2. A network of networksA network of networks
ISPsISPs
– A commercial organization with a permanentA commercial organization with a permanent
connection to the Internet that sells temporaryconnection to the Internet that sells temporary
connections to subscribersconnections to subscribers
NSPsNSPs
– Network that spans a large geographicalNetwork that spans a large geographical
distance. May consist of a variety of cable,distance. May consist of a variety of cable,
satellite, and microwave technologies. examplesatellite, and microwave technologies. example
PTCLPTCL
3. Internet ProtocolsInternet Protocols
Protocol :A set of rules and procedures that governProtocol :A set of rules and procedures that govern
transmission between the components in a networktransmission between the components in a network
– InteroperableInteroperable
– LayeredLayered
– SimpleSimple
– End to EndEnd to End
TCP/IPTCP/IP
– Transmission Control Protocol/Internet Protocol (TCP/IP)Transmission Control Protocol/Internet Protocol (TCP/IP)
Leading model for achieving connectivity among differentLeading model for achieving connectivity among different
networks. Provides a universally agree-on method for breakingnetworks. Provides a universally agree-on method for breaking
up digital messages into packets, routing them to the properup digital messages into packets, routing them to the proper
addresses, and then reassembling them into coherent messages.addresses, and then reassembling them into coherent messages.
TCP/IP architectureTCP/IP architecture
– Transmission Control ProtocolTransmission Control Protocol
– Internet Protocol (IP) address Four-part numeric addressInternet Protocol (IP) address Four-part numeric address
indicating a unique computer location on the Internetindicating a unique computer location on the Internet
– 130.211.100.105130.211.100.105
4. Domain names: English-like name that corresponds to theDomain names: English-like name that corresponds to the
unique 32-bit numeric Internet Protocol (IP) address for eachunique 32-bit numeric Internet Protocol (IP) address for each
computer connected to the Internet.computer connected to the Internet.
Client / server applicationsClient / server applications
– Client software: An easy-to-use software tool for accessing theClient software: An easy-to-use software tool for accessing the
World Wide Web and the Internet.World Wide Web and the Internet.
– Server software :Software that manages requests for Web pagesServer software :Software that manages requests for Web pages
on the computer where they are stored and that delivers the pageon the computer where they are stored and that delivers the page
to the user's computer.to the user's computer.
WWW2WWW2
– Internet2 Research network with new protocols and transmissionInternet2 Research network with new protocols and transmission
speeds that provides an infrastructure for supporting high-speeds that provides an infrastructure for supporting high-
bandwidth Internet applications.bandwidth Internet applications.
– Second-generation, interactive Internet-based services thatSecond-generation, interactive Internet-based services that
enable people to collaborate, share information, and create newenable people to collaborate, share information, and create new
services online, including mashups, blogs, and wikis.services online, including mashups, blogs, and wikis.
5. web-based client serverweb-based client server
Hypertext transfer protocol (HTTP)Hypertext transfer protocol (HTTP)
– The communications standard used to transferThe communications standard used to transfer
pages on the Web. Defines how messages arepages on the Web. Defines how messages are
formatted and transmitted. (P423)formatted and transmitted. (P423)
URLs: Uniform Resource Locator ,TheURLs: Uniform Resource Locator ,The
address of a specific resource on theaddress of a specific resource on the
Internet.Internet.
Web browsersWeb browsers
Web serversWeb servers
6. Internet SecurityInternet Security
SecuritySecurity
– Policies, procedures, and technical measures used to preventPolicies, procedures, and technical measures used to prevent
unauthorized access, alteration, theft, or physical damage to informationunauthorized access, alteration, theft, or physical damage to information
systems.systems.
security policy:security policy:
– Statements ranking information risks, identifying acceptable securityStatements ranking information risks, identifying acceptable security
goals, and identifying the mechanisms for achieving these goals.goals, and identifying the mechanisms for achieving these goals.
