IT Applications in ET: Session 6 Dr. Devendra Kumar Punia
IT Applications in ET: Session 6 Dr. Devendra Kumar Punia
The Internet
The Internet is a network of networks. Today, the Internet connects tens of thousands of networks and millions of computer 1990: 3000 networks ( 200,000 users.) 1992: 992,000 hosts. Present: millions of networks, computers, and users.
The Internet
TCP / IP Protocol
IP Address
Each host interface in the Internet has a unique IP address. IPv4, 32 bits, dotted-decimal notation
IP version (IPv6)
IP version 6 (IPv6) has been developed to extend source and destination addresses and provide a mechanism to add new operations with built-in security Although IPv4 is still widely used, over the next few years, the IPv4 32-bit address will be replaced with the IPv6 128-bit address Slow adoption of IPv6 is attributed to the enormous difficulty in changing network-layer protocols
Domain Name
Identify a host User friendly Hierarchically organized Domain Name System (DNS): resolves a domain name to the corresponding IP address.
DNS servers and the domain name database Name caching DNS query and reply
Port Number
Address for the application layer user process. Port Number field in TCP or UDP header. Well-known port numbers
1 to 255: Internet wide services 256 to 1023: preserved for Unix specific services 1024 and up: ephemeral port numbers
MAC address
used to get datagram from one interface to another physically-connected interface (same network) 48 bit MAC address (for most LANs) burned in the adapter ROM MAC address allocation administered by IEEE Manufacturers buy portion of MAC address space (to assure uniqueness) Each adapter has a unique MAC address
Internet2
Internet2 is an outcome of collaborative efforts to address the increasing need for greater bandwidth and sustaining a cuttingedge network capability I2 helps to alleviate traffic jams through the creation of a limited number of regional hubs, called Giga-POPs, which serve as access points for high-performance networks
Intranet
A LAN that uses the Internet technologies within an organization Open only those inside the organization Example: insurance related information provided to employees over an intranet
Extranet
A LAN that uses the Internet technologies across an organization including some external constituents Open only those invited users outside the organization Accessible through the Internet Example: Suppliers and customers accessing inventory information in a company over an extranet
Converged Networks
Application of voice digitization and compression techniques to enable voice transmission over networks originally developed to transport data
Low delay, Echo cancellation, Latency and Jitter for voice Call-completion ratio Intelligent network services like AA, caller ID, hunt groups Interface with standard telephone sets Handle megabit data streams for video Low error rates for data Strong security for mission-critical data
VoIP is transmitting telephone calls over the Internet rather than through the traditional telephone system
Assured Quality Routing (AQR) marries packet and circuit switching to automatically reroute calls to the PSTN when parameters do not meet accepted ranges
Jitter buffer discards and bursts (varying periods of packet loss), are concealed by PLC-enabled vocoders
VPNs are encrypted tunnels through a shared private or public network, and are very cost-effective as compared to dedicated or leased lines.
Tunneling is the process of encrypting and then encapsulating the outgoing information in IP packets for transit across the Internet and reversing the process at the receiving end. Encryption involves scrambling of data by use of a mathematical algorithm.
Client-to-LAN tunnels
Usually corporate environments, where users on either LAN can use the tunnel transparently to communicate with one another Need to be set up, so the client must run special software to initiate the creation of a tunnel and then exchange traffic with the corporate network
VPN Protocols
A class of VPN that connects multiple sites over a managed IP/MPLS network to form a single bridged domain
Leading protocols are: PPTP, L2TP, and IPSec
This is the Webs application protocol, operates on the clientServer model. The client and server executing on different endsystems communicate using HTTP messages. Also a HTTP dialogue may be concerned with transferring several files associated with a particular web page. Generally a base HTML file and the files relating to several referenced objects. Uniform Resource Locator protocol (http, ftp, news) host name (name.domain name) port (usually 80) directory path to the resource resource name http://mail.yahoo.com/
Web trends
From communities to networked structures From centrally defined content and static pages to user driven content (Blogs, Wikis, Flickr, Wikipedia) democratisation of Knowledge Web 2.0 either empowers the individual and provides an outlet for the 'voice of the voiceless'; or it elevates the amateur to the detriment of professionalism, expertise and clarity. Potential Democratisation, de-centralisation and anarchy back to the future the original idea of the Internet e.g. Creative Commons alternative copyright licences, The Open Source Movement Distribution, Aggregation and tagging of various media and content from hierarchical directories and central ownership to distributed, user driven folksonomies and media aggregation From consumers to producers: a recent study from PEW internet research concluded that 57% of American teens are producing content for the web of various nature (blogs, fan-fiction etc.)
