Introduction to Internet and WWW
|
|
|
- Sabrina McLaughlin
- 9 years ago
- Views:
Transcription
1 Introduction to Internet and WWW Course No.: CMPE296U Course Name:Web-Based Systems and Tools Instructor: Jerry Gao, Ph.D.
2 Introduction to Internet and WWW - What is the Internet? - History of the Internet - Internet Design Principles - Basic Internet protocols - Basic Internet tools - What is the World Wide Web - History of the World Wide Web - Basic concepts about WWW - Basic WWW protocols - Basic Web Tools - Creating A Web Site
3 The Internet: Development History - Grew out of a research network originally funded by U.S. Department of Defense. - Development of this network, known as the ARPAnet after the Advanced Research Projects Agency (ARPA), began in As the network grew, it was used for applications beyond research, such as electronic mail. In the early 1980s, the current versions of the core Internet protocols, TCP and IP, were introduced across the network. The term Internet comes from the word inter-network - an interconnected set of networks. In 1992, the Center for European Nuclear Research (CERN) released the first versions of World Wide Web software. - Subsequently, the number of Web servers has grown quickly.
4 The Internet Properties: Key properties of the Internet: - The Internet is interoperable. - The Internet is global. - The Web makes it easy. - The costs of the network are shared across multiple applications and borne by the end users. The striking characteristic of the Internet --> heterogeneity. Small computer network Internet
5 The Internet Layered Architecture: The Internet, as a network of connecting many small networks, consists of four layers: - Application Layer (HTTP, SMTP..) - Transport Layer (TCP, UDP) - Network Layer (IP) - Physical Layer Application layer (HTTP, SMTP) Transport Layer (TCP, UDP) Network Layer (IP) Physical Layer (e.g. Ethernet)
6 The Internet: Design Principles The Internet has been successful because of some fundamental decisions about its design made early in its history. - Interoperability: Independent implementations of Internet protocols actually work together. Interoperability means that systems can be assembled using client and server computers and software from different vendors. In the context of Internet commerce, interoperability means that buyers and sellers do not have to buy and upgrade software simultaneously from the same vendors to conduct commerce. - Layering: Internet protocols are designed to work in layers, with each higher layer building on the facilities provided by lower layers.
7 The Internet: Design Principles - Simplicity: One way to look at the layering of the Internet is that it grows both up and down from IP. IP is very simple, providing only addressing and formatting of packets. Below the level of IP, there is the complexity of many different kinds of network hardware, topologies, and routers. IP hides that complexity from applications and insulates application developers from: - the complexities of different network devices - the complexities of implementing low-level network protocols. Above IP, higher-level protocols such as TCP offer service abstractions that are easy for application programmers to understand and use.
8 The Internet: Design Principles - Uniform naming and addressing: The IP layer offers a uniform addressing structure that assigns a 32-bit address to each computer connected to the network. Domain name system (DNS) offers a uniform way to translate human-readable names for computers, such as to the numeric address for that computer. - End-to-end: Internet is designed around end-to-end protocols. That is, the interpretation of the data happens on the sending and receiving systems, but nothing in the network needs to look at anything but the destination address for delivering the packet. End-to-end protocols have several advantages: - hide the internal structure of the network - provide simple abstractions to programmers - shielding them from such things as the messy details of recovering from lower-level errors.
9 The Internet Protocols - FTP:(File transfer protocol) - One of the most oldest and probably the most popular protocol to be used to move files on the Internet. - TCP/IP:(Transmission Control Protocol and Internet Protocol) - The low-level communications protocol that holds the Internet together. - It provides means to allows two software on difference machines on the Internet find each other, rendezvous, and transfer data. - It provides the essential service of making sure that each piece of data is transferred in the correct sequence and without error. - SMTP: (the message protocol) - A protocol to allow two users to communicate through messages over the Internet. - NNTP: (Net News Transfer Protocol) - A protocol, which can be used to access or transfer Usenet news over the Internet. - Telnet: - The traditional teletype-style communications protocol for communicating with text-based information services.
