technology in action chapter 13 behind the scenes: how the internet works copyright © 2013 pearson...

92
Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as

Upload: wilfred-martin

Post on 11-Jan-2016

219 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Technology in Action

Chapter 13

Behind the Scenes: How the Internet Works

Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Page 2: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

The Management of the Internet

• Ownership of the Internet– Local networks are owned by

• Individuals

• Universities

• Government agencies

• Private companies

– Infrastructure (high-speed data lines) is owned by• Government entities

• Privately held companies

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 2

Page 3: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

The Management of the Internet (cont.)

• Management the Internet

– Nonprofit organizations and user groups

• Each have a specialized purpose

• Previously handled by U.S. government contractors

– Changed because of global nature of the Internet

• Guarantees worldwide engagement in the direction of the Internet

• Paying for the Internet

– National Science Foundation (NSF)

• Pays for large part of infrastructure

• Funds research and development for new technologies

• Through federal taxes

– Other countries participate as well

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 3

Page 4: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

The Management of the Internet (cont.)

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 4

Page 5: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Internet NetworkingInternet Data Routes

• How computers are connected to the Internet– Internet is a “network of

networks”• Similar to U.S.

highway system– Main paths known

collectively as the Internet backbone

• Large national and international networks

• Owned by commercial, education, or governmental organizations

– Have fastest connections– Bandwidth needs determine

what kind of line is used

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

5

Page 6: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Internet NetworkingInternet Data Routes (cont.)

• How individuals connect to an ISP

– Point of presence (POP)

• A bank of modems, servers, routers, and switches

• Many users can connect simultaneously

– ISPs maintain multiple POPs throughout the geographic area they serve

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 6

Page 7: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Internet NetworkingThe Network Model of the Internet

• The network model the Internet uses– Client/server model

– Clients are• Devices such as computers, tablets, and

smartphones

• Clients use browsers to request services

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 7

Page 8: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Internet NetworkingThe Network Model of the Internet (cont.)

• The network model the Internet use (cont.)– Types of servers

• Web servers: Run specialized operating systems to host web pages and other information

• Commerce servers: Software that enables users to buy goods and services; use security protocols to protect sensitive information

• File servers: Provide remote storage; cloud storage

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 8

Page 9: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Data Transmissionand Protocols

• Network follows standard protocols to send information

• Protocol is a set of rules for exchanging electronic information

• Could be considered the rules of the road for the information superhighway

– Open systems – the design of protocol is made public for access by anyone

– Proprietary system – private system which was the norm

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 9

Page 10: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Data Transmissionand Protocols (cont.)

• Problems in developing an open system Internet protocol– Agreeing on standards was easy

– Developing a new method of communication was tough

• Circuit switching (technology available in the 1960s) was inefficient for computer communication

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 10

Page 11: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Data Transmission and ProtocolsCircuit Switching

• Why we don’t use circuit switching to connect two computers– Used since early days of telephone

– Dedicated connection is formed between two points

– Connection remains active for duration of transmission

– Important when order of receiving information is critical

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 11

Page 12: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Data Transmission and ProtocolsCircuit Switching (cont.)

• Why we don’t use circuit switching to connect two computers (cont.)– Inefficient when applied to computers

– Computers transmits data in a group, or burst

– Processor works on next task and ceases to communicate until ready to transmit next burst

– Would need to keep circuit open, therefore unavailable or have to be reestablished for each burst

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 12

Page 13: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Data Transmission and ProtocolsPacket Switching

• What computers use to communicate– Packet switching makes computer

communication efficient

– Doesn’t require a dedicated communications circuit

– Data is broken into smaller chunks (packets or data packets)

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 13

Page 14: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Data Transmission and ProtocolsPacket Switching (cont.)

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 14

Page 15: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Data Transmission and ProtocolsPacket Switching (cont.)

• What computers use to communicate (cont.)– Packets are sent over various routes at same

time

– They are reassembled at the destination by receiving computer

– Fulfilled original goal of Internet: Data can still travel to destination if a node is disabled or destroyed

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 15

Page 16: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Data Transmission and ProtocolsPacket Switching (cont.)