Static Brochureware Personal web site Britannica Online Directories (taxonomy) Bookmarking sites
Web 2.0
Web 2.0 refers to a perceived second generation of web development & design, that facilitates communication, secure information sharing, interoperability, and collaboration on the World Wide Web.
http://en.wikipedia.org/wiki/Web_2.0
Business embracing the web as a platform and using its strengths (Tim OReilly) Building applications and services around the unique features of the Internet
Web 2.0
Architecture of participation where users can contribute website content The reciprocity between the user and the provider is emphasized (Stephen Fry) The philosophy of mutually maximizing collective intelligence and added value for each participant by formalized and dynamic information sharing and creation (Hgg, Meckel,
Stanoevska-Slabeva, Martignoni)
Web 2.0
Characteristics
Active user participation Rich user experience Dynamic, often user-generated content Meta data and Web standards Scalability
Web 2.0
Features SLATES
(Andrew McAfee)
Search
Links
Authoring
Tags
Extensions
Signals
Powerful algorithms that leverage the Web as an application platform as well as a document server.
The use of RSS technology to rapidly notify users of content changes
Web 2.0
Applications
Forums (phpBB) Blogs (Wordpress, Blogger) Wikis (MediaWiki) Social networks (Facebook, Myspace, Orkut, LinkedIn) Social search (Digg, Del.icio.us, Furl) Multimedia sharing (YouTube, Picassa, Flickr) Virtual worlds (SecondLife) Syndication feeds (Atom, RSS) Mashups XHTML, XML, CSS, Ajax, Microformats
Middleware
Technologies
Forums
Older than Internet (BBS) Unstructured free-form discussion Any-to-any conversation Usually focuses on short-term issues High noise-to-content ratio Rarely results in usable content
Media news and commentaries (replacing traditional media) Independent product analysis and review Corporate news Event announcements Education Any content with simple structure
Wikis
The ultimate collaboration tool Content is user-generated Users can edit/adapt the content (sometimes based on access rights) History of all changes is kept to prevent information loss and vandalism Usages: Encyclopedias, Knowledge databases Risks: Information is only as reliable as its authors Sometimes you cant check the authors credentials Unless used in closed group needs constant monitoring
Targeted at professionals Build your connections from classmates, friends, colleagues, coworkers and business partners Personal use:
Get back in touch with friends/colleagues Get recommendations for your work Apply for job offers Find informal contacts with people you need Get answers and opinions from your peers Keep track of former employees / partners Informal human resources tool Recruiting/job offers
Business use:
Folksonomies
Keywords, tags, metadata Created by groups/communities who are the resource users Feedback loop is key Used for bookmarking, Images, video and sound, other areas (events, goals, colours etc.) Many flaws in the approach (ambiguity, searching etc.) Many potential benefits (cheap and extendable, added value metadata etc.) Implications include shift in metadata creation, trigger for communication, snap shot of current world, spam Library use, IT services use shared resources
Social factors
Spread of Broadband
Increasingly ubiquitous connections Living on the web Social networking; blogging; instant messenger
Create, not just consume Some hard lessons about data ownership
Business factors
At internet scale even niche communities are very large No need to own the user interface. It's your data that they want Harnessing collective intelligence of users Review and Recommend; Social Bookmarking; Folksonomies
Technology factors
Easier to exchange and process application independent data Incrementally developer your product; short release cycles Continually adapt to user needs The Perpetual Beta
Agile Engineering
XHTML, DOM, CSS, Javascript Browser as platform, not just document viewer
Enterprise 2.0
Social software used in "enterprise (business) contexts Includes social and networked modifications to company intranets and other classic software platforms used by large companies to organize their communication In contrast to traditional enterprise software, which imposes structure prior to use, this generation of software tends to encourage use prior to providing structure.
Social computing
Social Networking: Keeping your contacts online trough a web interface with a useful representation of them. Social Calendaring: Shared agendas for events arrangement and meetings planning. Social Bookmarking: Your links and references to different kinds of resources live online. Social Tagging (Folksonomies): An unintentional, collective effort of categorizing the Web, with added social significance. Socialware: del.icio.us, de.lirio.us, BlogMarks, Wists, LinkedIn, eConozco, Orkut, 43Things, flickr...
always in permanent beta offering open APIs keeping certain level of hackability as an enabler for improving USER INNOVATION
Social computing
Its not about technology: the addition of human (social) significance to our online interactions is driving the emergence of a real (cyber) social environment, that extends seamlessly to the real world. Its about people and their social (networking) activity going online to be expanded and amplified by network effects, and the viral nature of the information flowing through the Internet. Its about social networks which we are getting linked to, making The Network itself more social (humane). Although we can not forget about technology and the Digital Universal Network that is in the background being the Internet its most visible component - supporting the Web 2.0 emergence, and keeping the user innovation pace.
Reference URLs
http://delicious.com/ http://digg.com/search?s=e-commerce http://www.wikipedia.org/ http://agropedia.iitk.ac.in/ http://www.merawindows.com/AboutUs.aspx http://technet.microsoft.com/hi-in/default.aspx http://www.cisco.com/web/IN/support/index.html http://advocatekhoj.com/ http://www.google.co.in/intl/en/options/ http://broadbandforum.in/ http://www.ciol.com/ http://www.lead.timesofindia.com/ http://www.indiatimes.com/
Thanks