electronic commerce comp3210 session 2: internetworking and the www dr. paul walcott dr. paul...
TRANSCRIPT
Electronic CommerceCOMP3210
Session 2: Internetworking and the WWW
Dr. Paul Walcott
Dr. Paul Walcott - Department of Computer Science, Mathematics and Physics, University of the West Indies, Cave Hill Campus, Barbados, W.I.; email [email protected]; © 2005
2
Session Objectives
After completing this session you will be able to: Describe the Internet and discuss its
history Describe the World Wide Web (WWW) and
write a simple HTML document Describe different types of computer
networks Discuss different methods of connecting to
the Internet
4
What is the Internet1
The Internet is a large system of inter-connected networks that span the globe
Internet-ready computers and personal digital assistants (palm and pocket PCs) can access this network2
5
What is the Internet Cont’d
The Federal Networking Council (FNC) defines the Internet more formally as the global information system that3: is logically linked together by a globally
unique address space based on the Internet Protocol (IP) or its subsequent extensions/follow-ons
6
What is the Internet Cont’d
is able to support communications using the Transmission Control Protocol/Internet Protocol (TCP/IP) suite or its subsequent extensions/follow-ons, and/or other IP-compatible protocols; and
provides, uses or makes accessible, either publicly or privately, high level services layered on the communications and related infrastructure described herein
7
What is the Internet Cont’d
The Internet allows: communication by e-mail the reading of on-line newspapers, academic
journals and books the joining of discussion groups, participation in simulations and games downloading of software, electronic books and
music businesses to market and sell products and
services (e-commerce)
8
The History of the Internet1
In the early 1960s the US department of defense began investigating ways of creating networks of computers that coordinate and control nuclear weapons
This network was to withstand attack, so that even if part of it was down it will continue to function This network was to have no central control
These new networks required multiple channels to send information (leased lines inadequate)
9
The History of the Internet Cont’d In 1969 the advanced research agency
(ARPA) used this network model to connect four computers
This network was called ARPANET During the 1970s and 1980s the academic
community contributed to this network In the late 1980s this network became the
Internet
10
Internet Growth1
In 1969 ARPANET (the Internet) connected 4 computers
In 1990 the Internet connected 300,000 In 1995 the intranet was privatised
The structure was based on four network access points (NAPs) operated by different telecom companies in the US
As the Intranet grew, more NAPs were added
11
Internet Growth Cont’d
The NAPs began selling Internet access rights to large customers Internet service provides (ISPs) sold on the service to
small businesses and individuals Growth in Internet hosts rose from under 10
million in 1995 to over 180 million in 2004 Millions of people now use the Internet Billions of dollars are exchanged from the sales
of products and services Estimated number of Web sites is 40 million and
billions of web pages
12
The World Wide Web
What is the World Wide Web?
What is hypertext? Hypertext markup
language (HTML) example
What types of Web sites exist?www.ransen.com/Repligator/Spider.htm
13
What is the World Wide Web
The World Wide Web (WWW) was an Internet-based hypertext project that allowed global information sharing2
It is software that runs on machines connected to the WWW
The WWW is based on two concepts1: Hypertext and a graphical user interface (a Web browser)
14
HyperText Markup Language
HTML is a language that includes a set of tags attached to text
These tags describe the relationship between text elements
A hypertext link (or hyperlink) points to another location in the same or another HTML document (that might be stored on the same or another computer)
15
HTML Example
<html> <!-- An HTML document typically contains a head and a body --><head> <title>Hypertext Markup Language (HTML) Example</title></head>