10 The World Wide Web: History - March, 1989, Tim Berners-Lee of Geneva s European Particle Physics Laboratory (CERN) circulated a proposal to develop a hypertext system for global information sharing in High Energy Physics community. ( - The World Wide Web project began to take shape at the beginning of October 1991, the gateway for WAIS search (a crucial development for the Web s future as search as well as a browsing tool), - Before the end of 1991, CERN announced the Web to the High Energy Physics community in general. - Essentially, 1992 was a developmental year. In March of 1993, WWW traffic clocked in at 0.1 percent of total Internet backbone traffic. - In July of 1994, CERN began to turn over the Web project to a new group called the W3 organization, a joint venture between CERN and MIT to develop the Web further.
11 The World Wide Web: HTML HTML is a simplified derivative of SGML, or Standard Generalized Markup language. - Its code can be used to make documents readable across a variety of platforms and software. - Like SGML, HTML operates through a series of codes placed within an ASCII doc. These codes are translated by a WWW client such as Lynx, Mosaic, Cello, Viola, or MacWeb into specific kinds of formats to be displayed on the screen. - Items include in a HTML page are: - links, lists, headings, titles, images, forms, and maps. - Due to the limitation of HTML documents, now more advanced technologies are introduced to enrich its functions, such as, JavaScript, ActiveX, VML, SVG
12 The World Wide Web: HTTP HTTP stands for HyperText Transfer Protocol. - It is a simple data transfer protocol that binds the Web together. - It supports the communications between a web client (browser) and its web server. - It consists of a set of messages and replies for both servers and browsers. - It treats documents, files, menus, and graphics as objects. - It relies on the Universal resource identifier (URI), enclosed in the universal resource locator (URL), to identify files. - It uses the Internet s TCP/IP network protocol. (
13 The World Wide Web: HTTP Macintosh System 7.x: MacHTTPD: OS/2: OS/2HTTPD: Unix: CERN httpd: NCSA httpd: ftp://ftp.netcom.com/pub/kfan/overview.html ftp://ftp.ncsa.uiuc.edu/web/httpd/unix/ncsa_httpd Windows 3.1x: NCSA httpd for windows: Windows NT: HTTPS: ftp://emwac.ed.ac.uk/pub/https
14 The World Wide Web: URL - Uniform Resource Locators (URL) -> the addresses of Web resources. Usually, an URL leads to a file, but that s not always the case. A URL can point you to a single record in a database, the front-end of an Internet program, or a result of a query. Example: Resource Name Path Name Server Name Host Indicator Protocol
15 The World Wide Web: Protocols - Hypertext Transfer Protocol (HTTP) HTTP is the original Web Communication protocol which supports the connectionless communications between a Web server and its clients above TCP layer. - Secure Sockets Layer (SSL) Developed by: Where does it fit in? Features: Netscape Communications Corp., It is the most widely used security protocol on the Internet. between TCP and the application. It provides security services for any stream of data. Encrypting the communications, digital certificates. - Secure HTTP (S-HTTP) Developed by: Enterprise Integration Technologies (EIT). Not widely used. Where does it fit in? at the application layer rather than the transport layer Features: Clients and servers can specify authentication and privacy capabilities independently of one another.
16 The World Wide Web: Protocols - Gopher: - A campus information service protocol invented at the university of Minnesota. - A protocol supports multiple document types, executable scripts, external viewers, and fill-out forms. - The main difference visible to the casual user is that its interface is a series of nested menus rather than hypertext documents. - WAIS (Wide Area Information Search): - A protocol that allows high speed remote searchers of document databases over the network.
