Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Types of Networks
There are several different types of computer networks. Computer networks can be characterized by their size as well as their purpose.
The size of a network can be expressed by the geographic area they occupy and the number of computers that are part of the network.
Networks can cover anything from a handful of devices within a single room to millions of devices spread across the entire globe.
Some of the different networks based on size are:
Personal area network, or PAN
Local area network, or LAN
Metropolitan area network, or MAN
Wide area network, or WAN
In terms of purpose, many networks can be considered general purpose, which means they are used for everything from sending files
to a printer to accessing the Internet. Some types of networks, however, serve a very particular purpose. Some of the different
networks based on their main purpose are:
Storage area network, or SAN
Enterprise private network, or EPN
Virtual private network, or VPN
Personal Area Network
A personal area network, or PAN, is a computer network organized around an individual person within a single building. This could
be inside a small office or residence. A typical PAN would include one or more computers, telephones, peripheral devices, video game
consoles and other personal entertainment devices.
Local Area Network
A local area network, or LAN, consists of a computer network at a single site, typically an individual office building. A LAN is very
useful for sharing resources, such as data storage and printers. LANs can be built with relatively inexpensive hardware, such as hubs,
network adapters and Ethernet cables.
Metropolitan Area Network
A metropolitan area network, or MAN, consists of a computer network across an entire city, college campus or small region. A MAN
is larger than a LAN, which is typically limited to a single building or site. Depending on the configuration, this type of network can
cover an area from several miles to tens of miles. A MAN is often used to connect several LANs together to form a bigger network.
When this type of network is specifically designed for a college campus, it is sometimes referred to as a campus area network, or
CAN.
Wide Area Network
A wide area network, or WAN, occupies a very large area, such as an entire country or the entire world. A WAN can contain multiple
smaller networks, such as LANs or MANs. The Internet is the best-known example of a public WAN.
Private Networks
One of the benefits of networks like PAN and LAN is that they can be kept entirely private by restricting some communications to the
connections within the network. This means that those communications never go over the Internet.
Define Internet
A means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers. When
two computers are connected over the Internet, they can send and receive all kinds of information such as text, graphics, voice, video,
and computer programs.
The Internet grew out of the Advanced Research Projects Agency's Wide Area Network (then called ARPANET)established by the US
Department Of Defence in 1960s for collaboration in military research among business and government laboratories.
Later universities and other US institutions connected to it. This resulted in ARPANET growing beyond everyone's
expectations and acquiring the name Internet.
Internet Protocol
Developed during the 1970s, Internet Protocol (IP) is the fundamental network protocol used across the Internet, home
networks and business networks. Internet Protocol is often used together with the Transport Control Protocol (TCP) and referred to
interchangeably as both IP and TCP/IP.
The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet. Each
computer (known as a host) on the Internet has at least one IP address that uniquely identifies it from all other computers on the
Internet.
When you send or receive data (for example, an e-mail note or a Web page), the message gets divided into little chunks called packets.
Each of these packets contains both the sender's Internet address and the receiver's address. Any packet is sent first to
a gateway computer that understands a small part of the Internet. The gateway computer reads the destination address and forwards
the packet to an adjacent gateway that in turn reads the destination address and so forth across the Internet until one gateway
recognizes the packet as belonging to a computer within its immediate neighbourhood or domain. That gateway then forwards the
packet directly to the computer whose address is specified.
Because a message is divided into a number of packets, each packet can, if necessary, be sent by a different route across the Internet.
Packets can arrive in a different order than the order they were sent in. The Internet Protocol just delivers them. It's up to another
protocol, the Transmission Control Protocol (TCP) to put them back in the right order.
Internet address
An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in
a computer network that uses the Internet Protocol for communication.[
An IP address serves two principal functions:
host or network interface identification and
Location addressing.
An IP address consists of four numbers, each of which contains one to three digits, with a single dot (.) separating each number or set
of digits. Each of the four numbers can range from 0 to 255.
Here's an example of what an IP address might look like: 78.125.0.209.
IP addresses can be either static or dynamic.
