Chapter 2: Tech. Infrastructure

Get Started. It's Free
or sign up with your email address
Chapter 2: Tech. Infrastructure by Mind Map: Chapter 2: Tech. Infrastructure

1. Markup Language and the Web

1.1. Standard Generalized Mark up Language (SGML)

1.1.1. SGML is much older and more complex than standard HTML. It is mainly used by companies with strict management requirements. SGML offers a system of markup documents that is independent of any software application. It is nonproprietary and platform independent and offers user-defined tags.

1.2. Hypertext mark-up Language (HTML)

1.2.1. The internet text language that is commonly used today to create web documents. HTML includes tags that define the format and style of text elements in an electronic document. HTML has tags that can create relationships among text elements within one document or among serveral documents. HTML is easy to access, easier to maintain than SGML. Moreover, HTML is easier to use than SGML.

1.3. Extensible mark-up Language (XML)

1.3.1. XML uses paired start and stop tags in much the same way as database software defines a record structure. The Web pages are marked up with HTML tags, but the product info elements such as prices, id numbers, quantities on hand, are marked up with XML tags. The XML document is embedded within the HTML document. XML is not a markup language with defined tags. It is a framework within which people can create their own sets of tags.

1.4. HTML and XML editors

1.4.1. Web designers can create HTML documents in any general-purpose text editor or word processor. However, there is an easier way to create web pages. You can design a web page while the computer writes the HTML for you. Ex: Dreamweaver, Frontpage.

2. Intranets and Extranets

2.1. Intranet

2.1.1. An Intranet is an interconnected network, usually one that uses the TCP/IP protocol set, and does not extend beyond the organization that created it. They are an excellent cost efficient way to distribute internal corporate info because distributing paper is usually slower. Companies will also use intranets to reduce software maintenance and update costs for their employees' computer workstations.

2.2. Extranet

2.2.1. An Extranet is an intranet that has been extended to include specific entities outside the boundaries of the organization, such as business partners, customers, or suppliers. Each participant in the extranet has access to the databases, files, or other info stored on computers connected to the extranet.

2.3. Public and Private Networks

2.3.1. A public network is any computer network or telecommunications network that is available to the public. Ex: the internet. A private network is a private, leased-line connection between two com- panies that physically connects their intranets to one another.

2.4. Virtual Private Network (VPN)

2.4.1. A virtual private network is an extranet that uses public networks and their protocols to send sensitive data to partners, customers, suppliers, and employees using a system called IP tunneling or encapsulation.

3. Key Definitions Con't

3.1. IP tunneling

3.1.1. Creation of a private passageway through the public internet that provides secure transmission from one extranet partner to another.

3.2. Encapsulation

3.2.1. Process that occurs when VPN software encrypts packets contents, then places them inside an IP wrapper in another packet.

3.3. Bandwidth

3.3.1. Amount of data that can be transmitted in a fixed amount of time. Also known as the number of stimultaneous site visitors that a web site can accommodate with degrading service.

3.4. Internet2

3.4.1. successor to the internet used for conducting research, offers bandwidths in excess of 1 Gbps.

3.5. Semantic Web

3.5.1. project developed with the intention to blend technologies and info to create a next-generation Web that would result in words on Web pages being tagged using XML with their meanings.

4. Internet Connection Options

4.1. Broadband connections

4.1.1. connections that operate at speeds of greater than about 200 Kbps. One of the newest technologies that uses the DSL protocol to provide service in the broadband range. DSL is a private line with no competing traffic Connection options based on cable or phone line connections are ideal for urban and suburban web users.

4.2. Leased-line connections

4.2.1. Large firms with high amounts of internet traffic can connect to an ISP using higher bandwidth connections that they can lease from telecommunications carriers.

4.3. Wireless connections

4.3.1. Bluetooth once of the first protocols designed for personal use over short distances. Bluetooth operates reliably over distances of up to 35 feet and can be a part of up to 10 networks of 8 devices each.

4.3.2. Ultra Wideband Wireless communication that provides wide bandwidth connections over short distances (30-100ft).

4.3.3. Wireless Ethernet (Wi-Fi) Most common wireless connection tech. for use on LANs. It can communicate through a wireless access point connected to a LAN to become part of that LAN.

5. The Internet and the World Wide Web

5.1. Origins

5.1.1. U.S. Dept. of Defense realized that weapons of the future would require powerful computers for coordination and control. A way was needed in order to connect these powerful computers, thus, a worldwide network started to unfold. Basically, the original goal was to find a way the Dept. of Defense could use to control weapon systems and transfer research filesEarly computer networks used leased telephone company lines that connected sender to receiver. From there, sending messages through this channel eventually developed into the internet we know and use today.

5.2. Growth of the Internet

5.2.1. The internet was a phenomenon that had sneaked up on the world. For reasearchers it had become a part of the everyday work environment. People outside the research community were largely unaware of the capabilities of the internet. Now millions use this interconnected piece of technology. The opening of the internet to business activity has helped increase growth on a world scale.

