Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Switch
Router
Bridge
Modem
What is a switch?
This is a device which helps many terminals to use the same communication line at different
times.
What is a router?
A router is usually used to connect two or more independent and dissimilar networks (such as
LANs and WANs) which continue to function separately. Router directs data along different
routes according to the intended destination. Routers use network addresses and the addresses of
other routers to create a route between two networks. Router does this by maintaining a table of
addresses of computers connected in the network. Routers act as connections between public
networks such as the Internet and private networks such as intranets.
LAN WAN
Internet
Router Router
What is a bridge?
A bridge is used to link two LANs. It can control access from one part of the network to the
other.
Segment 1 Segment 2
Bridge
Disadvantages of bridges
3
What is a modem?
A modem is a device which converts digital signals it receives to analog form and analog signals
it receives to digital form.
The Internet is the global network of many other networks and computers, which communicate
data using data transmission media such as telecommunication lines, satellites and cables.
World Wide Web is a collection of interconnected documents and other resources available in the
Internet, which are linked by hyperlinks and URLs.
What is HTTP?
HTTP (hypertext transfer protocol) is the protocol, which is used to communicate between Web
servers and Web browsers. The function of HTTP is to support the transfer of HTML documents.
HTTP functions in the application layer of the OSI reference model.
• HTTP establishes a connection between the Web browser (client) and the Web server
• Negotiates settings and establishes parameters for the session
• Provides for the orderly transfer of HTML content
• Closes the connection with the Web server
What is HTML?
HTML is a computer language, which is used to describe the layout and the format of a document
It is used to create Web pages by including multimedia components such as pictures, sound,
video and animations
4
HTML includes tags which provide instructions about how to display various components in the
document and to provide links to other files and web pages.
1. Tags used to Mark the beginning and end of a heading. Each heading tag represents a different
heading level. Example: <Header> My Page </Header>
2. Tags used to include spaces and blank lines between texts. Example: <Br> My Page
3. Tags used to indicate where illustrations are to be inserted into the text such as:
Changing the font color and size of the text <Font color=”Red” size =”18”> My Page
Making the font of the text bold. Example: <B> My Page
Underlining the text. Example: <U> My Page
Italicizing the text. Example: <I> My Page
6. Tags used to insert frames and tables. Tables help dividing the page into different areas.
What is IP address?
IP address is a 32-bit numeric address assigned to a network computer which is used by another
computer to identify the latter.
What is URL?
URL is the address of a web page stored in a web server. It has the format
http://www.bcs.org.uk
DNS is the name resolution method used on the Internet. DNS divides the namespace into
hierarchical entities called domains.
Web Transactions
1. A Web server provides an online catalog accessible from the Web. A user browses through the
product offerings from a remote location across the Internet.
2. The user decides to buy a product and clicks a “Buy This Product” link on the Web page.
5
3. The server and browser establish a secure connection. At this point, the browser sometimes
displays a message that says something like “You are now entering secure area…” Different
browsers have different methods for indicating a secure connection. Netscape Navigator, for
instance, displays a golden key.
4. After the connection is established, some form of authentication usually follows. On most
transaction sites, the buyer establishes some form of user account with the vendor. This is
partly for security reasons and partly for convenience (so the user can track the status of
purchases). The user account information also lets the vendor track the behavior of the user and
correlate the user’s demographic information and purchase history. This logon step requires the
Web server to contact some form of back end database server, either to establish a new account
or to check the credentials for logon to an existing account.
5. After the user id logged in, the server (or some application working on the server back end)
must verify the credit card authority. Often this credit card authority is a commercial service
affiliated with the credit card company.
6. If the transaction is approved, notice of the purchase and mailing information is transmitted to
the vendors fulfillment department and the transaction application attend to the final details of
confirming the purchase with the user and updating the user’s account profile.
What is email?
This is sending and receiving messages via suitable networks such as the Internet
SMTP
Sender’s
Computer Email server
SMTP
Internet
SMTP
Recipient’s
Computer Destination
POP3 or IMAP4 Email
Server
What are the typical facilities of email which would help the user to manage the message?
6
1. Reply - Allows the user to compose a response which is automatically sent to original
correspondent by remembering address
2. Filing - storing the message for future use in a selection of user designed files
3. Forwarding - Making a copy of the message and Forwarding it to another person by using his
or her addresses
4. Multiple forwarding - Sending copy of message to many recipients by using address book
5. Automatic deletion - Removes mail from message box after it has been sent to the recipient to
free up space
6. Blocking - If message is unsolicited and no further messages wanted from that source. Then
the
provider will block future messages from that address
What are the features of email that a manager of a company finds useful when managing a
team of salesmen working in a wide geographical area?
