internet technologies

185
Overview Of Internet Technologies & Web 2.0 NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Upload: hardeep-rai

Post on 18-Jan-2015

1.108 views

Category:

Technology


2 download

DESCRIPTION

Presentation on "Overview of Internet Technologies andWeb 2.0" on 2nd of Feb 2009 during STC on INTERNET (2nd of Feb.2009 to 06th of Feb 2009) at NATIONAL INSTITUTE OF TECHNICAL TEACHERS’ TRAINING AND RESEARCH CHANDIGARH

TRANSCRIPT

Page 1: Internet Technologies

Overview Of Internet

Technologies & Web 2.0

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 2: Internet Technologies

The Internetworldwide collection of computer networks

1969: ARPA (Advanced Research Projects Agency)

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 3: Internet Technologies

Military project: that would survive a nuclear war

Government agencies and certain educational centers

ARPANET grew slowly (70's and 80's)

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 4: Internet Technologies

Accomplished the truly monumental task

Building blocks of this new, open, modular conglomeration of networks

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 5: Internet Technologies

The various protocols (IP, TCP, DNS, POP, and SMTP) took shape over the years, and by the time the World Wide Web (HTML and HTTP) was created in the early 90's, this "Internet" had become a fully functional, fairly robust NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 6: Internet Technologies

system of network - communication, able to support this new pair of protocols which eventually turned the Internet into a household word

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 7: Internet Technologies

Web is not Internet; it is only one type of Internet - application, and one set of protocols among a great many which were in use for over a decade before the Web entered into the public awarenessNITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 8: Internet Technologies

The Web is a subset of the Internet

Email is not a part of the Web, and neither are newsgroups, although Web designers have developed web sites through which users, the world over, NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 9: Internet Technologies

commonly access both of these much older forms of Internet media

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 10: Internet Technologies

EmailIt is convenient and efficient way to send a message

Send bills, eliminate phone calls, provide services without ever having contact.NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 11: Internet Technologies

Creates an impersonal environment

Excessive involvement

used to be "Text-only"

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 12: Internet Technologies

History Of Email

Experiment by the military to be able to send to and from the battlefield

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 13: Internet Technologies

1st email (1972) Ray Tomlinsin Mail program: for Tenex operating system

Heliomedia: The mail program; SNDMSG; READMAIL

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 14: Internet Technologies

MAIL and MLFL (1972) were added to the FTP program and provided standard network transport capabilities for email transmission

Early 1980's: more efficient SMTP protocol was NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 15: Internet Technologies

developed. Among other improvements, SMTP enabled sending a single message to a domain with more than one addressee, after which the local server would locally copy the message to each recipient

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 16: Internet Technologies

In 1993, America Online and Delphi started to connect their proprietary email systems to the Internet

1965: multiple users of mainframe computer

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 17: Internet Technologies

Quickly extended to become network e-mail

1st e-mail (1971)

PCs: offline readers

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 18: Internet Technologies

few standards: delete, backspace keys, text to "wrap around"

Eudora: 1988

POP (or Post Office Protocol)

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 19: Internet Technologies

With the World Wide Web, email started to be made available with friendly web interfaces

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 20: Internet Technologies

Routing Emailbased entirely on the destination address

username @ domain

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 21: Internet Technologies

Email client will deliver outbound messages to their local mail server using SMTP.

The local mail server then performs a DNS lookup to find the 'MX' (mail exchanger) records for the recipient's NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 22: Internet Technologies

domain name. These MX devices are the designated mail servers for all email addresses within that domain

The local server then attempts an SMTP connection to each of the MX servers in order of NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 23: Internet Technologies

priority, until a connection is successful. It forwards the message to the remote server and ends the connection.

The remote mail server then either repeats this process, forwarding the message NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 24: Internet Technologies

closer to the intended recipient, or may deliver the message directly to the recipient.

Before SMTP protocol, email was delievered using the

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 25: Internet Technologies

UUCP (Unix-to-Unix Copy Protocol).