• What information a packet contains

1. An address to which the packet is being sent

2. The address from where the packet originates

3. Reassembly instructions, if the original data is split between packets, and

4. The data that’s being transmitted

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 16

Page 17: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• Animation of packet switching….

– http://en.wikipedia.org/wiki/Packet_switching

• TCP/IP data packet structure

– http://www.thegeekstuff.com/2012/03/ip-protocol-header/

• https://www.youtube.com/watch?v=3mQK8uyKrFU

• Network Switches & routers– https://www.youtube.com/watch?v=Ofjsh_E4HFY

Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 17

Page 18: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• Review of terms– Proxy server - a server (a computer system or an application) that acts as an intermediary

for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity. Proxies were invented to add structure and encapsulation to distributed systems.[

– Network Switch - a computer networking device that connects devices together on a computer network, by using a form of packet switching to forward data to the destination device.

– Router - a networking device, commonly specialized hardware, that forwards data packets between computer networks. This creates an overlay internetwork, as a router is connected to two or more data lines from different networks. When a data packet comes in one of the lines, the router reads the address information in the packet to determine its ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey. Routers perform the "traffic directing" functions on the Internet. A data packet is typically forwarded from one router to another through the networks that constitute the internetwork until it reaches its destination node. [1

Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 18

Page 19: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Data Transmission and ProtocolsPacket Switching (cont.)

• Why packets take different routes, and how do they decide which route to use– Routers monitor traffic and decide most

effective route

– Windows utility tracert shows details of exact route request takes to destination server• Tracert google.com and www.cityoflondon.gov.uk

• Ping google.com

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 19

Page 20: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Data Transmission and ProtocolsTCP/IP

• What protocol the Internet uses for transmitting data– Main suite of protocols is TCP/IP

• Transmission Control Protocol (TCP)

• Internet Protocol (IP)

– Consists of many interrelated protocols

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 20

Page 21: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Data Transmission and ProtocolsTCP/IP (cont.)

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 21

Page 22: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Internet Identity: IP Addressesand Domain Names

• Each computer, server, or device connected to the Internet is required to have a unique number

• IP address is the unique number

• Humans remember words better than numbers

• Domain names are word-based IP addresses

Copyright © 2014Pearson Education, Inc. Publishing as Prentice Hall 22

Page 23: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Internet Identity: IP Addresses and Domain Names

IP Addresses

• IP address– A unique identification number that defines

each device connected to the Internet

– Fulfills same function as a street address

– Must be registered with the Internet Corporation for Assigned Names and Numbers (ICANN)

• Ensures their uniqueness

• Allocates to network administrators

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 23

Page 24: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Internet Identity: IP Addresses and Domain Names

IP Addresses (cont.)

• What an IP address looks like– Typical IP address: 197.169.73.63

– Referred to as a dotted decimal number (dotted quad)

– Binary form is 11000101.10101001.01001001.00111111

– Each is referred to as an octet

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 24

Page 25: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Internet Identity: IP Addresses and Domain Names

IP Addresses (cont.)

• What an IP address looks like– IP addresses are considered 32-bit numbers

– Can represent 4,294,967,296 values

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 25

Page 26: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Internet Identity: IP Addresses and Domain Names

IP Addresses (cont.)

• Limited number of IP addresses– Internet Protocol version 4 (IPv4) was created

in 1981 before explosive growth of Internet

– IPv4 offers a fixed number of IP addresses

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 26

Page 27: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Internet Identity: IP Addresses and Domain Names

IP Addresses (cont.)• Other Internet addressing systems

– Internet Protocol version 6 (IPv6), developed by IETF, uses 128-bit addressing instead of 32-bit

• Internet Engineering Task Force (IETF)

• https://www.ietf.org/

• Internet Engineering Task Force

– XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX

• Each X is a hexadecimal digit

• Hexadecimal is base-16 number system

• Uses 0-9 or A-F

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 27

Page 28: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Internet Identity: IP Addresses and Domain Names

IP Addresses (cont.)