17 The World Wide Web: Tools - Web Browsers and Web Servers: HTTP is the original Web Communication protocol which supports the connectionless communications between a Web server and its clients above TCP layer. To support the client-server communications on the Web, -> web browsers and web servers Web Browser: A web browser is used as a client on the Web to support the following functions: - to process users requests - to connect to a web server using URL information - to send the request to the sever - to format the responding information (from the server) - to display the formatted information as a document Web Sever: a web server plays as a server on the web: - to listen for incoming requests from the browser - to find the requested document, and transmit to the browser or - to find the corresponding CGI program and execute it - to send the responding information back to the browser
18 The World Wide Web: Tools - Web Search Tools and Search Directories: They provides on-line subject guides for users to find the useful information over the Web. Their major functions are: - process users search requests - conduct an information search according to a classified and well-structure index library (database). - generate the search results - display them to the users - Web Authoring Tools: - Group-ware Tools: , FTP, Online Chat, - Administration Tools: Performance monitor, Trace log, Traffic Monitor
19 The World Wide Web: Summary The WWW project merges the techniques of network information and hypertext to make an easy but powerful global information system. The project presents any information accessible over the network as part of a seamless hypertext information space. W3 was originally developed to allow information sharing within internationally dispersed teams, and the dissemination of information by support groups. It is currently the most advanced information system deployed on the Internet, embraces within its data model most information in previous networked information systems. In fact, the Web is an architecture which will also embrace any future advances in technology, including new networks, protocols, object types, and data forms. Tim Berners-Lee on the World Wide Web, cira From
20 The World Wide Web: Applications Distributing and Sharing Scientific Data: Share scientific information ( data, papers, databases) among scientists around the world E-Commerce: Electronic marketing and advertising, online shopping (order/purchase, payment), online trading, online customer services. Online Education and Training: On-line courses, training program and information, distance learning Organization and Public Service: Distributing public service information for organizations and government offices. Online Publishing: Online books, magazines and journals, newspapers, Video, CD. Online Banking and Trading: Support online bank transactions for banks and stockbrokerages
21 Steps to Creating a Web Site - Internet or Intranet? A web site can be accessible to the whole world via the Internet, or can be a private affair available only to users in the organization. Private web sites are called intranet servers. - used by internal users in the organization only. - set-up inside a firewall to protect access and attack from external users. - shared by all internal users across many types of local area TCP/IP based computer network. Public web sites: (Internet sites) - Bring the Internet to your site --> establish a connection between your organization and the Internet For example, set a link to the Internet via an Internet Server provider (ISP) - Take your site to Internet --> place your web site at a remote location where there is an Internet connection in place. Often this remote location is on a computer maintained by an Internet service provider.
22 Steps to Creating a Web Site - Internet or Intranet? A web site can be accessible to the whole world via the Internet, or can be a private affair available only to users in the organization. Private web sites are called intranet servers. - used by internal users in the organization only. - set-up inside a firewall to protect access and attack from external users. - shared by all internal users across many types of local area TCP/IP based computer network. Public web sites: (Internet sites) - Bring the Internet to your site --> establish a connection between your organization and the Internet For example, set a link to the Internet via an Internet Server provider (ISP) - Take your site to Internet --> place your web site at a remote location where there is an Internet connection in place. Often this remote location is on a computer maintained by an Internet service provider.
23 Steps to Creating a Web Site Pros and Cons of setting up a web server in-house: Advantages: - You have complete control over it. - You can choose hardware and software, set up access control and security. - You are free to write server scripts interacting with other systems. Disadvantages: - You need to connect to Internet. - You need to find a administrator to maintain the server. Pros and Cons of Having your web site hosted by your service provider. Advantages: - You don t need to worry about hardware and network. - You got high speed leased lines from the ISP provider. - You may get free training. Disadvantages: - You have to administer it remotely using tools such as FTP. - You give up the ability to integrate your web site with other systems. - You may have limitation to write server scripts.
24 Steps to Creating a Web Site Finding an ISP: There are hundreds of ISPs. - Large ones usually provide better connections. - Small ones usually provide better prices and serverices. Check the list of ISPs in your area through Yahoo: Ask questions: Speed? Cost? And - Will you be able to configure the Web server and install server scripts? - If they offer several virtual sites on a single server? - Can you switch vendors or upgrade server software?
