Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Technology in Action Alan Evans • Kendall Martin Mary Anne Poatsy Tenth Edition Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall Chapter Topics Inner Workings of the Internet • The Management of the Internet • Internet Networking, Data Transmission, and Protocols • Internet Identity: IP Addresses and Domain Names Coding and Communicating on the Internet • HTML, XML, and Other Web Building Blocks • Communications Over the Internet Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 2 The Management of the Internet • Ownership of the Internet – Local networks are owned by • Individuals • Universities • Government agencies • Private companies – Infrastructure (high-speed data lines) is owned by • Government entities • Privately held companies Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 3 The Management of the Internet (cont.) • Management the Internet – Nonprofit organizations and user groups • Each have a specialized purpose • Previously handled by U.S. government contractors – Changed because of global nature of the Internet • Guarantees worldwide engagement in the direction of the Internet Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 4 The Management of the Internet (cont.) • Paying for the Internet – National Science Foundation (NSF) • Pays for large part of infrastructure • Funds research and development for new technologies • Through federal taxes – Other countries participate as well Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 5 The Management of the Internet (cont.) Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 6 Internet Networking Internet Data Routes • How computers are connected to the Internet – Internet is a “network of networks” • Similar to U.S. highway system – Main paths known collectively as the Internet backbone • Large national and international networks • Owned by commercial, education, or governmental organizations – Have fastest connections Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 7 Internet Networking Internet Data Routes (cont.) Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 8 Internet Networking Internet Data Routes (cont.) • How Internet service providers (ISPs) that form the Internet backbone communicate – Backbone is high-speed fiber-optic line known as an optical carrier (OC) line – Come in range of speeds – Originally connected with T lines • Carried data over twisted-pair wires – Bandwidth needs determine what kind of line is used Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 9 Internet Networking Internet Data Routes (cont.) • How ISPs are connected to each other – Internet exchange point (IXP) – Made up of one or more network switches • Devices that send data on a specific route through a network – Can reduce costs and improve speed and efficiency of data exchange Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 10 Internet Networking Internet Data Routes (cont.) • How individuals connect to an ISP – Point of presence (POP) • A bank of modems, servers, routers, and switches • Many users can connect simultaneously – ISPs maintain multiple POPs throughout the geographic area they serve Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 11 Internet Networking Internet Data Routes (cont.) Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 12 Internet Networking The Network Model of the Internet • The network model the Internet uses – Client/server model – Clients are • Devices such as computers, tablets, and smartphones • Clients use browsers to request services Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 13 Internet Networking The Network Model of the Internet (cont.) • The network model the Internet use (cont.) – Types of servers • Web servers: Run specialized operating systems to host web pages and other information • Commerce servers: Software that enables users to buy goods and services; use security protocols to protect sensitive information • File servers: Provide remote storage; cloud storage Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 14 Data Transmission and Protocols • Network follows standard protocols to send information • Protocol is a set of rules for exchanging electronic information • Could be considered the rules of the road for the information superhighway Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 15 Data Transmission and Protocols (cont.) • Why Internet protocols were developed – Protocols allow anyone to communicate with anyone else using the same protocol – Common Internet tasks (communicating, collaborating, creating content, seeking information, and shopping) all follow same protocols – Allow different topologies to be used Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 16 Data Transmission and Protocols (cont.) • Why Internet protocols were developed (cont.) – Open systems – the design of protocol is made public for access by anyone – Proprietary system – private system which was the norm Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 17 Data Transmission and Protocols (cont.) • Problems in developing an open system Internet protocol – Agreeing on standards was easy – Developing a new method of communication was tough • Circuit switching (technology available in the 1960s) was inefficient for computer