• Other Internet addressing systems (cont.)– IPv6 provides virtually unlimited supply of IP

addresses

– All modern operating systems handle both IPv4 and IPv6

– Majority of routing still uses IPv4

– IPv6 conversion will happen soon as IPv4 addresses are running out

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 28

Page 29: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Internet Identity: IP Addresses and Domain Names

IP Addresses (cont.)

• How my computer gets an IP address (either/or)– Static

• IP address never changes

• Assigned by network administrator or ISP

– Dynamic• IP address is temporary

• Assigned from a pool of addresses

• More common

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 29

Page 30: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Internet Identity: IP Addresses and Domain Names

IP Addresses (cont.)

• How dynamic addresses are assigned– Handled by Dynamic Host Configuration

Protocol (DHCP)

– Belongs to TCP/IP protocol suite

– Takes from pool of available addresses on as-needed basis

– Assigns address for duration of session

– Might not be the same from session to session

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 30

Page 31: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Internet Identity: IP Addresses and Domain Names

IP Addresses (cont.)

• Benefits of dynamic addressing– Provides a more secure

environment

– Helps to keep hackers out of system

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 31

Page 32: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Internet Identity: IP Addresses and Domain Names

Domain Names

• Why IP addresses are not seen– Domain names take the place of IP address

– Makes it easier for people to remember

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 32

Page 33: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Internet Identity: IP Addresses and Domain Names

Domain Names (cont.)

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 33

How my computer knows the IP address of another computerComputer converts URL to an IP address by consulting a database on

a domain name system (DNS) serverFunctions like a phone book for the Internet

Page 34: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Internet Identity: IP Addresses and Domain Names

Domain Names (cont.)

• Controlling domain name registration

– ICANN assigns companies or organizations to manage registration

– One company is assigned each TLD

– Maintains a database of all registered domains and contact information

– . VeriSign is the current ICANN-accredited domain name registrar for the .com and .net domains. VeriSign provides a database that lists all the registered .com and .net domains and their contact information. You can look up any .com or .net domain at Network Solutions (networksolutions.com) to see whether it’s registered and, if so, who owns it.

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 34

Page 35: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Internet Identity: IP Addresses and Domain Names

Domain Names (cont.)• How domains are organized

– Organized by level

– Portion after the dot is the top-level domain (TLD)

– Establish by ICANN

• ICANN

• https://www.icann.org/

• The Internet Corporation for Assigned Names and Numbers (ICANN)

– Within TLDs are many second-level domains

• Needs to be unique within its TLD

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 35

Page 36: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Internet Identity: IP Addresses and Domain Names

Domain Names (cont.)

• Controlling domain name registration (cont.)– Country-specific domains are controlled by

groups in those countries

– Complete list of TLDs are found on Internet Assigned Numbers Authority site (iana.org)

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 36

Page 37: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

HTML, XML, and other web Building Blocks

HTML

• How web pages are formatted– Hypertext Markup Language (HTML)

• Not a programming language

• Set of rules for marking blocks of text

• Browser knows how to display them

• Surrounded by pairs of HTML tags

• Tags and text are referred to as an element

• <b><i>This should be bolded and italicized.</i></b>

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 37

Page 38: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• Viewing the HTML coding of a web page– HTML documents are text documents with

tags applied

– Right-click, then select View Source

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 38

HTML, XML, and other web Building Blocks

HTML (cont.)

Page 39: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• Current HTML standard– HTML5 is current version; should be finalized

by 2014

– Modernizes features, such as• Reducing need for external plug-ins (like Flash)

• Supporting better error handling

• Introducing new tags to support media, like <video> and <audio>

• Making it easier to draw graphics

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 39

HTML, XML, and other web Building Blocks

HTML (cont.)

Page 40: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• How developers can easily change the formatting of HTML elements– Cascading style sheet

• List of rules that define in one location how to display HTML elements

• Enable a web browser to define formatting for each element

• Acts as a template

• Allows global changes to be done easily

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 40

HTML, XML, and other web Building Blocks

HTML (cont.)