25 Steps to Creating a Web Site Max. Web Traffic for Various Speeds of Internet Link: Network Speed Connection/Minute 1 kb 10 kb 25 kb 56 kbps kbps kbps ,544 kbps
26 Steps to Creating a Web Site Rough Cost on an Internet Connection: Conn Speed (kbps) EQ Costs ML Fees ISP charge ISDN $300-$1000 $100-$1000 $100 -$500 Switched $1200-$2000 $100-$200 $300-$600 FrameRelay $1000-$1500 $125-$1000 $300-$1500 Fractional T $1000-$2000 $100-$1000 $300-$1000 T $1000-$2000 $500-$2000 $1500-$2500 T $1000-$2000 $2000-$4000 $2000-$4000
27 Steps to Creating a Web Site Steps: - Choose good domain name - Choose the server hardware and OS - Select and install server software - Write your site s web pages - Enhance your site with scripts and applets - Allocate responsibility - Web Administrator - Web Author - Web Script Developer - Web Master - Publicize your site - add your URL address to large sites, such asyahho, AltaVista...
The World Wide Web: History
The World Wide Web: History - March, 1989, Tim Berners-Lee of Geneva s European Particle Physics Laboratory (CERN) circulated a proposal to develop a hypertext system for global information sharing in
Introduction to Web Technology. Content of the course. What is the Internet? Diana Inkpen
Introduction to Web Technology Content of the course Diana Inkpen The Internet and the WWW. Internet Connectivity. Basic Internet Services. University of Ottawa School of Information Technology and Engineering
Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols
E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and
Unit- I Introduction and Web Development Strategies
Introduction to Web Technology 1 (ECS-604) Unit- I Introduction and Web Development Strategies 1. World Wide Web: The World Wide Web is a system of interlinked hypertext documents accessed via the Internet.
SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet
SWE 444 Internet and Web Application Development Introduction to Web Technology Dr. Ahmed Youssef Internet It is a network of networks connected and communicating using TCP/IP communication protocol 2
Technology/Internet Usage Workshop
Technology/Internet Usage Workshop 1) Workshop Goals (1 st Slide) 2) Computers Desk Top (Show examples) Lap-Top Hand-held Wireless Device Introduce Tammy Welsh from Gateway 3) What is the Internet? The
Internet Concepts. What is a Network?
Internet Concepts Network, Protocol Client/server model TCP/IP Internet Addressing Development of the Global Internet Autumn 2004 Trinity College, Dublin 1 What is a Network? A group of two or more devices,
CITS1231 Web Technologies. Client, Server, the Internet, and the Web
CITS1231 Web Technologies Client, Server, the Internet, and the Web Topic Outline How does the Internet work Client Server Architecture Connections Communications Protocols Addressing Routing One of the
Introduction to LAN/WAN. Application Layer (Part II)
Introduction to LAN/WAN Application Layer (Part II) Application Layer Topics Domain Name System (DNS) (7.1) Electronic Mail (Email) (7.2) World Wide Web (WWW) (7.3) Electronic Mail (Email) Mostly used
CISC 1600 Introduction to Multi-media Computing
CISC 1600 Introduction to Multi-media Computing Spring 2012 Instructor : J. Raphael Email Address: Course Page: Class Hours: [email protected] http://www.sci.brooklyn.cuny.edu/~raphael/cisc1600.html
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:
1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the
Web Hosting. Definition. Overview. Topics. 1. Overview of the Web
Web Hosting Definition The World Wide Web (WWW), a web of worldwide servers connected to the Internet, provides an easily used and understood method of accessing electronic content. Accessing information
Basic Internet programming Formalities. Hands-on tools for internet programming
Welcome Basic Internet programming Formalities Hands-on tools for internet programming DD1335 (gruint10) Serafim Dahl [email protected] DD1335 (Lecture 1) Basic Internet Programming Spring 2010 1 / 23
Connecting with Computer Science, 2e. Chapter 5 The Internet
Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar
MMGD0204 Web Application Technologies. Chapter 1 Introduction to Internet
MMGD0204 Application Technologies Chapter 1 Introduction to Internet Chapter 1 Introduction to Internet What is The Internet? The Internet is a global connection of computers. These computers are connected
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d.