<!-- This is the body part of the document --><body bgcolor="#0000AA"> <font color="#FFFFFF"> <h1><u>Hypertext Markup Language</u></h1> Hypertext Markup Language (HTML) allows users to: <ol> <li>format and display text <li>display images <li>and so much more … </ol> <img src="HTMLexample.jpg"> <a href="#top">Go to top of page</a> </font></body></html>
16
Graphical Interface for Hypertext
A Web browser is a graphical user interface used to read and navigate through files written in HTML
In 1993 the first graphical web browser was developed; called Mosiac
Popular web browsers include: Internet Explorer Netscape Firefox
17
Hypertext Servers (Web Servers)1
There are several Web servers available today, however the most popular are (April 2004 survey)4: Apache HTTP Server (69.01%) Microsoft Internet Information Server (IIS)
(23.26%) Sun Java System Web Server (JSWS) (former
names are Sun One, iPlanet Enterprise Server and Netscape Enterprise Server) (0.86%)
18
Apache (“A Patchy” Server)
Developed in 1994 by Rob McCool The original core system has many patches
applied to it, and thus its name Apache has dominated the Web since 1996 Available free Runs on operating systems including
FreeBSD-UNIX, HP-UX, Linux, Microsoft Windows, SCO-UNIX and Solaris
19
Microsoft Internet Information Server (IIS)
Comes bundled with Microsoft Windows Server operating system
IIS used on many corporate intranets (Microsoft standard product)
Originally written to run on Windows NT and Windows 2000; runs on Windows 2003 Server and Windows XP
Supports ASP, ActiveX Data objects and SQL queries
20
Sun Java System Web Server
This is a descendant of the original NCSA server
Cost US$1500-per-CPU licensing fee Runs on HP-UX, Solaris and Windows Is ODBC compatible (i.e. full access to
ODBC databases)
21
Web Site Types
There are numerous different types of Web sites including: Development sites: are used by companies to
evaluate web site designs. The initial investment in these sites are small since they use existing hardware (i.e. no special hardware is purchased)
Intranets: these are corporate networks that hold documents such as internal memos, corporate handbooks, expense account worksheets, budgets and newsletters
22
Web Site Types Cont’d
Extranets: which allow external entities, e.g. suppliers and strategic partners to access a subset of the information on the Intranet
Transaction-processing: These sites operate 24 hours a day, seven days a week and require fast, reliable hardware and e-commerce software Web sites hosting B2B and B2C activities must have
spare capacity to support an increase in customer volume.
23
Web Site Types Cont’d
Content-delivery: sites must be available seven days a week, 24 hours a day and require fast and precise search engines to help visitors locate information quickly These sites deliver content such as news,
histories and other digital information.
24
Networking What is a computer
network? What are some of the
types of networks? Characteristics of
networks Network topology Network protocols Network architecture
Routers Domain Names Intranets, Extranets and
VPNs
http://www-structure.llnl.gov/Xray/comp/network.gif
26
Types of Networks6
There are several types of computer networks: Local-area network (LANs)
Computers that are geographically close to each other (in the same building)
Wide-area network (WANs) Computers are farther apart than LANs;
typically connected by telephone lines or radio waves
Provides a single path between caller and receiver (circuit switching)
27
Types of Networks Cont’d
Campus-area network (CANs) These computers are within a limited
geographic area, e.g. a campus Metropolitan-area network (MANs)
These networks are designed for towns and cities
Home-area network (HANs) A network created in a person’s home
28
Types of Networks Cont’d
Both LANs and WANs are examples of packet-switched networks
In packet-switched networks: Messages are broken down into small pieces
called packets and are labeled electronically with their origin, sequence and destination addresses
Each packet may take a different path The destination computer puts the packets back
together in the correct order
29
Characteristics of Networks5,6
A network is characterised by its: Topology
The geometric arrangement of the computer system
Architecture This refers to the two major type of networks, peer-to-
peer or client/server
Protocol The set of rules and signals used to communicate (e.g.
