Вы находитесь на странице: 1из 26

Vipin & the Group

E-COMMERCE APPLICATIONS

Common Business Services


Infrastructure Technical
Public, Standards
Legal, Messaging & Info Distribution For
Privacy Infrastructure Document
Security,
issues
Multimedia Content & Network Network
Publishing Infrastructure Protocols

Information Superhighway
(Network Infrastructure) i.e.
INTERNET,WWW
S. Type of Scope of Network Stages of Network
N.

1 Experimental networking ARPANET


2 Discipline-Specific CSNET, MILNET, HEPnet,
Research MFEnet
3 General research Early NSFNET,BITNET
networking
4 Privatization and Present NSFNET
Commercialization
5 Restricted public data National Research and
networks for research and Education Network (NREN) and
education HPCC
6 National information Information Superhighway
infrastructure (Internet)
 Before the widespread internetworking that led to the
Internet, most communication networks were limited by
their nature to only allow communications between the
stations on the network, and the prevalent computer
networking method was based on the central
mainframe computer model.
 Several research programs began to explore and
articulate principles of networking between separate
physical networks, leading to the development of the
packet switching model of digital networking.
 These research efforts included those of the laboratories
of Donald Davies (NPL), Paul Baran (RAND Corporation),
and Leonard Kleinrock's MIT and UCLA.
 The research led to the development of several packet-
switched networking solutions in the late 1960s and
1970s, including ARPANET and the X.25 protocols.
 Additionally, public access and hobbyist networking
systems grew in popularity, including unix-to-unix copy
(UUCP) and FidoNet.
 They were however still disjointed separate networks,
served only by limited gateways between networks.
 This led to the application of packet switching
to develop a protocol for inter-networking,
where multiple different networks could be
joined together into a super-framework of
networks. By defining a simple common
network system, the Internet protocol suite, the
concept of the network could be separated
from its physical implementation.
 This spread of inter-network began to form into
the idea of a global inter-network that would be
called 'The Internet', and this began to quickly
spread as existing networks were converted to
become compatible with this. This spread
quickly across the advanced
telecommunication networks of the western
world, and then began to penetrate into the rest
of the world as it became the de-facto
international standard and global network.
 However, the disparity of growth led to a
digital divide that is still a concern today.
 Following commercialization and introduction
of privately run Internet Service Providers in the
1980s, and its expansion into popular use in the
1990s, the Internet has had a drastic impact on
culture and commerce.
 This includes the rise of near instant
communication by e-mail, text based
discussion forums, and the World Wide Web.
 Investor speculation in new markets provided
by these innovations would also lead to the
inflation and collapse of the Dot-com bubble, a
major market collapse.
 But despite this, the Internet continues to
grow.
 The Internet
– system of interconnected networks that
spans the globe
– routers, TCP/IP, firewalls, network
infrastructure, network protocols.
 The World Wide Web (WWW)
– part of the Internet and allows users to
share information with an easy-to-use
interface
– Web browsers, web servers, HTTP, HTML
 Web architecture
– Client/server model
– N-tier architecture; e.g., web servers,
application servers, database servers,
scalability
 The Internet
Interne is a global network of
interconnected computers, enabling users to
share information along multiple channels.
 Typically, a computer that connects to the
Internet can access information from a vast
array of available servers and other computers
by moving information from them to the
computer's local memory.
 The same connection allows that computer to
send information to servers on the network;
that information is in turn accessed and
potentially modified by a variety of other
interconnected computers.
1. Router
2. TCP/IP
3. Firewalls
4. Network Protocols.
 A router is a networking device whose software
and hardware are usually tailored to the tasks
of routing and forwarding information. For
example, on the Internet, information is
directed to various paths by routers.
 Routers connect two or more logical subnets,
which do not necessarily map one-to-one to the
physical interfaces of the router.
 In marketing usage, it is generally optimized for
Ethernet LAN interfaces and may not have
other physical interface types. In comparison, a
network hub does not do any routing, instead
every packet it receives on one network line
gets forwarded to all the other network lines.
 Routers may provide
connectivity inside
enterprises, between
enterprises and the Internet,
and inside
Internet Service Providers
(ISP).
 The largest routers
interconnect ISPs, or may be
used in very large enterprise
networks.
 The smallest routers provide
connectivity for small and
home offices.
 he TCP/IP model is a description frame work for
computer network protocols created in the 1970s by
DARPA, an agency of the
United States Department of Defense.
 It evolved from ARPANET, which was the world's first
wide area network and a predecessor of the Internet.
 The TCP/IP Model is sometimes called the Internet
Reference Model or the DoD Model.
 The TCP/IP model describes a set of general design
guidelines and implementations of specific networking
protocols to enable computers to communicate over a
network.
 TCP/IP provides end-to-end connectivity specifying how
data should be formatted, addressed, transmitted, routed
and received at the destination.
 A firewall is an integrated collection of security measures
designed to prevent unauthorized electronic access to a
networked computer system.
 It is also a device or set of devices configured to permit,
deny, encrypt, decrypt, or proxy all computer traffic
between different security domains based upon a set of
rules and other criteria.
 Firewalls can be implemented in both hardware and
software, or a combination of both.
 Firewalls are frequently used to prevent unauthorized
Internet users from accessing private networks