Page 41: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• Where the cascading comes in– Different layers of styles

• External: Stored in a separate file

• Embedded: Stored in the current document

• Inline: Stored in a single line in the document

– Different rules can be created for the same type of element in different places

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 41

HTML, XML, and other web Building Blocks

HTML (cont.)

Page 42: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• Where the cascading comes in– Style sheets are merged

– If conflict in rules, then rules are weighted in hierarchy (cascade)

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 42

HTML, XML, and other web Building Blocks

HTML (cont.)

Page 43: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 43

HTML, XML, and other web Building Blocks

HTML (cont.)

Page 44: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• How XML is different from HTML– eXtensible Markup Language (XML)

describes what data is described rather than how it is to be displayed

– Users build own markup languages to accommodate data formats and needs

– Provides method of data validation through XML schema diagrams (XSD)

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 44

HTML, XML, and other web Building Blocks

XML

Page 45: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• Custom XML packages– XML has spawned custom packages for

specific communities

– Goal is information exchange standards that can be easily constructed and customized to serve growing variety of online applications

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 45

HTML, XML, and other web Building Blocks

XML (cont.)

Page 46: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• Internet protocol a browser uses to send requests– Hypertext Transfer Protocol (HTTP) was

created for the transfer of hypertext documents

– Hypertext documents have text that is linked to other documents or media

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 46

HTML, XML, and other web Building Blocks

Web Browser Protocols

Page 47: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• How a browser safeguards secure information– Hypertext Transfer Protocol Secure (HTTPS)

ensures data security

– Combination of HTTP and Secure Sockets Layer (SSL), a network security protocol

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 47

HTML, XML, and other web Building Blocks

Web Browser Protocols (cont.)

Page 48: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• How a browser safeguards secure information (cont.)– Transport Layer Security (TLS) is an updated

extension of SSL

– These provide data integrity and security for transmissions over the Internet

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 48

HTML, XML, and other web Building Blocks

Web Browser Protocols (cont.)

Page 49: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

HTML, XML, and other web Building Blocks

Server-Side Applications

• Server-side applications– Web is a client/server network

– Program on server is considered server-side

– Can require many communication sessions between client and server

– Can perform very complex operations

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 49

Page 50: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• Popular server-side programming choices– CGI (Common Gateway Interface)

– ASP.NET (Active Server Pages)

– VBScript

– PerlScript

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 50

HTML, XML, and other web Building Blocks

Server-Side Applications (cont.)

Page 51: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• How CGI makes a web page more interactive– Most browser requests result in file being

displayed in browser

– Some programs can perform actions, such as gathering a name and address and adding it to a database

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 51

HTML, XML, and other web Building Blocks

Server-Side Applications (cont.)

Page 52: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• How CGI makes a web page more interactive (cont.)– Common Gateway Interface (CGI) provides

methodology that allows a browser to request that a program file be executed

– Allows functionality beyond simple display of information

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 52

HTML, XML, and other web Building Blocks

Server-Side Applications (cont.)

Page 53: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• Programming language used to create a CGI program– Can be created in almost any language

– Known as CGI scripts

– Common languages include• Perl

• C

• C++

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 53

HTML, XML, and other web Building Blocks

Server-Side Applications (cont.)

Page 54: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• Programming language used to create a CGI program (cont.)– Almost any task can be accomplished

through a CGI script

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 54

HTML, XML, and other web Building Blocks

Server-Side Applications (cont.)

Page 55: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• How CGI programs are executed– CGI bin (directory) is created and all CGI

scripts go into this directory

– These files aren’t just read and sent, they need to be run

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 55

HTML, XML, and other web Building Blocks

Server-Side Applications (cont.)

Page 56: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• How CGI programs are executed (cont.)

– ExampleStep 1: A button gives a message

Step 2: Clicking the button executes a script

Step 3: Script generates a form

Step 4: Form information is sent back to server and recorded in database

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 56

HTML, XML, and other web Building Blocks

Server-Side Applications (cont.)