Ethernet or IBM’s Token Ring)
30
Network Topologies6
Common network topologies include: Star topology Ring topology Bus topology Other topologies
include the: Mesh topology Tree topology
http://www.webopedia.com/TERM/s/star_network.html
31
Network Topologies Cont’d
Network topologies are considered either logical or physical The physical lay out of the network is its
physical topology The way signals are routed through a
network is the logical topology Just because a network has a particular
physical topology does not mean that its logical topology must be the same
32
Network Topologies Cont’d
For example: Twisted-pair Ethernet has a logical bus
topology on a physical star topology layout
IBM’s token ring has a logical ring topology on a physical star topology
33
Star Topology
In a Star network all nodes are connected through a central hub A node is a computer or device, e.g. a
printer; each node has a unique address called the Data Link Control (DLC) address or the Media Access Control (MAC) address
The main advantage of the star network is that a malfunctioning node does not affect the rest of the network
34
Star Topology Cont’d
The main disadvantage of the star network is that: It requires more cabling than other
topologies (e.g. the ring network), and If the hub goes down, the network no
longer functions Standard twisted-pair Ethernet uses
the star topology
35
Ring Topology
Each node in a ring network is connected to two other nodes to form a closed loop
Messages pass around the ring and each node reads the message addressed to it
One advantage of a ring network is that it can span larger distances than other networks (e.g. bus) because each node regenerates the signal
One disadvantage is that malfunctioning nodes can make other nodes inaccessible
IBM’s token ring uses a logical ring topology
36
Bus Topology
The nodes in a bus topology are connected to a central cable call a bus or backbone
The bus has two end points One advantage of the bus network is that if one
node goes down the network still functions One disadvantage of the bus network is it can not
travel as long a distance as say a ring network due to the diminishing signal strength
Ethernet 10Base-2 and 10Base-5 uses the bus topology
37
Mesh Topology
In the mesh topology many redundant connections exist between nodes; in a true mesh, each node is connected to every other node
http://www.webopedia.com/quick_ref/topologies.asp
38
Tree Topology
The tree topology is a hybrid where groups of star-configured networks are connected to a linear bus backbone
http://www.webopedia.com/quick_ref/topologies.asp
39
Architecture6
The two main types of architecture are Peer-to-Peer Client/Server
http://www.rebri.org.nz/images/builder-big.jpg
40
Peer-To-Peer (P2P) Networks
In a P2P network each node has equivalent capabilities and responsibilities
These networks are simpler than Client/Server but do not offer the same performance under heavy loads
41
Client/Server Networks
A network architecture where each node is either a client or server
Client computers run applications, but rely on servers for resources such as files and printing capabilities
Servers are powerful computers that manage files, printers or network traffic
This architecture is sometimes called the two-tier architecture
42
Protocols
Protocols are agreed formats for transmitting data between devices6
The protocol determines: The error checking
required Data compression
method used The way the end of a
message is signaled T
The way the device indicates that it has received the message
43
Protocols Cont’d
A protocol is a collection of rules for: Formatting, ordering and error checking
data that is sent across a network e.g. The protocol might indicate when a
sending device has completed sending data
The ARPANET network used the network control protocol (NCP) It was based on an open architecture
which later became the Internet
44
Protocols Cont’d
Four key rules used by ARPANET were: Independent networks (e.g. A LAN or WAN)
should not require internal changes in order to be connected to the network
Packets that do not arrive at their destination must be resent from their source network
Router computers act only as receiving and forwarding devices; They do not retain information about the packets they handle
No global control of the network exist
45
Internet Protocols
There are many protocols used by the Internet and the WWW, including TCP/IP HTTP FTP Electronic mail protocols
IMAP POP
46
TCP/IP
The Internet uses two main protocols (developed by Vicent Cerf and Robert Kahn) Transmission control protocol (TCP)
Controls disassembly of message into packets at the origin
Reassembles at the destination
Internet protocol (IP) Specifies the addressing details for each packet
Each packet is labeled with its origin and destination
47
Internet Protocol version 4 (IPv4)
Uses a 32 bit number to identify each computer Called the IP address (4 billion
addresses) IP addresses uses the dotted decimal
notation, e.g. 0.0.0.0 or 255.255.255.255
48
Internet Protocol version 6 (IPv6)
Set to replace version 4 Changes the format of the packets
Removes unused fields Uses 128 bit number (2^128 addresses)
Eight groups of 16 bits e.g.
CD18:0000:0000:AF23:0000:FF9E:61B2:884D To simplify zeroes may be removed
CD18:::AF23::FF9E:61B2:884D
49
Internet Addresses
Internet addresses are represented in several ways,but all the formats are translated to a 32-bit numbercalled an IP address; a function of Internet Protocol (IP)
The increased demand for IP addresses will soonmake 32-bit addresses too small, and they will bereplaced with 128-bit addresses (IP v6.0) in the near future.
How does increasing the number of bits in the address helpwith increasing demand?
50
Dotted Quads
• IP numbers appear as a series of up to 4 separatenumbers delineated by a period.
• Examples:students.depaul.edu: 140.192.1.100condor.depaul.edu: 140.192.1.6 facweb.cs.depaul.edu: 140.192.33.6
• Each of the four numbers can range from 0 to 255, so the possible IP addresses range from 0.0.0.0 to 255.255.255.255
52
Domain Names
• Since IP numbers can be difficult for humans toremember, domain names are associated witheach IP address.
• Examples: students.depaul.edu: 140.192.1.100facweb.cs.depaul.edu: 140.192.33.6
• A domain name server is responsible for the mapping between domain names and IP addresses.