C H A P T E R 7 The Internet, Intranets, and Extranets What is the Internet Millions of computers, all linked together on a computer network. A home computer usually links to the Internet using a phone
OS/390 Firewall Technology Overview
OS/390 Firewall Technology Overview Mary Sweat E - Mail: [email protected] Washington System Center OS/390 Firewall/VPN 1 Agenda OS/390 Firewall OS/390 Firewall Features Hardware requirements Software
How To Understand The History Of The Web (Web)
(World Wide) Web WWW A way to connect computers that provide information (servers) with computers that ask for it (clients like you and me) uses the Internet, but it's not the same as the Internet URL
Internet. Internet is the network of networks i.e. a global network which make WWW (world wide web) Seema Sirpal Delhi University Computer Centre
Internet Internet is the network of networks i.e. a global network which make WWW (world wide web) Seema Sirpal Delhi University Computer Centre Birth of the Net The Internet grew out of an experiment
Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
1 Introduction: Network Applications
1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video
Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition
Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts
1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?
Questions 1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? 4. When will a TCP process resend a segment? CP476 Internet
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
Application Layer -1- Network Tools
EITF25 Internet: Technology and Applications Application Layer -1- Network Tools 2015, Lecture 08 Kaan Bür Previously on EITF25 Addressing above IP Ports, sockets Process-to-process delivery Transport
By : Khalid Alfalqi Department of Computer Science, Umm Al-Qura University
By : Khalid Alfalqi Department of Computer Science, Umm Al-Qura University History of Web History of the Internet Basic Web System Architecture URL DNS Creating Static and Dynamic Information Security
Lesson Overview. Getting Started. The Internet WWW
Lesson Overview Getting Started Learning Web Design: Chapter 1 and Chapter 2 What is the Internet? History of the Internet Anatomy of a Web Page What is the Web Made Of? Careers in Web Development Web-Related
Masters of Science in Information Technology
Objective: At the end of this module, you must be able to 1. Establish a basic understanding of the Internet 2. Understand the Internet's evolution What is Internet? Internet is a vast collection of different
The Internet. Chapter 10. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:
The Internet Chapter 10 Learning Objectives After reading this chapter, you should be able to: Discuss the responsibilities of the Internet Protocol (IP) and how IP can be used to create a connection between
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
Detailed Table of Contents
Detailed Table of Contents Foreword Preface 1. Networking Protocols and OSI Model 1 1.1 Protocols in Computer Communications 3 1.2 The OSI Model 7 1.3 OSI Layer Functions 11 Summary 19 Key Terms and Concepts
World Wide Web. Before WWW
World Wide Web [email protected] Before WWW Major search tools: Gopher and Archie Archie Search FTP archives indexes Filename based queries Gopher Friendly interface Menu driven queries João Neves 2
Computer networks, data communication and Internet
**** 1 Computer networks, data communication and Internet Introduction **** Computer networks: summary 2 The following gives an overview of computer networks and data communication:»the basic principles»local
Advanced Higher Computing. Computer Networks. Homework Sheets
Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).
1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).