In the early days of SMTP, before Spam became a massive problem on the Internet, it was possible to manually define the route that NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 26: Internet Technologies

an email message was to take. This was done by appending multiple "@domain" entries to a recipient address. For example:

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 27: Internet Technologies

[email protected]@[email protected]

A message with this recipient address would be routed first to the mail server for domain3.com, then to the mail server for domain2.com, then NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 28: Internet Technologies

finally to the mail server for domain1.com where it would be delivered to the local user

Due to anti-relaying restrictions now in place on Internet-accessible mail

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 29: Internet Technologies

servers, this is generally no longer possible

new anti-spam feature "Challenge/Response System", sends a link, or a word-verification page

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 30: Internet Technologies

Domain NamesThe Domain Name System, (DNS):Core feature

Distributed database that handles the mapping between

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 31: Internet Technologies

host names and numerical Internet addresses.

An automated phone book

Reverse mapping: query for a name for 202.164.53.112

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 32: Internet Technologies

Punycode-based IDNA system, approved by ICANN (Internet Corporation for Assigned Names and Numbers: 1998) and adopted by some registries

Flavors of DNS software:NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 33: Internet Technologies

•BIND (Berkeley Internet Name Domain)

•DJBDNS (Dan J Bernstein's DNS implementation)

•MaraDNS

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 34: Internet Technologies

•NSD (Name Server Daemon)

•PowerDNS

13 "root servers"

WHOIS database: for most TLDs a basic WHOIS is held NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 35: Internet Technologies

by ICANN, detailed WHOIS maintained by the domain registry

Modern OSs and network applications contain resolver for interrogating DNS services. NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 36: Internet Technologies

dig, nslookup, whois

dig gndec.ac.in

gndec.ac.in. 202.164.53.112

NS ns2.comeconnect.com.

NS ns1.comeconnect.com.NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 37: Internet Technologies

nslookup gndec.ac.in

Name: gndec.ac.in

Address: 202.164.53.112

whois gndec.ac.in

Domain Name:GNDEC.AC.INNITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 38: Internet Technologies

Created On:31-Oct-2003

Last Updated On:31-Oct-2007

Expiration Date:31-Oct-2009 05:00:00 UTC

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 39: Internet Technologies

Sponsoring Registrar:Ernet Registrant Name:Guru Nanak Dev Engineeing College

Registrant Email:[email protected]

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 40: Internet Technologies

Name Server: NS2.COMECONNECT.COM

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 41: Internet Technologies

UsenetUsenet is a "network" of newsgroup servers (often run by ISPs) working together. Once connected to Usenet one can find everything. One

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 42: Internet Technologies

bad thing about Usenet is that it is often used to distribute illegal digital (warez) content like mp3, cracked software, or cracked video games. In most cases Usenet is the first step in the life of warez.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 43: Internet Technologies

Unfortunately this has caused many newsgroup servers to block access to known warez newsgroups.

Usenet providers normally charge money for access but many ISPs have newsgroup NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 44: Internet Technologies

servers running that their customers can access for free. So if you would like to check out Usenet first call your ISP and find out if they have a newsgroup server running

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 45: Internet Technologies

History Of Usenet

1979 software to post announcements Duke University; Steve Bellovin: 1st

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 46: Internet Technologies

UNIX-based “news” software for the system “netnews”

Usenet is bulletin board software where users with the correct software can read and post messages. URL’s that

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 47: Internet Technologies

begin with news refer to Usenet groups.

The NNTP or Network News Transport Protocol is the transportation system that sends out the Usenet messages.NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 48: Internet Technologies

IRCInternet Relay Chat: chat protocol

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 49: Internet Technologies

Technology Of IRC

is a real-time text-based multi-user communication protocol specification and

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 50: Internet Technologies

implementation, which relays messages between users on the network (1988). Official specification (1993) "RFC 1459: Internet Relay Chat Protocol"

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 51: Internet Technologies

A client logged into one network can communicate only with other clients on the same network, not with clients on other networks. Each network is composed of one or more IRC servers. An IRC client is a program that NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 52: Internet Technologies

connects to a given IRC server in order to have the server relay communications to and from other clients on the same network but not necessarily the same server