• Domain names and IP addresses are registered separately. Registering domain name doesn’t imply getting an IP address. IP address is from hosting service.
53
Uniform Resource Locator
• People on the Web use a naming convention called the uniform resource locator (URL).
• A URL consists of at least two and as many as four parts.
• A simple two part URL contains the protocolused to access the resource followed by thelocation of the resource.Example: http://www.cs.depaul.edu/
• A more complex URL may have a file nameand a path where the file can be found.
54
http://www.daschmelzer.com/ect250/hw/h1/h1.htm
hypertext transfer protocol
domainpath that indicates the location of the document in the host’s file system
documentname
A URL deconstructed
This is considered a fully specified URL
55
Anatomy of an eMail Address
dschmelzer @ cti . depaul . edu
Handle Host/Server DomainDomain
Type
Others:• students• hawk• condor
56
Shortened URL
Simply by typing www.cs.depaul.edu into browser allows http to locate specific file
Web servers are set to “default” to specific file names when full URL (or filename) not given.
index.htm (.html, .asp, .jsp, etc) and default.htm (etc……) are examples.
Name the template file in HW1: index.htm
57
Domain types
.com Commercial organizations
or businesses .edu
Educational institutions .gov
U.S. government agencies .mil
U.S. military .net
Network computers .org
Nonprofit organizations and foundations
.biz business firms
.info information providers
.aero Air transport industry
.coop Cooperatives
.museum Museums
.name Individuals
.pro Professionals
58
Hypertext Transfer Protocol (HTTP)7
The hypertext transfer protocol (HTTP) was developed by Tim Berners-Lee in 1991
HTTP was designed to transfer pages between machines
The client (or Web browser) makes a request for a given page and the Server is responsible for finding it and returning it to the client
59
Hypertext Transfer Protocol (HTTP) The browser connects and requests a page from
the server The server reads the page from the file system,
sends it to the client and terminated the connection
Client Web Server
Request sent to Web server
Response sent with files (one for eachWeb page, image, sound clip etc.)
60
File Transfer Protocol (FTP)2
FTP is a protocol that allows a user to: list files at a remote site Transfer files between local and remote computers
Using FTP you can not run applications on a remote site
Also you can only look at the names of the files on the remote computer; rather than being able to read them
FTP is still used today; e.g. to transfer large files between computers, or to upload Web sites
61
Electronic Mail Protocols
Electronic mail uses the client/server model
The organisation has an email server devoted to handling email Stores and forwards email messages
Individuals uses email client software to read and send email (e.g. Microsoft Outlook, or Netscape Messenger)
62
Electronic Mail Protocols Cont’d
Simple Mail Transfer Protocol (SMTP) Specifies format of mail messages
Post Office Protocol (POP) tells the email server to:
Send mail to the user’s computer and delete it from the server
Send mail to the user’s computer and do not delete it from the server
Ask whether new mail has arrived
63
Electronic Mail Protocols Cont’d
Interactive Mail Access Protocol (IMAP) Newer than POP, provides similar
functions with additional features e.g. can send specific messages to the client
rather than all the messages A user can view email message headers and
the sender’s name before downloading the entire message
Allows users to delete and search mailboxes held on the email server
64
Electronic Mail Protocols Cont’d
The disadvantages of POP You can only access messages from one
PC The disadvantage of IMAP
Since email is stored on the email server, there is a need for more and more expensive (high speed) storage space
65
Terminal Emulation
Telnet is a terminal emulation program for TCP/IP networks
The telnet program runs on a local machine and allows connection to a remote machine
Commands entered through the telnet program will be executed on the Server; this gives the user the ability to control the Server
To log into the Server a valid username and password is required
66
Routers
Computers that decide how best to forward on a packet to its destination is called a routing computer
The Internet uses routers to isolate each LAN or WAN
Each WAN or LAN can use their own protocol for packet traffic within the LAN or WAN
The actual programs which contains the routing rules are called routing algorithms
67
Routers Cont’d
These programs apply their routing algorithms to information they have stored in routing tables This information includes lists of
connections that lead to particular groups of other routers
Which connections to use first Rules for handling instances of heavy
packet traffic and network congestion
68
Routers Cont’d