CA106 Web Design. Dr. Dónal Fitzpatrick, School of Computing Room l2.48, Extension 8929, [email protected]
CA106 Web Design Dr. Dónal Fitzpatrick, School of Computing Room l2.48, Extension 8929, [email protected] History of the Internet Terminals attached to mainframe computer From mid 1960 s packet-switching
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Networking Basics and Network Security
Why do we need networks? Networking Basics and Network Security Shared Data and Functions Availability Performance, Load Balancing What is needed for a network? ISO 7-Layer Model Physical Connection Wired:
Web Development. Owen Sacco. ICS2205/ICS2230 Web Intelligence
Web Development Owen Sacco ICS2205/ICS2230 Web Intelligence Brief Course Overview An introduction to Web development Server-side Scripting Web Servers PHP Client-side Scripting HTML & CSS JavaScript &
Fachgebiet Technische Informatik, Joachim Zumbrägel
Computer Network Lab 2015 Fachgebiet Technische Informatik, Joachim Zumbrägel Overview Internet Internet Protocols Fundamentals about HTTP Communication HTTP-Server, mode of operation Static/Dynamic Webpages
Internet and its Application in Libraries
Internet and its Application in Libraries National Centre for Science Information (NCSI) Indian Institute of Science Bangalore 560 012 (E-Mail: [email protected]) Contents What is Internet? How does
SSL VPN Portal Options
1. ProSecure UTM Quick Start Guide This quick start guide describes how to use the SSL VPN Wizard to configure SSL VPN portals on the ProSecure Unified Threat Management (UTM) Appliance. The Secure Sockets
lesson 19 Internet Basics
lesson 19 Internet Basics This lesson includes the following sections: The Internet: Then and Now How the Internet Works Major Features of the Internet Online Services Internet Features in Application
Device Log Export ENGLISH
Figure 14: Topic Selection Page Device Log Export This option allows you to export device logs in three ways: by E-Mail, FTP, or HTTP. Each method is described in the following sections. NOTE: If the E-Mail,
Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1
Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....
Sage ERP Accpac Online
Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac
Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP Abstract Message Format. The Client/Server model is used:
Evolution of the WWW Communication in the WWW World Wide Web (WWW) Access to linked documents, which are distributed over several computers in the History of the WWW Origin 1989 in the nuclear research
z/os Firewall Technology Overview
z/os Firewall Technology Overview Mary Sweat E - Mail: [email protected] Washington System Center OS/390 Firewall/VPN 1 Firewall Technologies Tools Included with the OS/390 Security Server Configuration
Chapter 10 Troubleshooting
Chapter 10 Troubleshooting This chapter provides troubleshooting tips and information for your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. After each problem description, instructions are provided
21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
2. Ethernet is a means of implementing which of the following network topologies?
Test Bank Chapter Four (Networks and the Internet) Multiple Choice Questions 1. Which of the following is not a way of classifying networks? A. WAN versus LAN B. Closed versus open C. Router versus bridge
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs
Architecture Design For Web-based Application Systems. Instructor: Dr. Jerry Gao Class: CMPE296U
Architecture Design For Web-based Application Systems Instructor: Dr. Jerry Gao Class: CMPE296U Architecture Design For Web-Based Application Systems - (1994-1995) Hypertext Web Systems: Graphic Web Browsers
Network support for tele-education
Network support for tele-education Aiko Pras Centre for Telematics and Information Technology University of Twente (UT) http://wwwtios.cs.utwente.nl/~pras This paper discusses the state of the art in networking,
83-10-41 Types of Firewalls E. Eugene Schultz Payoff
83-10-41 Types of Firewalls E. Eugene Schultz Payoff Firewalls are an excellent security mechanism to protect networks from intruders, and they can establish a relatively secure barrier between a system
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
CHAPTER 9: THE EVOLVING INTERNET
CHAPTER 9: THE EVOLVING INTERNET Multiple Choice: 1. What was the department of the U.S. government that developed the initial stages of the Internet? A. Department of Commerce B. Department of Defense
Overview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
Internet and Services
3 Internet and Services 3.1 INTRODUCTION The Internet began way back in 1969 when it was called ARPANet (Advanced Research Project Agency Network) and was used exclusively for military purposes. It soon
The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.
Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person
Why your own server space? Why should you set it up?
Lab 5 servers Why your own server space? Why should you set it up? -Control factors -Demystifying how things get on the internet -Project from start to finish What is the Difference Between a Digital Art
Cisco Configuring Commonly Used IP ACLs
Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow
Lecture 2. Internet: who talks with whom?