Static IP addresses never change. They serve as a permanent Internet address and provide a simple and reliable way for remote
computers to contact you. Static IP addresses reveal such information as the continent, country, region, and city in which a computer
is located; the ISP (Internet Service Provider) that services that particular computer.
Dynamic IP addresses are temporary and are assigned each time a computer accesses the Internet. They are, in effect, borrowed from
a pool of IP addresses that are shared among various computers. Since a limited number of static IP addresses are available, many
ISPs reserve a portion of their assigned addresses for sharing among their subscribers in this way. This lowers costs and allows them
to service far more subscribers than they otherwise could.
The IP address structure is divided into five address classes:
Class A, Class B, ClassC, Class D and Class E
Class A addresses always have the first bit of their IP addresses set to 0. Since Class A networks have an 8-bit network mask, the
use of a leading zero leaves only 7 bits for the network portion of the address, allowing for a maximum of 128 possible network
numbers, ranging from 0.0.0.0 127.0.0.0. Number 127.x.x.x is reserved for loopback, used for internal testing on the local machine.
Class B addresses always have the first bit set to 1 and their second bit set to 0. Since Class B addresses have a 16-bit network
mask, the use of a leading 10 bit-pattern leaves 14 bits for the network portion of the address, allowing for a maximum of 16,384
networks, ranging from 128.0.0.0 181.255.0.0.
Class C addresses have their first two bits set to 1 and their third bit set to 0. Since Class C addresses have a 24-bit network
mask, this leaves 21 bits for the network portion of the address, allowing for a maximum of 2,097,152 network addresses, ranging
from 192.0.0.0 223.255.255.0.
Class D addresses are used for multicasting applications. Class D addresses have their first three bits set to 1 and their fourth bit set
to 0. Class D addresses are 32-bit network addresses, meaning that all the values within the range of 224.0.0.0 239.255.255.255
are used to uniquely identify multicast groups. There are no host addresses within the Class D address space, since all the hosts within
a group share the groups IP address for receiver purposes.
Class E addresses are defined as experimental and are reserved for future testing purposes. They have never been documented or
utilized in a standard way.
users to access Internet services, such as email and the World Wide Web. Internet service providers (ISPs) offer Internet access
through various technologies that offer a wide range of data signaling rates (speeds).
Consumer use of the Internet first became popular through dial-up Internet access in the 1990s. By the first decade of the 21st century,
many consumers in developed nations used faster, broadband Internet access technologies. As of 2014, broadband was ubiquitous
around the world, with a global average connection speed exceeding 4 Mbit/s.
Internet Applications
We can roughly separate internet applications into the following types: media, information search, communications, communities,
entertainment, e-business, finance and other applications.
The internet is treated as one of the biggest invention. It has a large number of uses..
1. Communication
2. Job searches
3. Finding books and study material
4. Health and medicine
5. Travel
6. Entertainment
7. Shopping
8. Stock market updates
9. Research
10. Business use of internet: There are different ways by which intenet can be used for business are:
Information about the product can be provided online to the the customer .
Provide market information to the business eg Stock Market
It help business to recruit talented people.
Help in locating suppliers of the product
Feedback and reviews about companies product
Eliminate middle men and have a direct contact with customer .
Providing information to the investor by providing companies back ground and financial information on web site.
(b) Services of Internet
1. Communication:
Email is an important communications service available on the Internet. Pictures, documents and other files are sent as email
attachments. Emails can be cc-ed to multiple email addresses
Internet telephony is another common communications service made possible by the creation of the Internet. VoIP stands for Voiceover-Internet Protocol, referring to the protocol that underlies all Internet communication.
2. Data Transfer:
File sharing is an example of transferring large amounts of data across the Internet. A computer file can be emailed to customers,
colleagues and friends as an attachment. It can be uploaded to a website or FTP server for easy download by others. Some of the
example of file sharing are: FTP
TELNET( Remote Computing)
Telnet or remote computing is telecommunication utility software, which uses available telecommunication facility and allows you
become a user on a remote computer. Once you gain access to remote computer, you can use it for the intended purpose. The
TELNET works in a very step by step procedure. The commands typed on the client computer are sent to the local Internet Service
Provider (ISP), and then from the ISP to the remote computer that you have gained access. Most of the ISP provides facility to
TELENET into your own account from another city and check your e-mail while you are traveling or away on business.