1. An email message is stored in the destination mail server until the recipient is ready to read it.
This helps the sales representative not to be interrupted during a sale
2. Messages can be duplicated and each message can be sent to a number of recipients at a time
3. May want to send a message about a new product or an offer to a representatives in a particular
Area
4. Messages can be forwarded without the need for copying them as messages may be received
from one department and need passing on to another
5. Messages can be encrypted. Therefore stops a rival firm learning trade secrets
6. Positive responses can be given to show that a message has been delivered. Therefore can act
as proof that an employee actually received an instruction
7. Attachments can be used which enables the manager to send brochures to the team about new
Product
Web-based email servers do not require an email reader. The user simply visits the Web site with
an Internet browser and accesses the email through a web interface. Therefore the recipient can
access his email from any computer that can reach the Internet.
What is spam?
Spam means receiving mass-mail email messages that clutter the mailboxes of the Internet users.
What is FTP?
1. FTP is a widely used protocol that enables a user to transfer files between two computers on a
TCP/IP network.
2. The user runs an FTP client application on one computer and the other computer runs an FTP
server program.
3. Many FTP client programs are command-line based but graphical versions are available as
well.
4. FTP is used primarily to transfer files although it can perform other functions such as creating
directories, removing directories and listing files.
A chat room is a form of conferencing using any technology ranging from real-time online chat
over instant messaging and online forums to full graphical social environments.
1. The cost of advertising is less as the advertising is done via web sites
2. Can attract a large customer base from all over the world\
3. The company gets the payments for the goods and services as the customers pay for the goods
as they order them
4. Allows for centralized warehousing and distribution
5. Easy to Communicate with the customers
6. Easy to communicate with suppliers
7. Client can have access to his account to check the status of the processing of his order
What is intranet?
An intranet is a private computer network that uses Internet protocols (HTTP and FTP) and
network connectivity to securely share part of an organization's information or operations with its
employees.
8
1. A person may lose the chance of sensible comment if he does not have access to the intranet
What is extranet?
An extranet is a private network that uses Internet protocols, network connectivity, and possibly
the public telecommunication system to securely share part of an organization's information or
operations with suppliers, vendors, partners, customers or other businesses.
An extranet can be viewed as part of a company's Intranet that is extended to users outside the
company (Example: normally over the Internet).
What are the problems that can arise due to the confidential nature of the data at a Web
site which allows customer to order and pay for goods
Problems
Solutions
1. Use of firewalls
2. Use of packet switching instead of circuit switching
3. Validation of the data at the destination computer by using check digit and parity check
4. Encryption of data using the following techniques:
(a) Public key encryption – which ensures data confidentiality but provides no authentication
(b) Digital signature – which ensures authentication of the data but provides no confidentiality
(c ) Digital certificate – ensures confidentiality of the data but does not provide authentication
5. use of passwords to enter the databases
6. Subjecting workers to data protection legislation and confidentiality contracts
7. Not allowing the workers to bring portable storage devices to the work place
9
Confidentiality is making sure that the data will not be read be read by any other person other
than the intended receiver.
Message authentication is the method of ensuring that the message is coming from the person it
claims to be from
Integrity is making sure that data has not been tampered with in transit.
The encryption algorithm is essentially a set of mathematical steps used to transform the data
into its unreadable form.
The unique and secret part of the encryption process is called the key. The key is a large number
that is used within the algorithm as a variable. The result of the encryption process depends on
the value of the key. Therefore as long as the value of the key is kept secret, unauthorized users
will not be able to read the data even if they have the necessary decryption software.
This is done by using two keys known as public key and private key, public key to encrypt the
data and the private key to decrypt the data.
Two methods that can be used to provide confidentiality are public key encryption and digital
certificate.
1. By using a digital signature which is created by using a private key which can only be done by
the owner of the key.
Summary
Public key encryption provides confidentiality to data in transit but it does not provide
authenticity
Digital signature provides authenticity to data in transit bit it does not provide confidentiality
Part of the data in the database is held locally because it is important for the use of that particular
machine.
What are the implications to both the data and the network manager of duplicating the
data?
1. Many copies of data available in many machines means that database is always backed up