0% found this document useful (0 votes)
56 views

IT Applications in ET: Session 6 Dr. Devendra Kumar Punia

The Internet is a network of networks, connecting tens of thousands of networks. IPv4 is still widely used, but over the next few years, the IPv4 32-bit address will be replaced with the IPv6 128-bit address. Internet2 is an outcome of collaborative efforts to address the increasing need for greater bandwidth.

Uploaded by

Nidhi Singh
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views

IT Applications in ET: Session 6 Dr. Devendra Kumar Punia

The Internet is a network of networks, connecting tens of thousands of networks. IPv4 is still widely used, but over the next few years, the IPv4 32-bit address will be replaced with the IPv6 128-bit address. Internet2 is an outcome of collaborative efforts to address the increasing need for greater bandwidth.

Uploaded by

Nidhi Singh
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 45

IT Applications in ET

Session 6 Dr. Devendra Kumar Punia [email protected]

The Internet

The Internet is a network of networks. Today, the Internet connects tens of thousands of networks and millions of computer 1990: 3000 networks ( 200,000 users.) 1992: 992,000 hosts. Present: millions of networks, computers, and users.

The Internet

TCP / IP Protocol

Peer to Peer networking

Node to Node delivery

Exchange using Internet

Summary of layers functions

Naming and Addressing

Uniquely identify processes in different computers for communications.


IP address Domain name Port number MAC address

IP Address
Each host interface in the Internet has a unique IP address. IPv4, 32 bits, dotted-decimal notation

IPv6, 128-bit address

IP version (IPv6)

IP version 6 (IPv6) has been developed to extend source and destination addresses and provide a mechanism to add new operations with built-in security Although IPv4 is still widely used, over the next few years, the IPv4 32-bit address will be replaced with the IPv6 128-bit address Slow adoption of IPv6 is attributed to the enormous difficulty in changing network-layer protocols

Domain Name

Identify a host User friendly Hierarchically organized Domain Name System (DNS): resolves a domain name to the corresponding IP address.

DNS servers and the domain name database Name caching DNS query and reply

The Domain Name Space

Port Number
Address for the application layer user process. Port Number field in TCP or UDP header. Well-known port numbers

1 to 255: Internet wide services 256 to 1023: preserved for Unix specific services 1024 and up: ephemeral port numbers

MAC address

used to get datagram from one interface to another physically-connected interface (same network) 48 bit MAC address (for most LANs) burned in the adapter ROM MAC address allocation administered by IEEE Manufacturers buy portion of MAC address space (to assure uniqueness) Each adapter has a unique MAC address

Internet2

Internet2 is an outcome of collaborative efforts to address the increasing need for greater bandwidth and sustaining a cuttingedge network capability I2 helps to alleviate traffic jams through the creation of a limited number of regional hubs, called Giga-POPs, which serve as access points for high-performance networks

Intranet & Extranet

Intranet

A LAN that uses the Internet technologies within an organization Open only those inside the organization Example: insurance related information provided to employees over an intranet

Extranet

A LAN that uses the Internet technologies across an organization including some external constituents Open only those invited users outside the organization Accessible through the Internet Example: Suppliers and customers accessing inventory information in a company over an extranet

Converged Networks

Converged Data/Voice networks

Application of voice digitization and compression techniques to enable voice transmission over networks originally developed to transport data

Characteristics of Converged Data/Voice Networks


Low delay, Echo cancellation, Latency and Jitter for voice Call-completion ratio Intelligent network services like AA, caller ID, hunt groups Interface with standard telephone sets Handle megabit data streams for video Low error rates for data Strong security for mission-critical data

Voice over IP (VoIP)

VoIP is transmitting telephone calls over the Internet rather than through the traditional telephone system

PSTN and IP Internetworking

Assured Quality Routing (AQR) marries packet and circuit switching to automatically reroute calls to the PSTN when parameters do not meet accepted ranges

VoIP Call Process VoIP QoS

Jitter buffer discards and bursts (varying periods of packet loss), are concealed by PLC-enabled vocoders

Virtual Private Network (VPN)

VPNs are encrypted tunnels through a shared private or public network, and are very cost-effective as compared to dedicated or leased lines.

Tunneling is the process of encrypting and then encapsulating the outgoing information in IP packets for transit across the Internet and reversing the process at the receiving end. Encryption involves scrambling of data by use of a mathematical algorithm.