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 53: Internet Technologies

Messages on IRC are sent as blocks. That is, other IRC clients will not see one typing and editing as one does so. One creates a message block and transmits that block all at once, which is received by the server and based on the NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 54: Internet Technologies

addressing, delivers it to the appropriate client or relays it to other servers so that it may be delivered or relayed again

Once connected to a server, addressing of other clients is achieved through IRC NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 55: Internet Technologies

nicknames. A nickname is simply a unique string of ASCII characters identifying a particular client. Although implementations vary, restrictions on nicknames usually dictate that they be composed only of characters NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 56: Internet Technologies

a-z, A-Z, 0-9, underscore, and dash.

IRC channels: Any communication sent to that channel is then seen by the client.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 57: Internet Technologies

IRC is not P2P protocol, but does have some extensions (DCC: Direct Client Connect and CTCP: Client To Client Protocol) that support text and file transmission directly from client to client without any relay at all.NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 58: Internet Technologies

Using Internet Relay Chat

To use Internet Relay Chat, you need to do the following:

•Choose and install an IRC client.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 59: Internet Technologies

•Find the channel discussing the topic of your interest

•Find the server at which the channel is located. You can be directed to both the server and the channel by the website of a project

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 60: Internet Technologies

•Connect to the server using the client, using a nickname of your choice

•Connect to the channel

By default, the conversations using IRC are public

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 61: Internet Technologies

To have a private conversation with a user in the channel, type "/query nickname"

For private chat, join an non-existent channel, and then allow joining only by invitationNITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 62: Internet Technologies

IRC clients

ChatZilla: An add-in for Firefox.

IRSSI: Has a text-only user interface.

MIRC: Good for beginners.NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 63: Internet Technologies

XChat Windows

Pidgin, Miranda, Trillian: multi-protocol clients

Opera: A web browser with integrated IRC client

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 64: Internet Technologies

ProtocolsSpecification of a set of rules for a particular type of communication

Different protocols often describe different aspects of a NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 65: Internet Technologies

single communication; taken together, these form a protocol stack. The terms "protocol" and "protocol stack" also refer to the software that implements a protocol.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 66: Internet Technologies

Most recent protocols are assigned by the IETF for Internet communications, and the IEEE, or the ISO organisations for other types. The ITU-T handles telecommunications protocols and formats.NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 67: Internet Technologies

Index page for network protocols and protocol layers, categorised by the nearest matching layers of the OSI seven layer model

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 68: Internet Technologies

Common Internet

ProtocolsInclude TCP/IP(Transmission Control Protocol/Internet NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 69: Internet Technologies

Protocol), UDP/IP (User Datagram Protocol/Internet Protocol), HTTP(HyperText Transfer Protocol) and FTP(File Transfer Protocol).

TCP/IP is a stream protocol. This means that a connection NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 70: Internet Technologies

is negotiated between a client and a server. Any data transmitted between these two endpoints is guaranteed to arrive, thus it is a so-called lossless protocol. Since the TCP protocol can only connect two endpoints, it is NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 71: Internet Technologies

also called a peer-to-peer protocol.

HTTP is the protocol used to transmit all data present on the World Wide Web. This includes text, multimedia and graphics.NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 72: Internet Technologies

HTTP is the protocol used to transmit HTML, the language that makes all the fancy decorations in browser. It works upon TCP/IP.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 73: Internet Technologies

RoutingA route is the path that data takes when travelling through a network from one host to another. Routing is the process by which the path, or

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 74: Internet Technologies

some subset of it, is determined. One of the characteristic features of the Internet, as compared to other network architectures, is that each node that receives a packet will typically determine for itself what the next step in NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 75: Internet Technologies

the path should be. IP routing decisions are generally made based on the destination of network traffic. When an IP packet is sent from a node on the network, it will consult its routing table to determine the next hop device that the traffic NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 76: Internet Technologies

should be sent to, in order for it to reach its final destination. When node receives a packet on interface eth0 which has a destination of 216.239.59.114, it will consult the table and see that it should send it through the default interface, NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 77: Internet Technologies

the host x.y.z, which is on interface ppp0. The routing table is constructed from a combination of statically defined routes and those learned from dynamic routing protocols. Statically defined routes may be declared at NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 78: Internet Technologies

system boot time, or via a command line interface. They will generally include the following parameters:

•Destination - this may be either a single host, or a

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 79: Internet Technologies

network (in that case N/W mask is also required)

•Gateway - the device to which traffic with the defined destination should be sent

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 80: Internet Technologies

Static routes may also include the following parameters:

• Interface - the interface through which the traffic to a destination must be sent. (Most OSs can determine this automatically)

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 81: Internet Technologies

•Metric - the number of 'hops' away that the gateway is from this host. For a gateway that resides on a directly connected network, the metric is '1'

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 82: Internet Technologies

The default route is a special case of a statically defined route. It is the route of last resort. All traffic that does not match another destination in the routing table is forwarded to the default gateway.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 83: Internet Technologies

Dynamic routing protocols allow network attached devices to learn about the structure of the network dynamically from peer devices. This reduces the administrative effort required to implement and change NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 84: Internet Technologies

routing throughout a network. Some examples of dynamic routing protocols are:

•RIP (Routing Information Protocol)

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 85: Internet Technologies

•OSPF (Open Shortest Path First)

• ISIS (Intermediate system to intermediate system)

•BGP (Border Gateway Protocol)

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 86: Internet Technologies

• IGRP (Interior Gateway Routing Protocol)

ISIS and OSPF are link-state protocols, meaning each node is part of the same zone, will know the state of all the link in the mesh. Due to the NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 87: Internet Technologies

exponential number of link in a mesh, these protocols are used for small mesh such as an ISP national backbone.

RIP is usually used to easily announce customer's routes in a backbone.NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 88: Internet Technologies

BGP is used as an external routing protocol to exchange routes with other entities. ISP use BGP extensively to trade their routes. It can also be used to carry customers routes across a network, in a MPLS backbone for example.NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 89: Internet Technologies

Web HostingWhen someone sets up a server and hooks it up to the Internet, the files on the server become accessible over the Internet. Web

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 90: Internet Technologies

Hosting is your personal space on that server. Web hosting is your own storage on the Internet.

If you upload HTML files, you'll have a website. If you upload .ZIP files, you'll have a NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 91: Internet Technologies

download area. It's up to you what you do with it, but Web hosting is online storage.

Most companies own their own servers these days, but some still pay for web hosting. Let's say Harbhajan decides NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 92: Internet Technologies

he wants to sell his paintings online. He purchases web hosting, and sets up a website.

Ajay, on the other hand, wants to set up a forum system. he purchases web hosting and NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 93: Internet Technologies

installs the forums. If you know how, you can make an entire website, or put any files you want, online, via your web hosting.

In addition, over the last few years hundreds of "web site NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 94: Internet Technologies

software" have been written that, when installed onto your hosting account, give you an immediate web site.

When looking for a web site software, it's important to consider the software license. NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 95: Internet Technologies

If you stick with FOSS when selecting your web site software, you will have the advantage of new software releases that are made available free of charge.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 96: Internet Technologies

The WebThe World Wide Web (the "Web" or "WWW" for short) is a hypertext system that operates over the Internet.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 97: Internet Technologies

S/W program: web browser

Information: documents or web pages

The first web browser named Mosaic was developed in the early 1990s.NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 98: Internet Technologies

Popular web browsers:

Internet Explorer

Firefox

Netscape.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 99: Internet Technologies

URLs, HTTP, HTML

Uniform Resource Locator (URL):

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 100: Internet Technologies

Specifies how each page of information is given a unique "address" at which it can be found

Hyper Text Transfer Protocol (HTTP): Specifies how the

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 101: Internet Technologies

browser and server send the information to each other

Hyper Text Markup Language (HTML) is a method of encoding the information so it can be displayed on a variety of devices.NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 102: Internet Technologies

World Wide Web Consortium: Develops and maintains these standards and others that enable computers on the Web to effectively store and communicate all kinds of information.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 103: Internet Technologies

Beyond TextViola (1992) added the ability to display graphics as well.