When a company connects to the Internet it must connect at least one router to routers owned by other companies that make up the Internet
The Internet backbone are a set of routers that handle packet traffic along the Internet’s main connecting points These are very large computers that can handle
more than 50 million packets per second A router connected to the Internet always has
more than one path to direct packets
69
Domain Names
To make Internet addresses easier to remember an alternative, domain names, was provided which used words
Domain names May have two or more groups separated by a
period, e.g. www.cavehill.uwi.edu Edu – an education institution Cavehill and uwi – the computer’s name www – part of the world wide web
Not all computers follow this convention, e.g games.yahoo.com
70
Domain Names Cont’d
The rightmost part of the domain name is called the top-level domain (or TLD), e.g. .edu, or .com also Country domains e.g. .bb
In 2000 seven new general TLDs were added: .aero – air transport industry .biz – businesses .coop – cooperatives .museum – museums .name – individuals .pro - professionals
71
Uniform Resource Locator
The combination of the domain name and the protocol name is called the uniform resource locator (URL) E.g. http://www.yahoo.com
http is the protocol www.yahoo.com is the domain name
72
Intranets and Extranets
An Intranet is an interconnected network (internet) that does not extend beyond the organisation that created it
An extranet is an intranet that has extended to include specific entities outside of the organisation, e.g. business partners, customers or suppliers Extranets can replace faxes, telephones, email
and overnight carriers, at a lower cost
73
Intranets
Low cost distribution of internal corporate information
Based on client server model Intranets use Web browsers, internet-based
protocols including TCP/IP, FTP, Telnet, HTML and HTTP
Distributing paper is often more expensive Intranets can also be used to provide software
updates and patches, which update users computers automatically – using scripts
74
Extranet
Networks that connect companies with suppliers, business partners and authorised users
Each user has access to the databases, files and other information stored on computers connected to the extranet
Fedex changed from an Intranet to Extranet for package tracking on their Web site
75
Public and Private Networks
A public network is any network available to the public, e.g. Internet
A private network is a private (e.g leased) line between two computers Leased line is a permanent connection between two
points line is always active (unlike telephone connection) The advantage is security (only the two parties can
connect to the network) The disadvantage is the cost due to the scaling problem:
to connect 5 pairs, 5 lines are required
76
Virtual Private Networks
A VPN is an extranet that uses public networks and their protocols to send sensitive information using IP tunneling
IP tunneling creates a private passageway through the public Internet that provides secure transmissions
77
Virtual Private Networks Cont’d
VPN software encrypts the package content and places it into another packet (encapsulation)
The outer packet is called an IP wrapper The receiving computer decrypts it using the (VPN
software) The connection is ‘virtual’ since it is only temporary,
it is created when information needs to be transmitted
A VPN is an extranet, but not every extranet is a VPN
78
Connecting to the Internet1
What are some of the ways of connecting to the Internet?
http://www.co.delaware.ny.us/links.htm
79
Internet Connection Options
Internet service providers (ISPs) provide several ways to connect to the Internet, including: Voice grade telephone lines Broadband connections Leased lines Wireless
The major distinguishing factor is bandwidth (the amount of data that can be transferred per unit of time)
80
Bandwidth and Connections
Symmetric connection: provides the same bandwidth in both directions
Asymmetric connections: provide different bandwidths for either direction Upstream bandwidth (upload bandwidth): the
amount of information that can travel from the user to the Internet in a given amount of time
Downstream bandwidth (download or downlink bandwidth): the amount of information that can be transferred from the Internet to the user in an amount of time
81
Voice-grade Telephone Connections
Most common way to connect to ISP Modem (analog) connected to telephone lines POTS (plain old telephone service)
28 to 56Kbps
Digital subscriber line (DSL) protocol Does not use a modem Uses a piece of network equipment similar to a
network switch Integrated services digital network (ISDN) first used DSL
protocol suite in 1984 More expensive, but offers bandwidth of 128Kbps –
256Kbps
82
Broadband Connections Cont’d
Connections that operate at speeds higher than 200Kbps are considered broadband