VPN Tunnels and Protocols

LAN-to-LAN or site-to-site tunnels

Client-to-LAN tunnels

Usually corporate environments, where users on either LAN can use the tunnel transparently to communicate with one another Need to be set up, so the client must run special software to initiate the creation of a tunnel and then exchange traffic with the corporate network

Virtual Private LAN Service (VPLS)

VPN Protocols

A class of VPN that connects multiple sites over a managed IP/MPLS network to form a single bridged domain
Leading protocols are: PPTP, L2TP, and IPSec

World Wide Web (WWW or W3)


It is different from Internet, it is an application running on the Internet It is a collection of interconnected documents and other resources, linked by hyperlinks and URLs

Hyper Text Transfer Protocol (HTTP)

This is the Webs application protocol, operates on the clientServer model. The client and server executing on different endsystems communicate using HTTP messages. Also a HTTP dialogue may be concerned with transferring several files associated with a particular web page. Generally a base HTML file and the files relating to several referenced objects. Uniform Resource Locator protocol (http, ftp, news) host name (name.domain name) port (usually 80) directory path to the resource resource name http://mail.yahoo.com/

Web trends

From communities to networked structures From centrally defined content and static pages to user driven content (Blogs, Wikis, Flickr, Wikipedia) democratisation of Knowledge Web 2.0 either empowers the individual and provides an outlet for the 'voice of the voiceless'; or it elevates the amateur to the detriment of professionalism, expertise and clarity. Potential Democratisation, de-centralisation and anarchy back to the future the original idea of the Internet e.g. Creative Commons alternative copyright licences, The Open Source Movement Distribution, Aggregation and tagging of various media and content from hierarchical directories and central ownership to distributed, user driven folksonomies and media aggregation From consumers to producers: a recent study from PEW internet research concluded that 57% of American teens are producing content for the web of various nature (blogs, fan-fiction etc.)

Web 1.0 v/s Web 2.0

Static Brochureware Personal web site Britannica Online Directories (taxonomy) Bookmarking sites

Dynamic Customisation Blog Wikipedia Tagging (folksonomy) Social bookmarking

Web 2.0

Web 2.0 refers to a perceived second generation of web development & design, that facilitates communication, secure information sharing, interoperability, and collaboration on the World Wide Web.
http://en.wikipedia.org/wiki/Web_2.0

Business embracing the web as a platform and using its strengths (Tim OReilly) Building applications and services around the unique features of the Internet

Web 2.0
Architecture of participation where users can contribute website content The reciprocity between the user and the provider is emphasized (Stephen Fry) The philosophy of mutually maximizing collective intelligence and added value for each participant by formalized and dynamic information sharing and creation (Hgg, Meckel,

Stanoevska-Slabeva, Martignoni)

Web 2.0

Characteristics

Active user participation Rich user experience Dynamic, often user-generated content Meta data and Web standards Scalability

Web 2.0

Features SLATES

(Andrew McAfee)

Search

Links

The ease of finding information through keyword search.

Authoring

Ad-hoc guides to other relevant information.


The ability to create constantly updating content. In wikis, the content is iterative in the sense that users undo and redo each other's work. In blogs, content is cumulative in that posts and comments of individuals are accumulated over time. Categorization of content by creating tags: simple, one-word user-determined descriptions to facilitate searching and avoid rigid, pre-made categories.

Tags

Extensions

Signals

Powerful algorithms that leverage the Web as an application platform as well as a document server.
The use of RSS technology to rapidly notify users of content changes

Web 2.0

Applications

Forums (phpBB) Blogs (Wordpress, Blogger) Wikis (MediaWiki) Social networks (Facebook, Myspace, Orkut, LinkedIn) Social search (Digg, Del.icio.us, Furl) Multimedia sharing (YouTube, Picassa, Flickr) Virtual worlds (SecondLife) Syndication feeds (Atom, RSS) Mashups XHTML, XML, CSS, Ajax, Microformats

Middleware

Technologies

Forums
Older than Internet (BBS) Unstructured free-form discussion Any-to-any conversation Usually focuses on short-term issues High noise-to-content ratio Rarely results in usable content

Risks: flame wars, Internet trolls

Blogs (weB Logs)


Initial idea: online personal diaries One-to-many communication, readers participate through comments to blog posts Social networking through trackbacks Currently also used for:

Media news and commentaries (replacing traditional media) Independent product analysis and review Corporate news Event announcements Education Any content with simple structure