Corner stones of securityCorner stones of security
– AuthenticityAuthenticity
– PrivacyPrivacy
– IntegrityIntegrity
– Non repudiationNon repudiation
VPNVPN
– Virtual Private Network (VPN)A secure connection between two pointsVirtual Private Network (VPN)A secure connection between two points
across the Internet to transmit corporate data. Provides a low-costacross the Internet to transmit corporate data. Provides a low-cost
alternative to a private networkalternative to a private network
7. Selling on the netSelling on the net
Functional Requirements (437)Functional Requirements (437)
OutsourcingOutsourcing
8. OutsourcingOutsourcing
OutsourcingOutsourcing is when an organization acquires ITis when an organization acquires IT
applications or services from outside contractors or externalapplications or services from outside contractors or external
organizations.organizations.
– Outsourcing is the practice of contracting computer centerOutsourcing is the practice of contracting computer center
operations, telecommunications networks, or applicationsoperations, telecommunications networks, or applications
development to external vendors.development to external vendors.
Offshore software outsourcing: Outsourcing systemsOffshore software outsourcing: Outsourcing systems
development work or maintenance of existing systems todevelopment work or maintenance of existing systems to
external vendors in another country.external vendors in another country.
Application service provider (ASP)Application service provider (ASP) is an agent oris an agent or
vendor who assembles the software needed by enterprisesvendor who assembles the software needed by enterprises
and packages the software with services such asand packages the software with services such as
development, operations and maintenance.development, operations and maintenance.
– ASPASP manages application servers from a centrally controlledmanages application servers from a centrally controlled
location rather than at a customer’s site.location rather than at a customer’s site.
9. In-sourcingIn-sourcing
IN-HOUSE DEVELOPMENT APPROACHES. There are twoIN-HOUSE DEVELOPMENT APPROACHES. There are two
major approaches to in-house development: building frommajor approaches to in-house development: building from
scratch or building from components.scratch or building from components.
– Build from scratch. This option should be considered only forBuild from scratch. This option should be considered only for
specialized applications for which components are not available.specialized applications for which components are not available.
It is an expensive and slow process, but it will provide the best fit.It is an expensive and slow process, but it will provide the best fit.
– Build from components. Companies with experienced IT staff canBuild from components. Companies with experienced IT staff can
use standard components (e.g., a secure Web server), someuse standard components (e.g., a secure Web server), some
software languages (e.g., Java, Visual Basic, or Perl), and third-software languages (e.g., Java, Visual Basic, or Perl), and third-
party subroutines to create and maintain applications on theirparty subroutines to create and maintain applications on their
own. (Or, companies can outsource the entire developmentown. (Or, companies can outsource the entire development
process to an integrator that assembles the components.) From aprocess to an integrator that assembles the components.) From a
software standpoint, using components offers the greatestsoftware standpoint, using components offers the greatest
flexibility and can be the least expensive option in the long run.flexibility and can be the least expensive option in the long run.
However, it can also result in a number of false starts and wastedHowever, it can also result in a number of false starts and wasted
experimentations. For this reason, even those companies withexperimentations. For this reason, even those companies with
experienced staff are frequently better off modifying andexperienced staff are frequently better off modifying and
customizing one of the packaged solutions as part of the “buy”customizing one of the packaged solutions as part of the “buy”
option.option.
10. Chatting on the webChatting on the web
– Communication centersCommunication centers
– Customer serviceCustomer service
– Community discussionCommunity discussion
Multimedia DeliveryMultimedia Delivery
– Web castingWeb casting
Publishing audio/video broadcasts via the Internet so thatPublishing audio/video broadcasts via the Internet so that
subscribing users can download audio/video files onto theirsubscribing users can download audio/video files onto their
personal computers or portable players.personal computers or portable players.
– Bandwidth requirementsBandwidth requirements
Bandwidth:The capacity of a communications channel asBandwidth:The capacity of a communications channel as
measured by the difference between the highest and lowestmeasured by the difference between the highest and lowest
frequencies that can be transmitted by that channel.frequencies that can be transmitted by that channel.
Analyzing the web visitsAnalyzing the web visits