The following steps are required for a TELNET session
Start up the TELNET program
Give the TELNET program an address to connect (some really nifty TELNET packages allow you to combine steps 1 and 2 into one
simple step)
Make a note of what the escape character is
Log in to the remote computer,
Set the terminal emulation
Play around on the remote computer, and
Quit.
3. Information:
Many people use the terms Internet and World Wide Web, or just the Web, interchangeably, but the two terms are not synonymous.
The World Wide Web is a global set of documents, images and other resources, logically interrelated by hyperlinks and referenced
with Uniform Resource Identifiers (URIs). Hypertext Transfer Protocol (HTTP) is the main access protocol of the World Wide Web,
but it is only one of the hundreds of communication protocols used on the Internet. Internet is interconnection of large number of
heterogeneous computer networks all over the world that can share information back and forth. These interconnected network
exchange information by using same standards and protocols.
HTML Tags
Tag
Description
<!DOCTYPE...>
<html>
This tag encloses the complete HTML document and mainly comprises of document
header which is represented by<head>...</head> and document body which is
represented by <body>...</body> tags.
<head>
This tag represents the document's header which can keep other HTML tags like
<title>, <link> etc.
<title>
The <title> tag is used inside the <head> tag to mention the document title.
<body>
This tag represents the document's body which keeps other HTML tags like <h1>,
<div>, <p> etc.
<h1>
<p>
Heading Tags
Any document starts with a heading. You can use different sizes for your headings. HTML also has six levels of headings, which use
the elements <h1>, <h2>, <h3>, <h4>, <h5>, and <h6>. While displaying any heading, browser adds one line before and one line
after that heading.
Example
<!DOCTYPE html>
<html>
<head>
<title>Heading Example</title>
</head>
<body>
<h1>This is heading 1</h1>
<h2>This is heading 2</h2>
<h3>This is heading 3</h3>
<h4>This is heading 4</h4>
<h5>This is heading 5</h5>
<h6>This is heading 6</h6>
</body>
</html>
Paragraph Tag
The <p> tag offers a way to structure your text into different paragraphs. Each paragraph of text should go in between an opening
</head>
<body>
<p>Hello<br />
You delivered your assignment ontime.<br />
Thanks<br />
Mahnaz</p>
</body>
</html>
Hello
You delivered your assignment ontime.
Thanks
Mahnaz
Centering Content
You can use <center> tag to put any content in the center of the page or any table cell.
Example
<!DOCTYPE html>
<html>
<head>
<title>Centring Content Example</title>
</head>
<body>
<p>This text is not in the center.</p>
<center>
<p>This text is in the center.</p>
</center>
</body>
</html>
Horizontal Lines
Horizontal lines are used to visually break up sections of a document. The <hr>tag creates a line from the current position in the
document to the right margin and breaks the line accordingly.
For example you may want to give a line between two paragraphs as in the given example below:
Example
<!DOCTYPE html>
<html>
<head>
<title>Horizontal Line Example</title>
</head>
<body>
<p>This is paragraph one and should be on top</p>
<hr />
<p>This is paragraph two and should be at bottom</p>
</body>
</html>
Preserve Formatting
Sometimes you want your text to follow the exact format of how it is written in the HTML document. In those cases, you can use the
preformatted tag <pre>.
Any text between the opening <pre> tag and the closing </pre> tag will preserve the formatting of the source document.
Example
<!DOCTYPE html>
<html>
<head>
<title>Preserve Formatting Example</title>
</head>
<body>
<pre>
function testFunction( strText ){
alert (strText)
}
</pre>
</body>
</html>
Nonbreaking Spaces
Suppose you want to use the phrase "12 Angry Men." Here you would not want a browser to split the "12, Angry" and "Men" across
two lines:
An example of this technique appears in the movie "12 Angry Men."