Mosaic for X (1993) sparked a tremendous rise in the popularity of the WebNITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 104: Internet Technologies

Additional features such as dynamic content, music and animation can be found in modern browsers

Issue: the web as seen by Netscape is not at all the

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 105: Internet Technologies

same as the web seen by Internet Explorer.

Real-time web-based services such as webcasts, web radio and live web cams.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 106: Internet Technologies

Java & JavascriptSun Microsystems' Java: Enabled web servers to embed applets; faster and richer user interaction

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 107: Internet Technologies

JavaScript: Scripting language developed for Web pages.

Document Object Model (DOM)

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 108: Internet Technologies

Hyper-text promote non-hierarchical and non-linear way of expression and thinking. It does not have a linear order from the beginning to the end.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 109: Internet Technologies

History Of The Web

The Web grew out of a project at CERN (1989): Make it easier to share research

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 110: Internet Technologies

papers among colleagues. Enquire Within Upon Everything:

Berners-Lee released files describing his idea for the "World Wide Web" onto the Internet on August 6, 1991NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 111: Internet Technologies

HTMLStatic pages; Dynamic, interactive

As a markup language: it provide a set of general rules that suggest how content NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 112: Internet Technologies

should look when rendered. A markup language doesn't dictate the methods used to display the content, nor does it have fore knowledge of the target context, so this control is imprecise.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 113: Internet Technologies

Early tools: primitive

Publishing HTML-formatted documents on the Internet via the World Wide Web

HTML is a subset of the Standard Generalised Markup

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 114: Internet Technologies

Language (SGML), which is an Int. Std. (ISO 8879) published in 1986 as a format for structuring and marking up documents. An important addition to HTML was the inclusion of support for hypertext (linked information).NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 115: Internet Technologies

Embedded Technologies

Stand-alone programs and plugins that extend the normal functionality of a web page.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 116: Internet Technologies

Java, Shockwave Flash, audio and video players are all examples of embedded technologies that can assist creating a web site

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 117: Internet Technologies

Proxy ServersProvide a cache of items available on other servers (slower, expensive, unavailable from the local network)

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 118: Internet Technologies

Squid

Apache's mod_proxy module

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 119: Internet Technologies

Search EngineComputer software: search data in the form of text or a database for ˙specified information.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 120: Internet Technologies

Search engines normally consist of spiders (bots) which roam the web searching for links and keywords.

They send collected data back to the indexing software which categorises and adds NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 121: Internet Technologies

the links to databases with their related keywords. Before 1993 the term search engine never existed.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 122: Internet Technologies

Web Advertising

Static images, animated GIFs, and Flash Animation

Banners, Pop-up, intro pages NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 123: Internet Technologies

A banner can be an image, animated gif, flash video or plain text

A Pop-up causes a new browser window to open and displays a webpage that can

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 124: Internet Technologies

contain text, images and flash.

Intro Pages to websites usually have a flash or gif animation to introduce a company, their services or Products.NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 125: Internet Technologies

Ad servers: Central ad server.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 126: Internet Technologies

Remote AccessAllows you to access one computer from another.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 127: Internet Technologies

TelnetA protocol designed to remotely access computers in a client-server fashion.

SSH (Secured SHell)

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 128: Internet Technologies

UsesSSH is actually so much more than just a way to access a remote shell securely.

Scp: copy files between machines; allows recursive NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 129: Internet Technologies

copies; copy a file from a remote host to a remote host.

scp: [email protected]:~/files/ .