Page 57: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

HTML, XML, and other web Building Blocks

Client-Side Applications

• Client-side applications– Program that runs on client computer– Requires no interaction with web server– New data is only sent in response to a

request– Exchange of data can make interactivity

inefficient and slow– More efficient to run client-side programs on

local computer

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 57

Page 58: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• How client-side programming is done– HTML embedded scripting language tucks

programming code directly in HTML tag• Most popular is JavaScript

– Applet (small application) is downloaded to client and runs when needed• Most common language is Java

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 58

HTML, XML, and other web Building Blocks

Client-Side Applications (cont.)

Page 59: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• Delay in downloading an applet– There is some delay but once downloaded it

executes without further communication with server

– ExampleStep 1: Browser makes request

Step 2: Server returns Java applet

Step 3: Computer executes the code

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 59

HTML, XML, and other web Building Blocks

Client-Side Applications (cont.)

Page 60: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• Scripting technologies– Dynamic HTML (DHTML) combines HTML,

cascading style sheets, and JavaScript

– Creates lively and interactive websites

– Allows a web page to change after it’s been loaded

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 60

HTML, XML, and other web Building Blocks

Client-Side Applications (cont.)

Page 61: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• Scripting technologies– Occurs in response to user actions

– Brings special effects without downloading and installing plug-ins or special software

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 61

HTML, XML, and other web Building Blocks

Client-Side Applications (cont.)

Page 62: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• JavaScript– Commonly used scripting language– Creates DHTML effects– Not the same as Java programming

language– Allows HTML documents to respond to

mouse clicks and typing– All actions are executed on the client

computer– Keeps web pages from being lifeless

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 62

HTML, XML, and other web Building Blocks

Client-Side Applications (cont.)

Page 63: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• How JavaScript controls the components of a web page– Document Object Model (DOM) is used to

organize objects and page elements

– Defines every item on a web page as an object

– Allows web developers to easily change the look and feel of objects

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 63

HTML, XML, and other web Building Blocks

Client-Side Applications (cont.)

Page 64: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 64

HTML, XML, and other web Building Blocks

Client-Side Applications (cont.)

Page 65: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• Where web programming is headed– Web pages interacting with servers at times

other than when being fetched

– Ongoing exchange of information

– Updating information without page refresh or leaving the page

– AJAX (Asynchronous JavaScript and XML) facilitates these applications

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 65

HTML, XML, and other web Building Blocks

Client-Side Applications (cont.)

Page 66: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Communications Over the InternetE-Mail

• Invention of e-mail– Ray Tomlinson (1971) helped develop

ARPANET (precursor to the Internet)– Written to enable users to leave text

messages for each other on a single machine

– Extended to sending text messages between machines on Internet

– Became the most popular application– 1973: Accounted for 75% of all data traffic

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 66

Page 67: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• How e-mail travels the Internet– Simple Mail Transfer Protocol (SMTP) sends

e-mails along the Internet

– Part of the Internet Protocol suite

– Client/server application

– Passes through several e-mail servers• Specialized computers whose sole function is to

store, process, and send e-mail

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 67

Communications Over the InternetE-Mail (cont.)

Page 68: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 68

Communications Over the InternetE-Mail (cont.)

Page 69: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• Where e-mail servers are located– ISPs have e-mail servers that use SMTP

Step 1: Your ISP’s e-mail server receives your e-mail

Step 2: E-mail server reads domain name and determines location using a DNS server

Step 3: DNS server turns domain name into IP address

Step 4: E-mail is forwarded to receiver’s ISP server

Step 5: E-mail is stored on receiver’s e-mail server

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 69

Communications Over the InternetE-Mail (cont.)

Page 70: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• How we are able to send files as attachments– SMTP handles text messages

– Multipurpose Internet Mail Extensions (MIME) specification created to send files

– E-mail is sent as text, but MIME handles the encoding and decoding of files

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 70

Communications Over the InternetE-Mail (cont.)

Page 71: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Communications Over the InternetE-Mail Security: Encryption

• How other people can read my e-mail– Highly susceptible to being read because

sent in plain text

– Copies might exist on numerous servers

– Encryption helps protect sensitive messages

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 71

Page 72: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• How to encrypt e-mail– Many e-mail servers offer built-in encryption

• Hushmail

• Comodo SecureEmail

– Can sign up to experiment

– Use secure account when secure communications are required

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 72

Communications Over the InternetE-Mail Security: Encryption (cont.)