communication Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 18 Data Transmission and Protocols Circuit Switching • Why we don’t use circuit switching to connect two computers – Used since early days of telephone – Dedicated connection is formed between two points – Connection remains active for duration of transmission – Important when order of receiving information is critical Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 19 Data Transmission and Protocols Circuit Switching (cont.) • Why we don’t use circuit switching to connect two computers (cont.) – Inefficient when applied to computers – Computers transmits data in a group, or burst – Processor works on next task and ceases to communicate until ready to transmit next burst – Would need to keep circuit open, therefore unavailable or have to be reestablished for each burst Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 20 Data Transmission and Protocols Packet Switching • What computers use to communicate – Packet switching makes computer communication efficient – Doesn’t require a dedicated communications circuit – Data is broken into smaller chunks (packets or data packets) Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 21 Data Transmission and Protocols Packet Switching (cont.) • What computers use to communicate (cont.) – Packets are sent over various routes at same time – They are reassembled at the destination by receiving computer – Fulfilled original goal of Internet: Data can still travel to destination if a node is disabled or destroyed Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 22 Data Transmission and Protocols Packet Switching (cont.) • What information a packet contains 1. An address to which the packet is being sent 2. The address from where the packet originates 3. Reassembly instructions, if the original data is split between packets, and 4. The data that’s being transmitted Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 23 Data Transmission and Protocols Packet Switching (cont.) • Why packets take different routes, and how do they decide which route to use – Routers monitor traffic and decide most effective route – Windows utility tracert shows details of exact route request takes to destination server Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 24 Data Transmission and Protocols Packet Switching (cont.) Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 25 Data Transmission and Protocols TCP/IP • What protocol the Internet uses for transmitting data – Main suite of protocols is TCP/IP • Transmission Control Protocol (TCP) • Internet Protocol (IP) – Consists of many interrelated protocols Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 26 Data Transmission and Protocols TCP/IP (cont.) • Protocol which actually sends the information – Internet Protocol (IP) is responsible for sending information from computer to computer – Doesn’t know if data was received, just that it was sent on Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 27 Data Transmission and Protocols TCP/IP (cont.) Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 28 Internet Identity: IP Addresses and Domain Names • Each computer, server, or device connected to the Internet is required to have a unique number • IP address is the unique number • Humans remember words better than numbers • Domain names are word-based IP addresses Copyright © 2014Pearson Education, Inc. Publishing as Prentice Hall 29 Internet Identity: IP Addresses and Domain Names IP Addresses • IP address – A unique identification number that defines each device connected to the Internet – Fulfills same function as a street address – Must be registered with the Internet Corporation for Assigned Names and Numbers (ICANN) • Ensures their uniqueness • Allocates to network administrators Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 30 Internet Identity: IP Addresses and Domain Names IP Addresses (cont.) • What an IP address looks like – Typical IP address: 197.169.73.63 – Referred to as a dotted decimal number (dotted quad) – Binary form is 11000101.10101001.01001001.00111111 – Each is referred to as an octet Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 31 Internet Identity: IP Addresses and Domain Names IP Addresses (cont.) • What an IP address looks like – IP addresses are considered 32-bit numbers – Can represent 4,294,967,296 values Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 32 Internet Identity: IP Addresses and Domain Names IP Addresses (cont.) • Limited number of IP addresses – Internet Protocol version 4 (IPv4) was created in 1981 before explosive growth of Internet – IPv4 offers a fixed number of IP addresses Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 33 Internet Identity: IP Addresses and Domain Names IP Addresses (cont.) • Limited number of IP addresses – Classless inter-domain routing (CIDR) was developed • Allows single IP address to represent several unique IP addresses Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 34 Internet Identity: IP Addresses and Domain Names IP Addresses (cont.) • Limited number of IP addresses – Classless inter-domain routing (CIDR) was developed (cont.) • Adds a network prefix to end of last octet (/25) – Network prefix Identifies how many of the 32 bits in an IP address are used as