Encrypt the transport of any data from one machine to another.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 130: Internet Technologies

Port forwarding: . This allows you 'redirect' communication to and from a local application through SSH to another host. So, with SSH you can secure otherwise insecure communications over an encrypted 'tunnel'.NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 131: Internet Technologies

Using SSHThe secure shell client is conveniently called ssh.

ssh user@host

Using SFTPNITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 132: Internet Technologies

SFTP merely works like FTP,

sftp user@host

Using SCP

scp FILE_PATH user@host:REMOTE_PATH

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 133: Internet Technologies

Copy from a remote host

scp user@host:rPath l_Path

scp -r user@host:dirName destination_dir

SSH as a Proxy

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 134: Internet Technologies

If you can make an SSH connection, you can (most likely) use that connection as a SOCKS proxy, without any extra setup on the remote computer. Traffic is tunneled securely through the SSH connection. If you are on an NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 135: Internet Technologies

unsecured wireless connection, you can use this to effectively secure all your traffic from snooping. You can also use this to bypass IP restrictions, because you will appear to be connecting from the remote computer.NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 136: Internet Technologies

VNCVirtual Network Computing (VNC) is a remote desktop protocol to remote control another computer. VNC is used to transport the desktop

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 137: Internet Technologies

environment of a graphical user interface from one computer to a viewer application on another computer on the network. There are clients and servers for all most all GUI OSs. The VNC protocol allows for NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 138: Internet Technologies

complete platform independence. A VNC viewer on any operating system can connect to a VNC server on any other operating system. It is also possible for multiple clients to connect to a VNC server at the same time. NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 139: Internet Technologies

Popular uses of the technology include remote tech support, and accessing your files on your work PC while at home or even on the road.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 140: Internet Technologies

There is even a Java viewer for VNC, so you can connect to a VNC server from your web browser without installing any software.

The original VNC code is open source, as are many of NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 141: Internet Technologies

the flavours of VNC available today.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 142: Internet Technologies

How It WorksVNC is actually two parts, a client and a server. A server is the machine that is sharing its screen, and the client, or viewer is the program that is

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 143: Internet Technologies

doing the watching and interacting with the server. VNC is actually a very simple protocol and is based on graphic primitive, "Put a rectangle of pixel data at a given x,y position". What this means is VNC takes small NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 144: Internet Technologies

rectangles of the screen (actually the framebuffer) and transports them from the server to the client. This in its simplest form would cause lots of bandwidth to be used, and hence various methods have been invented to make NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 145: Internet Technologies

this process go faster. There are now many different 'encodings' or methods to determine the most efficient way to transfer these rectangles. The VNC protocol allows the client and server to negotiate which encoding it NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 146: Internet Technologies

will use. The simplest and lowest common denominator is the raw encoding method where the pixel data is sent in left-to-right scanline order, and after initial setup, then only transfers the rectangles that have changed.NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 147: Internet Technologies

Web 2.0Describes the changing trends in the use of World Wide Web technology and web design that aim to enhance creativity,

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 148: Internet Technologies

communications, secure information sharing, collaboration and functionality of the web.

Web 2.0 concepts have led to the development and evolution of web culture NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 149: Internet Technologies

communities and hosted services, such as social-networking sites, video sharing sites, wikis, and blogs.

O'Reilly Media Web 2.0 conference in 2004. Although NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 150: Internet Technologies

the term suggests a new version of the World Wide Web, it does not refer to an update to any technical specifications, but rather to changes in the ways software developers and end-users

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 151: Internet Technologies

utilise the Web. According to Tim O'Reilly:

Web 2.0 is the business revolution in the computer industry caused by the move to the Internet as a platform, and an attempt to NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 152: Internet Technologies

understand the rules for success on that new platform.

Tim Berners-Lee, inventor of the World Wide Web, has questioned whether one can use the term in any meaningful way, since many NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 153: Internet Technologies

of the technological components of Web 2.0 have existed since the early days of the Web.

Uses of Web as a platform. Don't fight the Internet, encompasses the essence of NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 154: Internet Technologies

Web 2.0 — building applications and services around the unique features of the Internet, as opposed to expecting the Internet to suit as a platform (effectively "fighting the Internet").

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 155: Internet Technologies

Web had become a platform, with software above the level of a single device, leveraging the power of "The Long Tail," and with data as a driving force. An architecture of participation where users can

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 156: Internet Technologies

contribute website content creates network effects.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 157: Internet Technologies

CharacteristicsWeb 2.0 websites allow users to do more than just retrieve information. They can build on the interactive facilities of "Web 1.0" to provide "Network

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 158: Internet Technologies

as platform" computing, allowing users to run software-applications entirely through a browser. Users can own the data on a Web 2.0 site and exercise control over that data These sites may have an "Architecture of NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 159: Internet Technologies

participation" that encourages users to add value to the application as they use it.