One of the latest is asymmetric digital subscriber line (ADSL) Bandwidths from 100-640Kbps upstream and
from 1.5 to 9 Mbps downstream For businesses a high-speed DSL (HDSL) is
available 768Kbps of symmetric bandwidth
83
Broadband Connections Cont’d
Cable modems (connected to the same broadband coaxial cable that serves a television) Upstream bandwidth of 300Kbps to 1
Mbps and downstream bandwidth of 10Mbps
84
DSL v Cable
DSL is a private line with no competing traffic
Cable connections bandwidth change with the user load (number of subscribers using the service)
Problems Web users in rural areas often do not have cable
access and have limited telephone access (low cost voice-grade lines, rather than data-grade lines) thus bandwidth is limited (<14Kbps)
85
Leased-Line Connections
Large firms with a large amounts of Internet traffic can lease lines from telecommunication carriers
Various technologies are used; classified by the amount of telephone lines they include: DS0 (digital signal zero) carries one digital signal
(64Kbps) T1 (or DS1) carries 24 DS0 lines (1.544Mbps) Fractional T1 (128Kbps and upwards) T3 (or DS3) carries 30 T1 lines (44.736Mbps)
Connections more expensive than POTS, ISDN and DSL
86
Wireless Connections
Satellite Bluetooth Wireless Ethernet (Wi-Fi) Fixed-Point Wireless Cellular Telephone Networks
87
Satellite
Satellite microwave transmissions Customer placed
receiving dish in yard Download bandwidth
of around 500 kbps Maximum upload
bandwidth of 150kbps Self installation
makes cost lower
http://www.ccpo.odu.edu/~arnoldo/ocean405/satellite.gif
88
Bluetooth
One of the first wireless protocols
Operates reliably over 35 feet and can be part of up to 10 networks of eight devices each (personal area networks, or PANs)
Bandwidth of 722kbps Good for wireless
printing
http://www.bakercountyhealth.org/services/dental/blue-tooth.jpg
89
Bluetooth Advantages
Bluetooth technology consumes very little power
Bluetooth devices can discover each other and exchange information automatically (e.g. a user can print to a printer on a network without logging on)
90
Wireless Ethernet (Wi-Fi) (802.11b) Most common wireless
on LANs Bandwidth 11Mbps at
300 feet A computer with a Wi-
Fi network can communicate with a wireless access point (WAP) to become a part of the network
http://www.homenethelp.com/web/diagram/images/shareing-soft-wireless.gif
91
Wireless Ethernet Advantages
Wi-Fi devices can roam, i.e. shift from one WAP to another without user intervention
Increasingly WAPs are becoming available in public places, e.g. airports
92
Wireless Ethernet Developments
In 2002 an improved version of Wi-Fi, called 802.11a was introduced The 802.11a protocol is capable of transmitting
at speeds up to 54Mbps 802.11a is not compatible with 802.11b
Later in 2002, the 802.11g protocol was introduced which is compatible with 802.11b devices and has speeds of 54Mbps
In 2004-2005, 802.11n expected (320Mbps)
93
Fixed Point Wireless
Uses a system of repeaters (transmitter-receiver devices) to forward a radio signal from the ISP to customers
Users’ antennas are connected to a device that converts radio signals to Wi-Fi packets which are sent to their computers
http://www.erinc.com/apps_wireless/images/fixed_wireless2.gif
94
Cellular Telephone Networks
In 2003, about 500 million mobile (cell) phones worldwide
Originally slow data communication (10 kbps – 384kbps)
Third generation cell phones Up to 2 Mbps
http://www.mtco.com/graphics/cellularpic.jpg
95
Cellular Telephone Networks Cont’d Cell phones send and receive messages using the
short message service (SMS) protocol Some cell phones include Web browser which
provide web access, email, short message service Companies also sell Internet access through their
cellular networks Fixed fee plus charge for amount of data transferred
Business potential of mobile commerce Companies are identifying the kinds of resources
individuals might want to access (and pay for) using wireless devices
96
References
[1] Schneider, Gary, P., “Electronic Commerce: The second wave”, Thomson Course Technology, Fifth Annual Edition, 2004
[2] Zhao, Jensen J., “Web design and development for e-business”, Prentice Hall, 2003
[3] Federal Networking Council, “FNC Resolution: Definition of the Internet”, 1995. Online document available at http://www.itrd.gov/fnc/Internet_res.html
[4] NetCraft, “April 2004 Web Server Survey”, 2004. Online document available at http://news.netcraft.com/archives/2004/04/01/april_2004_web_server_survey.html
[5] Furdyk, Michael, “Ultimate Guide to Networking: Part One”, 1999. Online document available at http://www.hardwarecentral.com/hardwarecentral/print/158/
[6] Webopedia, “Network”, 2004. Online document available at http://networking.webopedia.com/TERM/N/network.html
[7] Berlin, Dan, et al., “CGI Programming Unleased”, Sams.net Publishing, 1996, pp. 101-102