In cases where you do not want the client browser to break text, you should use a nonbreaking space entity instead of a
normal space. For example, when coding the "12 Angry Men" in a paragraph, you should use something similar to the following
code:
Example
<!DOCTYPE html>
<html>
<head>
<title>Nonbreaking Spaces Example</title>
</head>
<body>
<p>An example of this technique appears in the movie "12 Angry Men."</p>
</body>
</html>
An HTML element is defined by a starting tag. If the element contains other content, it ends with a closing tag, where the element
name is preceded by a forward slash as shown below with few tags:
Start Tag
Content
End Tag
<p>
</p>
<h1>
</h1>
<div>
</div>
<br />
So here <p>....</p> is an HTML element, <h1>...</h1> is another HTML element. There are some HTML elements which don't need
to be closed, such as <img.../>, <hr /> and <br /> elements. These are known as void elements.
HTML documents consist of a tree of these elements and they specify how HTML documents should be built, and what kind of
content should be placed in what part of an HTML document.
paragraph element.
The name is the property you want to set. For example, the paragraph <p> element in the example carries an attribute whose
name is align, which you can use to indicate the alignment of paragraph on the page.
The value is what you want the value of the property to be set and always put within quotations. The below example shows
three possible values of align attribute: left, center and right.
Attribute names and attribute values are case-insensitive. However, the World Wide Web Consortium (W3C) recommends lowercase
attributes/attribute values in their HTML 4 recommendation.
Example
<!DOCTYPE html>
<html>
<head>
<title>Align Attribute Example</title>
</head>
<body>
<p align="left">This is left aligned</p>
<p align="center">This is center aligned</p>
<p align="right">This is right aligned</p>
</body>
</html>
Options
Function
align
valign
bgcolor
background
URL
id
User Defined
class
User Defined
width
Numeric Value
height
Numeric Value
title
User Defined
Basic Features
There are three basic features that make HTTP a simple but powerful protocol:
HTTP is connectionless: The HTTP client, i.e., a browser initiates an HTTP request and after a request is made, the client
disconnects from the server and waits for a response. The server processes the request and re-establishes the connection with
the client to send a response back.
HTTP is media independent: It means, any type of data can be sent by HTTP as long as both the client and the server know
how to handle the data content. It is required for the client as well as the server to specify the content type using appropriate
MIME-type.
HTTP is stateless: As mentioned above, HTTP is connectionless and it is a direct result of HTTP being a stateless protocol.
The server and client are aware of each other only during a current request. Afterwards, both of them forget about each other.
Due to this nature of the protocol, neither the client nor the browser can retain information between different requests across
the web pages.
HTTP/1.0 uses a new connection for each request/response exchange, where as HTTP/1.1 connection may be used for one or more
request/response exchanges.
Basic Architecture
The following diagram shows a very basic architecture of a web application and depicts where HTTP sits:
The HTTP protocol is a request/response protocol based on the client/server based architecture where web browsers, robots and
search engines, etc. act like HTTP clients, and the Web server acts as a server.
Client
The HTTP client sends a request to the server in the form of a request method, URI, and protocol version, followed by a MIME-like
message containing request modifiers, client information, and possible body content over a TCP/IP connection.
Server
The HTTP server responds with a status line, including the message's protocol version and a success or error code, followed by a
MIME-like message containing server information, entity meta information, and possible entity-body content.
HTTP methods
The set of common methods for HTTP/1.1 is defined below and this set can be expanded based on requirements. These method
names are case sensitive and they must be used in uppercase.
S.N
.
GET
The GET method is used to retrieve information from the given server
using a given URI. Requests using GET should only retrieve data and
should have no other effect on the data.
HEAD
Same as GET, but transfers the status line and header section only.
POST
A POST request is used to send data to the server, for example, customer
information, file upload, etc. using HTML forms.
PUT
DELETE
Removes all current representations of the target resource given by a URI.
CONNECT
Establishes a tunnel to the server identified by a given URI.