Web 2.0 sites often feature a rich, user friendly interface based on Ajax, OpenLaszlo, Flex or similar rich media.NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 160: Internet Technologies

Technology Overview

server software, content-syndication, messaging-protocols, standards-oriented

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 161: Internet Technologies

browsers with plugins and extensions, and various client applications.

Web 2.0 websites typically include some of the following features/techniques. (acronym SLATES):NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 162: Internet Technologies

•Search: keyword search

•Links: guides to important pieces of information. The best pages are the most frequently linked.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 163: Internet Technologies

•Authoring: In wikis, the content is iterative in the sense that the people undo and redo each other's work. In blogs, content is cumulative in that posts and comments of individuals are accumulated over time.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 164: Internet Technologies

•Tags: categorisation of content

•Extensions: automation of some of the work and pattern matching by using algorithms e.g. amazon.com recommendations.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 165: Internet Technologies

•Signals: the use of RSS technology to notify users with any changes

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 166: Internet Technologies

UsageHigher Education

Government 2.0

Public diplomacy

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 167: Internet Technologies

Web 2.0 initiatives have been employed in public diplomacy for the Israeli government. The country is believed to be the first to have its own official

blog, MySpace page, YouTube channel, Facebook NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 168: Internet Technologies

page and a political blog. The Israeli Ministry of Foreign Affairs started the country's video blog as well as its political blog. The Foreign Ministry also held a microblogging press conference via Twitter about NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 169: Internet Technologies

its war with Hamas, with Consul David Saranga answering live questions from a worldwide public in common text-messaging abbreviations. The questions and answers were later posted on

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 170: Internet Technologies

Israelpolitik.org, the country's official political blog.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 171: Internet Technologies

Web-based Applications

And DesktopsAjax has prompted the development of websites that NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 172: Internet Technologies

mimic desktop applications, such as word processing, the spreadsheet, and slide-show presentation. WYSIWYG wiki sites replicate many features of PC authoring applications. Still other sites perform

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 173: Internet Technologies

collaboration and project management functions.

mimic the user experience of desktop application able to run within any modern browser.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 174: Internet Technologies

XML And RSSProtocols which permit syndication include RSS (Really Simple Syndication — also known as "web syndication"), RDF (as in RSS

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 175: Internet Technologies

1.1), and Atom, all of them XML-based formats.

Observers have started to refer to these technologies as "Web feed" as the usability of Web 2.0 evolves and the

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 176: Internet Technologies

more user-friendly Feeds icon supplants the RSS icon.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 177: Internet Technologies

Web APIsMachine-based interaction, uses two main approaches to Web APIs, which allow web-based access to data and functions:

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 178: Internet Technologies

REST and SOAP.

•REST (Representational State Transfer) Web APIs use HTTP alone to interact, with XML (eXtensible Markup Language) or JSON payloads;

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 179: Internet Technologies

•SOAP involves POSTing more elaborate XML messages and requests to a server that may contain quite complex, but pre-defined, instructions for the server to follow.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 180: Internet Technologies

Often servers use proprietary APIs, but standard APIs (for example, for posting to a blog or notifying a blog update) have also come into wide use. Most communications through APIs involve XML or JSON payloads.NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 181: Internet Technologies

The argument exists that "Web 2.0" does not represent a new version of the

World Wide Web at all, but merely continues to use so-called "Web 1.0"

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 182: Internet Technologies

technologies and concepts. Techniques such as AJAX do not replace underlying protocols like HTTP, but add an additional layer of abstraction on top of them. Many of the ideas of Web 2.0 had already been featured in NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 183: Internet Technologies

implementations on networked systems well before the term "Web 2.0" emerged. Amazon.com, for instance, has allowed users to write reviews and consumer guides since its launch in 1995, in a form of self-NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 184: Internet Technologies

publishing. Amazon also opened its API to outside developers in 2002.

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com

Page 185: Internet Technologies

Thanks

NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com