidths for each direction
  • 43. POTS, or plain old telephone service › Uses existing telephone lines and analog modem › Provide bandwidth between 28 and 56 Kbps  Digital Subscriber Line (DSL) › Connection methods do not use modem  Integrated Services Digital Network (ISDN) › Offers bandwidths between 128 Kbps and 256 Kbps
  • 44. Operate at speeds of greater than 200 Kbps  Asymmetric digital subscriber (ADSL) › Transmission bandwidth is from 100 to 640 Kbps upstream and from 1.5 to 9 Mbps downstream  Cable modems › Provide transmission speeds between 300 Kbps and 1 Mbps  DSL › Private line with no competing traffic E-Commerce: The Second Wave, Fifth Annual Edition 44
  • 45. DS0 (digital signal zero) › Telephone line designed to carry 1 digital signal  T1 line (also called a DS1) › Carries 24 DS0 lines and operates at 1.544 Mbps  Fractional T1 › Provides service speeds of 128 Kbps and upward in 128- Kbps increments  T3 service (also called DS3) › Offers 44.736 Mbps
  • 46. Bluetooth › Designed for personal use over short distances › Low-bandwidth technology, with speeds of up to 722 Kbps › Networks are called personal area networks (PANs) or piconets › Consumes very little power › Devices can discover each other and exchange information automatically
  • 47.  Most common wireless connection technology for use on LANs  Wireless access point (WAP) › Device that transmits network packets between Wi-Fi-equipped computers and other devices  Has potential bandwidth of 11 Mbps and range of about 300 feet  Devices are capable of roaming E-Commerce: The Second Wave, Fifth Annual Edition 47
  • 48. 802.11a protocol › Capable of transmitting data at speeds up to 54 Mbps  802.11g protocol › Has 54 Mbps speed of 802.11a › Compatible with 802.11b devices  802.11n › Expected to offer speeds up to 320 Mbps E-Commerce: The Second Wave, Fifth Annual Edition 48
  • 49. One version uses system of repeaters to forward radio signal from ISP to customers  Repeaters › Transmitter-receiver devices (transceivers)  Mesh Routing › Directly transmits Wi-Fi packets through hundreds, or even thousands, of short-range transceivers
  • 50. Third-generation (3G) cell phones › Combine latest technologies available today  Short message service (SMS) › Protocol used to send and receive short text messages  Mobile commerce (m-commerce) › Describes the kinds of resources people might want to access using wireless devices
  • 51. Internet2 › Experimental test bed for new networking technologies › Has achieved bandwidths of 10 Gbps and more on parts of its network › Used by universities to conduct large collaborative research projects E-Commerce: The Second Wave, Fifth Annual Edition 51
  • 52. Semantic Web › Project by Tim Berners-Lee › If successful  Would result in words on Web pages being tagged (using XML) with their meanings  Resource description framework (RDF) › Set of standards for XML syntax  Ontology › Set of standards that defines relationships among RDF standards and specific XML tags
  • 53. TCP/IP › Protocol suite used to create and transport information packets across the Internet  POP, SMTP, and IMAP › Protocols that help manage e-mail  Languages derived from SGML › Hypertext Markup Language (HTML) › Extensible Markup Language (XML) E-Commerce: The Second Wave, Fifth Annual Edition 53
  • 54. Intranets › Private internal networks  Extranet › Used when companies want to collaborate with suppliers, partners, or customers  Internet2 › Experimental network built by a consortium of research universities and businesses E-Commerce: The Second Wave, Fifth Annual Edition 54