the unique identifier, leaving remaining bits to identify the specific host – Represented by a slash and a number Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 35 Internet Identity: IP Addresses and Domain Names IP Addresses (cont.) • Other Internet addressing systems – Internet Protocol version 6 (IPv6), developed by IETF, uses 128-bit addressing instead of 32-bit – XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX :XXXX • Each X is a hexadecimal digit • Hexadecimal is base-16 number system • Uses 0-9 or A-F Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 36 Internet Identity: IP Addresses and Domain Names IP Addresses (cont.) • Other Internet addressing systems (cont.) – Makes much larger number of IP addresses available (340 followed by 36 zeros) Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 37 Internet Identity: IP Addresses and Domain Names IP Addresses (cont.) • Other Internet addressing systems (cont.) – IPv6 provides virtually unlimited supply of IP addresses – All modern operating systems handle both IPv4 and IPv6 – Majority of routing still uses IPv4 – IPv6 conversion will happen soon as IPv4 addresses are running out Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 38 Internet Identity: IP Addresses and Domain Names IP Addresses (cont.) • How my computer gets an IP address (either/or) – Static • IP address never changes • Assigned by network administrator or ISP – Dynamic • IP address is temporary • Assigned from a pool of addresses • More common Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 39 Internet Identity: IP Addresses and Domain Names IP Addresses (cont.) • How dynamic addresses are assigned – Handled by Dynamic Host Configuration Protocol (DHCP) – Belongs to TCP/IP protocol suite – Takes from pool of available addresses on asneeded basis – Assigns address for duration of session – Might not be the same from session to session Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 40 Internet Identity: IP Addresses and Domain Names IP Addresses (cont.) • Benefits of dynamic addressing – Provides a more secure environment – Helps to keep hackers out of system Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 41 Internet Identity: IP Addresses and Domain Names Domain Names • Why IP addresses are not seen – Domain names take the place of IP address – Makes it easier for people to remember Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 42 Internet Identity: IP Addresses and Domain Names Domain Names (cont.) • How domains are organized – Organized by level – Portion after the dot is the top-level domain (TLD) – Establish by ICANN – Within TLDs are many second-level domains • Needs to be unique within its TLD Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 43 Internet Identity: IP Addresses and Domain Names Domain Names (cont.) • Controlling domain name registration – ICANN assigns companies or organizations to manage registration – One company is assigned each TLD – Maintains a database of all registered domains and contact information Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 44 Internet Identity: IP Addresses and Domain Names Domain Names (cont.) • Controlling domain name registration (cont.) – Country-specific domains are controlled by groups in those countries – Complete list of TLDs are found on Internet Assigned Numbers Authority site (iana.org) Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 45 Internet Identity: IP Addresses and Domain Names Domain Names (cont.) • How my computer knows the IP address of another computer – Computer converts URL to an IP address by consulting a database on a domain name system (DNS) server – Functions like a phone book for the Internet Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 46 Internet Identity: IP Addresses and Domain Names Domain Names (cont.) • How my computer knows the IP address of another computer (cont.) 1. Browser requests information from a website 2. ISP doesn’t know the address, so ISP requests address from its default DNS server 3. If default DNS server doesn’t know the address it queries one of the 13 root DNS servers maintained throughout the Internet Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 47 Internet Identity: IP Addresses and Domain Names Domain Names (cont.) • How my computer knows the IP address of another computer (cont.) – Root DNS server – knows the location of all the DNS servers that contain the master listings for a TLD Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 48 Internet Identity: IP Addresses and Domain Names Domain Names (cont.) • How my computer knows the IP address of another computer? (cont.) 4. Root server provides the default DNS server with the appropriate IP address 5. Default DNS server stores correct IP address for future reference and returns it to ISP’s web server 6. Computer then routes its request and stores the IP address in cache for later use Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 49 Internet Identity: IP Addresses and Domain Names Domain Names (cont.) Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 50 HTML, XML, and other web Building Blocks HTML • How web pages are formatted – Hypertext Markup Language (HTML) • Not a programming language • Set of rules for marking blocks of text • Browser knows how to display them • Surrounded by pairs of HTML tags • Tags and text are referred to as an element • <b><i>This should be bolded and italicized.