connected to the Internet, especially intranets. All
messages entering or leaving the intranet pass through
the firewall, which examines each message and blocks
those that do not meet the specified security criteria.
 Packet filter: Looks at each packet entering or leaving
the network and accepts or rejects it based on user-
defined rules. Packet filtering is fairly effective and
transparent to users, but it is difficult to configure. In
addition, it is susceptible to IP spoofing.
 Application gateway: Applies security mechanisms to
specific applications, such as FTP and Telnet servers.
This is very effective, but can impose a performance
degradation.
 Circuit-level gateway: Applies security mechanisms
when a TCP or UDP connection is established. Once
the connection has been made, packets can flow
between the hosts without further checking.
 Proxy server: Intercepts all messages entering and
leaving the network. The proxy server effectively hides
the true network addresses.
 The Internet Protocol (IP) is a protocol used for
communicating data across a packet-switched
inter-network using the Internet Protocol Suite, also
referred to as TCP/IP.
 IP has the task of delivering distinguished protocol
datagrams (packets) from the source host to the
destination host solely based on their addresses.
 For this purpose the Internet Protocol defines addressing
methods and structures for datagram encapsulation.
 The first major version of addressing structure, now
referred to as Internet Protocol Version 4 (IPv4) is still the
dominant protocol of the Internet, although the
successor, Internet Protocol Version 6 (IPv6) is being
deployed actively worldwide.
 The World Wide Web is a very large set of interlinked
hypertext documents accessed via the Internet.
 With a Web browser, one can view Web pages that may
contain text, images, videos, and other multimedia and
navigate between them using hyperlinks.
 The World Wide Web enabled the spread of information
over the Internet through an easy-to-use and flexible
format.
 It thus played an important role in popularizing use of
the Internet. Although the two terms are sometimes
conflated in popular use, World Wide Web is not
synonymous with Internet.
 The Internet consists of a worldwide collection of
computers and sub-networks exchanging data using
wires, cables, and radio links, whereas the World Wide
Web is a huge set of documents, images, and other
'resources' linked by an abstract 'web' of hypertext links
and URLs.
 The World Wide Web was started in 1989 by
the English physicist Sir Tim Berners-Lee, now
the Director of the
World Wide Web Consortium, and later by
Robert Cailliau, a Belgian computer scientist,
while both were working at CERN in Geneva,
Switzerland.
 In 1990, they proposed building a "web of
nodes" storing "hypertext pages" viewed by
"browsers" on a network and released that
web in 1992.
 Connected by the existing Internet, other
websites were created, around the world,
adding international standards for
domain names & the HTML language.
 Since then, Berners-Lee has played an active
role in guiding the development of Web
1. Web browsers
2. Web Servers
3. HTTP
4. HTML
5. URL
 A Web browser is a software application which enables a
user to display and interact with text, images, videos,
music, games and other information typically located on
a Web page at a Web site on the World Wide Web or a
local area network.
 Text and images on a Web page can contain hyperlinks
to other Web pages at the same or different Web site.
Web browsers allow a user to quickly and easily access
information provided on many Web pages at many Web
sites by traversing these links.
 Web browsers format HTML information for display, so
the appearance of a Web page may differ between
browsers.
 Web browsers are the most-commonly-used type of
HTTP user agent. Although browsers are typically used
to access the World Wide Web, they can also be used to
access information provided by Web servers in
private networks or content in file systems.
 The term web server can mean one of
two things:
 A computer program that is responsible
for accepting HTTP requests from
clients (user agents), and serving them
HTTP responses along with optional
data contents, which usually are web
pages such as HTML documents and
linked objects (images, etc.).
 A computer that runs a computer
program as described above.
 Hypertext Transfer Protocol (HTTP) is an application-
level protocol for distributed, collaborative, hypermedia
information systems.
 Its use for retrieving inter-linked resources led to the
establishment of the World Wide Web.
 HTTP development was coordinated by the
World Wide Web Consortium and the
Internet Engineering Task Force (IETF).
 HTTP is a request/response standard of a client and a
server.
 A client is the end-user, the server is the web site. The
client making a HTTP request—using a web browser tool
—is referred to as the user agent.
 The responding server—which stores or creates
resources such as HTML files and images—is called the
origin server.
 In between the user agent and origin server may be
several intermediaries, such as proxies, gateways, and
tunnels.
 HTML, an acronym for HyperText Markup
Language, is the predominant markup language
for web pages.
 It provides a means to describe the structure of
text-based information in a document—by
denoting certain text as links, headings,
paragraphs, lists, etc.—and to supplement that
text with interactive forms, embedded images,
and other objects.
 HTML can also describe, to some degree, the
appearance and semantics of a document, and
can include embedded scripting language code
(such as JavaScript) that can affect the
behavior of Web browsers and other HTML
processors.
 A Uniform Resource Locator (URL) is a type of
Uniform Resource Identifier (URI) that specifies
where an identified resource is available and
the mechanism for retrieving it.
 It is, generally, confused with Uniform
Resource Identifier.
 A Uniform Resource Identifier (URI) consists of
a string of characters used to identify or name a
resource on the Internet. Such identification
enables interaction with representations of the
resource over a network, typically the
World Wide Web, using specific protocols. URIs
are defined in schemes specifying a specific
syntax and associated protocols.
 In popular language, a URL is also referred to
as a Web address.

Вам также может понравиться