Page 73: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• How encryption works– Codes e-mail so that only person with key to

code can decode the message

– Private key

– Public key

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 73

Communications Over the InternetE-Mail Security: Encryption (cont.)

Page 74: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• Private key encryption– Only the two parties have the code

– Could be a shift code

– Could be more complex substitution code

– Main problem is key security, code is broken if:• Code is stolen

• Someone is savvy about decoding

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 74

Communications Over the InternetE-Mail Security: Encryption (cont.)

Page 75: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 75

Communications Over the InternetE-Mail Security: Encryption (cont.)

Page 76: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• Public key encryption– Two keys (key pair) are created

• One for coding, one for decoding

– Coding key is distributed as public key• Message being sent to you is coded using public

key

– Decode using private key• Only receiver knows private key

– Mathematical relationship between the two keys

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 76

Communications Over the InternetE-Mail Security: Encryption (cont.)

Page 77: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• Encryption used on the Internet– Public key is the most common

– Pretty Good Privacy (PGP) is available for download

– Can generate key pairs to provide private key if desired

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 77

Communications Over the InternetE-Mail Security: Encryption (cont.)

Page 78: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• What a key looks like– Binary numbers

– Vary in length depending on security needs

– Key and message run through complex algorithm converts text into unrecognizable code

– Each key generates different code

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 78

Communications Over the InternetE-Mail Security: Encryption (cont.)

Page 79: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• Private key’s level of security– Impossible to deduce private key from public

key because of complexity of algorithms used

– In brute force attack every possible combination is tried

– Can enable hackers to deduce key and decode message

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 79

Communications Over the InternetE-Mail Security: Encryption (cont.)

Page 80: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• Safe key– 1990s: 40-bit keys thought to be completely

resistant to brute force attacks

– 1995: French programmer broke 40-bit key

– 128-bit keys became standard

– Strong encryption calls for 256-bit keys• Could take hundreds of billions of years to crack

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 80

Communications Over the InternetE-Mail Security: Encryption (cont.)

Page 81: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• Encryption used in corporations– Paid services include

• Confirmation of message delivery

• Message tracking

• Overwriting of e-mail messages when deleted

– Securus Systems and ZixCorp provide these services

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 81

Communications Over the InternetE-Mail Security: Encryption (cont.)

Page 82: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Communications Over the InternetInstant Messaging

• What you need to run instant messaging– Client program that connects to an instant

messaging (IM) service

– Examples• Yahoo! Messenger

• GoogleTalk

• Windows Live Messenger

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 82

Page 83: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• How instant messaging works– Client software makes a connection with chat

server– Provides connection information to your

device– Because friend’s device and your device

have same connection information, server isn’t involved in chat session

– Chatting takes place directly between two devices over the Internet

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 83

Communications Over the InternetInstant Messaging (cont.)

Page 84: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 84

Communications Over the InternetInstant Messaging (cont.)

Page 85: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

• IM security– Most do not use high level of security

– Vulnerable to• Viruses

• Worms

• Hacking threats

• Eavesdropping

– Increased security is in development

– Employers can monitor IM sessions

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 85

Communications Over the InternetInstant Messaging (cont.)

Page 86: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

1. Who owns, manages, and pays for the Internet?

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 86

Chapter 13 Summary Questions

Page 87: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

2. How do the Internet’s networking components interact?

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 87

Chapter 13 Summary Questions

Page 88: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

3. What data transmissions and protocols does the Internet use?

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 88

Chapter 13 Summary Questions

Page 89: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

4. Why are IP addresses and domain names important for Internet communications?

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 89

Chapter 13 Summary Questions

Page 90: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

5. What web technologies are used to develop web applications?

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 90

Chapter 13 Summary Questions

Page 91: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

6. How do e-mail and instant messaging work, and how is information using these technologies kept secure?

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 91

Chapter 13 Summary Questions

Page 92: Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic,

mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America.

Copyright © 2014 Pearson Education, Inc.  Publishing as Prentice Hall