Advantage: Simple publishing mechanism

Wikis

The ultimate collaboration tool Content is user-generated Users can edit/adapt the content (sometimes based on access rights) History of all changes is kept to prevent information loss and vandalism Usages: Encyclopedias, Knowledge databases Risks: Information is only as reliable as its authors Sometimes you cant check the authors credentials Unless used in closed group needs constant monitoring

Social networks LinkedIn.com


Targeted at professionals Build your connections from classmates, friends, colleagues, coworkers and business partners Personal use:

Get back in touch with friends/colleagues Get recommendations for your work Apply for job offers Find informal contacts with people you need Get answers and opinions from your peers Keep track of former employees / partners Informal human resources tool Recruiting/job offers

Business use:

Folksonomies

Keywords, tags, metadata Created by groups/communities who are the resource users Feedback loop is key Used for bookmarking, Images, video and sound, other areas (events, goals, colours etc.) Many flaws in the approach (ambiguity, searching etc.) Many potential benefits (cheap and extendable, added value metadata etc.) Implications include shift in metadata creation, trigger for communication, snap shot of current world, spam Library use, IT services use shared resources

Factors contributing to rise of Web 2.0


Social Business Technology

Social factors

Spread of Broadband

Increasingly ubiquitous connections Living on the web Social networking; blogging; instant messenger

A generation of web natives


Create, not just consume Some hard lessons about data ownership

Dont steal my data; dont lock me in

Business factors

Exploit the Long Tail

At internet scale even niche communities are very large No need to own the user interface. It's your data that they want Harnessing collective intelligence of users Review and Recommend; Social Bookmarking; Folksonomies

Success of web services

Users can enrich your data


Technology factors

The Power of XML

Easier to exchange and process application independent data Incrementally developer your product; short release cycles Continually adapt to user needs The Perpetual Beta

Agile Engineering

Maturation of the browser


XHTML, DOM, CSS, Javascript Browser as platform, not just document viewer

Enterprise 2.0
Social software used in "enterprise (business) contexts Includes social and networked modifications to company intranets and other classic software platforms used by large companies to organize their communication In contrast to traditional enterprise software, which imposes structure prior to use, this generation of software tends to encourage use prior to providing structure.

Enterprise 1.0 v/s Enterprise 2.0


Hierarchy Friction Bureaucracy Inflexibility IT-driven technology/ Lack of user control Top down Centralized Teams are in one building/ one time zone Silos and boundaries Need to know Information systems are structured and dictated Taxonomies Overly complex Closed/ proprietary standards Scheduled Long time-to-market cycles Flat Organization Ease of Organization Flow Agility Flexibility User-driven technology Bottom up Distributed Teams are global Fuzzy boundaries, open borders Transparency Information systems are emergent Folksonomies Simple Open On Demand Short time-to-market cycles

Social computing

Social Networking: Keeping your contacts online trough a web interface with a useful representation of them. Social Calendaring: Shared agendas for events arrangement and meetings planning. Social Bookmarking: Your links and references to different kinds of resources live online. Social Tagging (Folksonomies): An unintentional, collective effort of categorizing the Web, with added social significance. Socialware: del.icio.us, de.lirio.us, BlogMarks, Wists, LinkedIn, eConozco, Orkut, 43Things, flickr...

always in permanent beta offering open APIs keeping certain level of hackability as an enabler for improving USER INNOVATION

Social computing

Its not about technology: the addition of human (social) significance to our online interactions is driving the emergence of a real (cyber) social environment, that extends seamlessly to the real world. Its about people and their social (networking) activity going online to be expanded and amplified by network effects, and the viral nature of the information flowing through the Internet. Its about social networks which we are getting linked to, making The Network itself more social (humane). Although we can not forget about technology and the Digital Universal Network that is in the background being the Internet its most visible component - supporting the Web 2.0 emergence, and keeping the user innovation pace.

Reference URLs

http://delicious.com/ http://digg.com/search?s=e-commerce http://www.wikipedia.org/ http://agropedia.iitk.ac.in/ http://www.merawindows.com/AboutUs.aspx http://technet.microsoft.com/hi-in/default.aspx http://www.cisco.com/web/IN/support/index.html http://advocatekhoj.com/ http://www.google.co.in/intl/en/options/ http://broadbandforum.in/ http://www.ciol.com/ http://www.lead.timesofindia.com/ http://www.indiatimes.com/

Thanks

You might also like