Lecture 2. Internet: who talks with whom? An application layer view, with particular attention to the World Wide Web Basic scenario Internet Client (local PC) Server (remote host) Client wants to retrieve
Computer Networks/DV2 Lab
Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced
Chapter 4: Networking and the Internet
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals
GUIDE TO WEBSITES AND E-COMMERCE
GUIDE TO WEBSITES AND E-COMMERCE Version 1.0, 26-Sept-01 This document is available from www.webcentro.com.au 2001, WebCentro WebCentro Guide To Websites And E-commerce CONTENTS 1. What is a Website? 1
http://alice.teaparty.wonderland.com:23054/dormouse/bio.htm
Client/Server paradigm As we know, the World Wide Web is accessed thru the use of a Web Browser, more technically known as a Web Client. 1 A Web Client makes requests of a Web Server 2, which is software
TCP/IP Protocol Suite. Marshal Miller Chris Chase
TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets
Computer Networks/DV2 Lab
Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://ti.uni-due.de/ti/en/education/teaching/ss13/netlab Equipment for each group: - 1 Server computer (OS: Windows Server 2008 Standard)
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
Protecting a Private Network: The AltaVista Firewall
Protecting a Private Network: The AltaVista Firewall J. Mark Smith Sean G. Doherty Oliver J. Leahy Dermot M. Tynan Connecting an organization s private network to the Internet offers many advantages but
Chapter NET 2 What is the Internet? Internet Development Primary Internet Protocol
Chapter NET 2 INTRODUCTION TO THE INTERNET AND WORLD WIDE WEB Before the 90 s the Internet was the domain of the computer industry, universities, and the government. Today there are many people that are
OS/390 Firewall Technology Overview
OS/390 Firewall Technology Overview Washington System Center Mary Sweat E - Mail: [email protected] Agenda Basic Firewall strategies and design Hardware requirements Software requirements Components of
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Intranet, Extranet, Firewall
Indian Institute of Technology Kharagpur Intranet, Extranet, Firewall Prof. Indranil Sen Gupta Dept. of Computer Science & Engg. I.I.T. Kharagpur, INDIA Lecture 31: Intranet, Extranet, Firewall On completion,
Chapter 27 Hypertext Transfer Protocol
Chapter 27 Hypertext Transfer Protocol Columbus, OH 43210 [email protected] http://www.cis.ohio-state.edu/~jain/ 27-1 Overview Hypertext language and protocol HTTP messages Browser architecture CGI
World-Wide Web = WWW. The World-Wide Web: summary
**** 1 World-Wide Web = WWW Introduction The World-Wide Web: summary 2 The following gives an overview of the World-Wide Web: 1. Introduction: Description / definition of the WWW and its relation with
Mathatma Gandhi University
Mathatma Gandhi University BSc Computer Science IV th semester BCS 402 Computer Network &Internet MULTIPLE CHOICE QUESTIONS 1. The computer network is A) Network computer with cable B) Network computer
Internet Security Firewalls
Overview Internet Security Firewalls Ozalp Babaoglu! Exo-structures " Firewalls " Virtual Private Networks! Cryptography-based technologies " IPSec " Secure Socket Layer ALMA MATER STUDIORUM UNIVERSITA
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
Objectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt 1 Lecture 10: Application Layer 2 Application Layer Where our applications are running Using services provided by
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: [email protected] ABSTRACT Internet security
Fundamentals of the Internet 2009/10. 1. Explain meaning the following networking terminologies:
Fundamentals of Internet Tutorial Questions (2009) 1. Explain meaning the following networking terminologies: Client/server networking, Coax, twisted pair, protocol, Bit, Byte, Kbps, KBps, MB, KB, MBps,
Firewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
Proxy Server, Network Address Translator, Firewall. Proxy Server
Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as
CONTENT of this CHAPTER
CONTENT of this CHAPTER v DNS v HTTP and WWW v EMAIL v SNMP 3.2.1 WWW and HTTP: Basic Concepts With a browser you can request for remote resource (e.g. an HTML file) Web server replies to queries (e.g.
The OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