OPTIONS
Describes the communication options for the target resource.
TRACE
Performs a message loop-back test along the path to the target resource.
Web servers are able to map the path component of a Uniform Resource Locator (URL) into:
Web Security
Web server security is the protection of information assets that can be accessed from a Web server.
Web server security is important for any organization that has a physical or virtual Web server connected to the Internet. It requires a
layered defense and is especially important for organizations with customer-facing websites.
Separate servers should be used for internal and external-facing applications and servers for external-facing applications should be
hosted on a DMZ (demilitarized zone)or containerized service network to prevent an attacker from exploiting a vulnerability to gain
access to sensitive internal information.
Proxy server
In computer networks, a proxy server is a server (a computer system or an application program) that acts as an intermediary for
requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a
file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its
filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides
the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter
the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this
case, it 'caches' responses from the remote server, and returns subsequent requests for the same content directly.
A proxy server has many potential purposes, including:
1. To keep machines behind it anonymous (mainly for security).
2. To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.
3. To apply access policy to network services or content, e.g. to block undesired sites.
4. To log / audit usage, i.e. to provide company employee Internet usage reporting.
5. To bypass security/ parental controls.
6. To scan transmitted content before delivery for malware.
7. To scan outbound content, e.g. for data leak protection.
8. To circumvent regional restrictions.
9. A proxy server that passes requests and replies unmodified is usually called a gateway or sometimes tunneling proxy.
Proxy servers implement one or more of the following functions:
Web proxy
A proxy that focuses on World Wide Web traffic is called a "web proxy". The most common use of a web proxy is to serve as a web
cache. Most proxy programs provide a means to deny access to URLs specified in a blacklist, thus providing content filtering. This is
often used in a corporate, educational or library environment, and anywhere else where content filtering is desired. Some web proxies
reformat web pages for a specific purpose or audience, such as for cell phones and PDAs.
Novell Directory Services provides the following features that make it an advanced global, distributed, replicated, and partitioned
directory service:
Schema The NDS schema consists of the set of rules governing the structure of the Directory tree. It defines the objects that
can exist in the tree, including how entries may be constructed, which attribute values are permitted, how Distinguished
Names may be built, and other characteristics of use to the Directory itself. These object and attribute rules are specified
through a data dictionary that provides a standard set of data types from which objects can be created.
Naming The NDS name service maps network names to addresses. It is an object-oriented, global information database that
uses a hierarchical name space rather than a flat name space.
Entry management NDS allows administrators to add an entry or an alias to the NDS Directory. The schema dictates where
entries are created and what their attributes can be. To be valid in the Directory, the new entry must hold the attribute Object
Class, which has as its value a valid NDS base class.
Relationship management In the basic NDS, relationships between servers and objects are managed by multivalued
Distinguished Names
Local event services NDS Event Services provides a way to monitor the activity of NDS on an individual server. Event
Services can track local events and global events.
Authorization Novell Directory Services uses a process called access control to authorize users to perform Directory
operations on other entries and their attributes. Access control restricts many different operations, including creating objects,
reading and modifying entry attributes, and comparing attribute values.
The search engines use robots (also known as spiders) to search the internet for websites.
2.
The results of the spiders' travels are put in an database which is then indexed based on words found and where these words
were found.
3.
The users of search engines search for words or phrases related to what they are looking for and the search engine index
returns related sites.
The first is the spider otherwise called a robot visits a web page, reads it, and then follows links to other pages within the site. This is
what it means when someone refers to a site being "spidered" or "crawled."
Everything the spider finds goes into the second part of a search engine, the index. The index, sometimes called the database, is like a
giant library containing a copy of every web page that the spider finds. If a web page is different or appears to have changes, then the
site will be re-indexed and this "book" is updated with new information.
The third, and most sophisticated part of a search engine is the ranking software (sometimes referred to as the algo or algorithm). This
is the program that sifts through the millions of pages recorded in the index to find matches to a search and rank them in order of what
it believes is most relevant and retrieve the data to the user.