5.3. Emergenece of the World Wide Web

5.3.1. The web is software that runs on computers that are connected to the internet. Network traffic gener- ated by Web software is the largest single category of traffic on the internet, in this category is email, file transfer, and other data transmission.

5.3.2. Development of Hypertext Berners-Lee in 1991 first developed the code for a hypertext server program and made it available on the internet today. Hypertext servers used on the web are also called Web servers. HTML was developed from his original hypertext server program. HTML (hypertext markup language) is the language of the internet containing codes attached to text that describes text elements and their relation to one another.

5.3.3. Graphical Interfaces for Hypertext Several types of software are available to read HTML documentation, although most people use a web browser such as Internet Explorer. If the HTML documents are on computers connected to the internet, you can use a web browser to go from one document to another on the internet.

6. Key Definitions

6.1. Internet

6.1.1. large system of interconnected computer networks that spans the globe.

6.2. Computer Network

6.2.1. any tech. that allows people to connect computer networks around the world to one another, from the basic tech. structure that underlies all ecommerce.

6.3. Web

6.3.1. a subset of the computers on the internet that are connected to one another in a specific way.

6.4. Network access provider

6.4.1. companies that sell internet access rights directly to larger customers and indirectly to smaller firms and individuals.

6.5. Hypertext Server

6.5.1. a computer that stores files written in HTML and lets other computers connect to it and read these files.

6.6. Web Server

6.6.1. a computer that receives requests from many different web clients and responds by sending HTML files back to those web client computers.

6.7. Web browser

6.7.1. software that allows users to read HTML documents and move from one HTML document to another using hyperlinks.

6.8. Local area network

6.8.1. network of computers that are located close together.

6.9. Wide area network

6.9.1. networks of computers that are connected over greater distances.

6.10. Circuit

6.10.1. combination of phone lines and the closed switches that connect them to each other.

6.11. Internet backbone

6.11.1. routers that handle packet traffic along the internet's main connecting points.

6.12. Subnetting

6.12.1. the use of reserved reserved private IP addresses with LANs and WANs to provide additional address space.

6.13. Simple Main Transfer Protocol

6.13.1. specifies the format of a mail message and describes how mail is to be administered on the email server and transmitted on the internet.

6.14. Post Office Protocol

6.14.1. protocol responsible for retrieving email from a mail server.

6.15. Opening tag

6.15.1. HTML tag that precedes the text that a tag affects.

6.16. Closing tag

6.16.1. second half of a two-sided HTML tag; it is identifies by a slash that precedes the tag's name.

6.17. Leased Line

6.17.1. permanent phone connection between two points.

7. Packet-switched Networks

7.1. A network in which packets are labelled electronically with their origin, sequence, and destination access. Packets travel from one computer to another along the interconnected networks until they reach their destination.

7.2. As single packets travel from one network to another, the computers through which they travel determines the best route for getting them to their destination. Can be done through:

7.2.1. Routing Computers

7.2.2. Routers

7.2.3. Gateway Computers

7.2.4. Border routers

8. Internet Protocols

8.1. Protocols determine how the sending sevice indicates that it has finished sending a message, and how the receiving device indicates that it has received the message.

8.2. TCP/IP

8.2.1. These protocols are the rules that govern how data moves through the internet and how network connections are established and terminated. TCP controls diassembly of a message or a file into packets before it is trans- mitted over the internet. IP specifies the addressing details fir each packets, labeling each with the origin and destination points (addresses).

8.3. IP Addressing

8.3.1. The version of IP that has been used for the past 20 years is Internet Protocol version 4, which uses a 32-bit number to identify the computers connected to the internet. This can also be called an IP address. When a router breaks a message into packets before sending it onto the internet, the router marks each packet with both the source IP and the destination IP address of the message.

8.4. Domain Names

8.4.1. are sets of words that are assigned to specific IP addresses. It is the address of a web page, it may contain two or more word groups separated by periods. Example: - the rightmost part is the Top Level Domain (.edu)

8.5. Web page Request and Delivery protocols

8.5.1. Web client computers run software called Web client software. Web client software send requests for Web page files to other computers called web servers. The set of rules for delivering Web page files over the internet is in a protocol called Hypertect Transfer Protocol (HTTP).

8.6. Email protocols

8.6.1. email that is sent across the internet must also be formatted according to a common set of rules. The organization has a computer called an email client software to read and send email. Many people also use email on home computers and with so many different email client and software choices, standardization and rules are very important. SMTP and POP are two common email protocols.

8.7. Unsolicited Comm- ercial Email

8.7.1. Also known as Spam which is junk email in the form of solicitations, ads, or email chain letters. Spam is a problem because of the threats, annoyance, and capacity of space that it can consume. A considerable number of spam messages include content that is offensive to the recipient.