</i></b> Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 51 HTML, XML, and other web Building Blocks HTML (cont.) • Viewing the HTML coding of a web page – HTML documents are text documents with tags applied – Right-click, then select View Source Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 52 HTML, XML, and other web Building Blocks HTML (cont.) • Current HTML standard – HTML5 is current version; should be finalized by 2014 – Modernizes features, such as • Reducing need for external plug-ins (like Flash) • Supporting better error handling • Introducing new tags to support media, like <video> and <audio> • Making it easier to draw graphics Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 53 HTML, XML, and other web Building Blocks HTML (cont.) • How developers can easily change the formatting of HTML elements – Cascading style sheet • List of rules that define in one location how to display HTML elements • Enable a web browser to define formatting for each element • Acts as a template • Allows global changes to be done easily Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 54 HTML, XML, and other web Building Blocks HTML (cont.) • Where the cascading comes in – Different layers of styles • External: Stored in a separate file • Embedded: Stored in the current document • Inline: Stored in a single line in the document – Different rules can be created for the same type of element in different places Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 55 HTML, XML, and other web Building Blocks HTML (cont.) • Where the cascading comes in – Style sheets are merged – If conflict in rules, then rules are weighted in hierarchy (cascade) Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 56 HTML, XML, and other web Building Blocks HTML (cont.) Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 57 HTML, XML, and other web Building Blocks XML • How XML is different from HTML – eXtensible Markup Language (XML) describes what data is described rather than how it is to be displayed – Users build own markup languages to accommodate data formats and needs – Provides method of data validation through XML schema diagrams (XSD) Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 58 HTML, XML, and other web Building Blocks XML (cont.) • Custom XML packages – XML has spawned custom packages for specific communities – Goal is information exchange standards that can be easily constructed and customized to serve growing variety of online applications Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 59 HTML, XML, and other web Building Blocks Web Browser Protocols • Internet protocol a browser uses to send requests – Hypertext Transfer Protocol (HTTP) was created for the transfer of hypertext documents – Hypertext documents have text that is linked to other documents or media Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 60 HTML, XML, and other web Building Blocks Web Browser Protocols (cont.) • How a browser safeguards secure information – Hypertext Transfer Protocol Secure (HTTPS) ensures data security – Combination of HTTP and Secure Sockets Layer (SSL), a network security protocol Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 61 HTML, XML, and other web Building Blocks Web Browser Protocols (cont.) • How a browser safeguards secure information (cont.) – Transport Layer Security (TLS) is an updated extension of SSL – These provide data integrity and security for transmissions over the Internet Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 62 HTML, XML, and other web Building Blocks Server-Side Applications • Server-side applications – Web is a client/server network – Program on server is considered server-side – Can require many communication sessions between client and server – Can perform very complex operations Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 63 HTML, XML, and other web Building Blocks Server-Side Applications (cont.) • Popular server-side programming choices – CGI (Common Gateway Interface) – ASP.NET (Active Server Pages) – VBScript – PerlScript Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 64 HTML, XML, and other web Building Blocks Server-Side Applications (cont.) • How CGI makes a web page more interactive – Most browser requests result in file being displayed in browser – Some programs can perform actions, such as gathering a name and address and adding it to a database Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 65 HTML, XML, and other web Building Blocks Server-Side Applications (cont.) • How CGI makes a web page more interactive (cont.) – Common Gateway Interface (CGI) provides methodology that allows a browser to request that a program file be executed – Allows functionality beyond simple display of information Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 66 HTML, XML, and other web Building Blocks Server-Side Applications (cont.) • Programming language used to create a CGI program – Can be created in almost any language – Known as CGI scripts – Common languages include • Perl • C • C++ Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 67 HTML, XML, and other web Building Blocks Server-Side Applications (cont.) • Programming language used to create a CGI program (cont.) – Almost any task can be accomplished through a CGI script Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 68 HTML, XML, and other web Building Blocks Server-Side Applications (cont.) • How CGI programs are executed – CGI bin (directory) is created and all CGI scripts go into this directory – These files aren’t just read and sent, they need to be run Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 69 HTML, XML, and other web Building Blocks Server-Side Applications (cont.) • How CGI programs are executed (cont.) – Example Step 1: A button gives a message Step 2: Clicking the button executes a script Step 3: Script generates a form Step 4: Form information is sent back to server and recorded in database Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 70 HTML, XML, and other web Building Blocks Client-Side Applications • Client-side applications – Program that runs on client computer – Requires no interaction with web server – New data is only sent in response to a request – Exchange of data can make interactivity inefficient and slow – More efficient to run client-side programs on local computer Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 71 HTML, XML, and other web Building Blocks Client-Side Applications (cont.) • How client-side programming is done – HTML embedded scripting language tucks programming code directly in HTML tag • Most popular is JavaScript – Applet (small application) is downloaded to client and runs when needed • Most common language is Java Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 72 HTML, XML, and other web Building Blocks Client-Side Applications (cont.) • Delay in downloading an applet – There is some delay but once downloaded it executes without further communication with server – Example Step 1: Browser makes request Step 2: Server returns Java applet Step 3: Computer executes the code Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 73 HTML, XML, and other web Building Blocks Client-Side Applications (cont.) • Scripting technologies – Dynamic HTML (DHTML) combines HTML, cascading style sheets, and JavaScript – Creates lively and interactive websites – Allows a web page to change after it’s been loaded Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 74 HTML, XML, and other web Building Blocks Client-Side Applications (cont.) • Scripting technologies – Occurs in response to user actions – Brings special effects without downloading and installing plug-ins or special software Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 75 HTML, XML, and other web Building Blocks Client-Side Applications (cont.) • JavaScript – Commonly used scripting language – Creates DHTML effects – Not the same as Java programming language – Allows HTML documents to respond to mouse clicks and typing – All actions are executed on the client computer – Keeps web pages from being lifeless Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 76 HTML, XML, and other web Building Blocks Client-Side Applications (cont.) • How JavaScript controls the components of a web page – Document Object Model (DOM) is used to organize objects and page elements – Defines every item on a web page as an object – Allows web developers to easily change the look and feel of objects Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 77 HTML, XML, and other web Building Blocks Client-Side Applications (cont.) Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 78 HTML, XML, and other web Building Blocks Client-Side Applications (cont.) • Where web programming is headed – Web pages interacting with servers at times other than when being fetched – Ongoing exchange of information – Updating information without page refresh or leaving the page – AJAX (Asynchronous JavaScript and XML) facilitates these applications Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 79 Communications Over the Internet E-Mail • Invention of e-mail – Ray Tomlinson (1971) helped develop ARPANET (precursor to the Internet) – Written to enable users to leave text messages for each other on a single machine – Extended to sending text messages between machines on Internet – Became the most popular application – 1973: Accounted for 75% of all data traffic Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 80 Communications Over the Internet E-Mail (cont.) • How e-mail travels the Internet – Simple Mail Transfer Protocol (SMTP) sends e-mails along the Internet – Part of the Internet Protocol suite – Client/server application – Passes through several e-mail servers • Specialized computers whose sole function is to store, process, and send e-mail Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 81 Communications Over the Internet E-Mail (cont.) Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 82 Communications Over the Internet E-Mail (cont.) • Where e-mail servers are located – ISPs have e-mail servers that use SMTP Step 1: Your ISP’s e-mail server receives your e-mail Step 2: E-mail server reads domain name and determines location using a DNS server Step 3: DNS server turns domain name into IP address Step 4: E-mail is forwarded to receiver’s ISP server Step 5: E-mail is stored on receiver’s e-mail server Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 83 Communications Over the Internet E-Mail (cont.) • How we are able to send files as attachments – SMTP handles text messages – Multipurpose Internet Mail Extensions (MIME) specification created to send files – E-mail is sent as text, but MIME handles the encoding and decoding of files Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 84 Communications Over the Internet E-Mail Security: Encryption • How other people can read my e-mail – Highly susceptible to being read because sent in plain text – Copies might exist on numerous servers – Encryption helps protect sensitive messages Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 85 Communications Over the Internet E-Mail Security: Encryption (cont.) • How to encrypt e-mail – Many e-mail servers offer built-in encryption • Hushmail • Comodo SecureEmail – Can sign up to experiment – Use secure account when secure communications are required Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 86 Communications Over the Internet E-Mail Security: Encryption (cont.) • How encryption works – Codes e-mail so that only person with key to code can decode the message – Private key – Public key Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 87 Communications Over the Internet E-Mail Security: Encryption (cont.) • Private key encryption – Only the two parties have the code – Could be a shift code – Could be more complex substitution code – Main problem is key security, code is broken if: • Code is stolen • Someone is savvy about decoding Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 88 Communications Over the Internet E-Mail Security: Encryption (cont.) Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 89 Communications Over the Internet E-Mail Security: Encryption (cont.) • Public key encryption – Two keys (key pair) are created • One for coding, one for decoding – Coding key is distributed as public key • Message being sent to you is coded using public key – Decode using private key • Only receiver knows private key – Mathematical relationship between the two keys Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 90 Communications Over the Internet E-Mail Security: Encryption (cont.) • Encryption used on the Internet – Public key is the most common – Pretty Good Privacy (PGP) is available for download – Can generate key pairs to provide private key if desired Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 91 Communications Over the Internet E-Mail Security: Encryption (cont.) • What a key looks like – Binary numbers – Vary in length depending on security needs – Key and message run through complex algorithm converts text into unrecognizable code – Each key generates different code Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 92 Communications Over the Internet E-Mail Security: Encryption (cont.) • Private key’s level of security – Impossible to deduce private key from public key because of complexity of algorithms used – In brute force attack every possible combination is tried – Can enable hackers to deduce key and decode message Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 93 Communications Over the Internet E-Mail Security: Encryption (cont.) • Safe key – 1990s: 40-bit keys thought to be completely resistant to brute force attacks – 1995: French programmer broke 40-bit key – 128-bit keys became standard – Strong encryption calls for 256-bit keys • Could take hundreds of billions of years to crack Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 94 Communications Over the Internet E-Mail Security: Encryption (cont.) • Encryption used in corporations – Paid services include • Confirmation of message delivery • Message tracking • Overwriting of e-mail messages when deleted – Securus Systems and ZixCorp provide these services Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 95 Communications Over the Internet Instant Messaging • What you need to run instant messaging – Client program that connects to an instant messaging (IM) service – Examples • Yahoo! Messenger • GoogleTalk • Windows Live Messenger Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 96 Communications Over the Internet Instant Messaging (cont.) • How instant messaging works – Client software makes a connection with chat server – Provides connection information to your device – Because friend’s device and your device have same connection information, server isn’t involved in chat session – Chatting takes place directly between two devices over the Internet Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 97 Communications Over the Internet Instant Messaging (cont.) Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 98 Communications Over the Internet Instant Messaging (cont.) • IM security – Most do not use high level of security – Vulnerable to • Viruses • Worms • Hacking threats • Eavesdropping – Increased security is in development – Employers can monitor IM sessions Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 99 Chapter 13 Summary Questions 1. Who owns, manages, and pays for the Internet? Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 100 Chapter 13 Summary Questions 2. How do the Internet’s networking components interact? Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 101 Chapter 13 Summary Questions 3. What data transmissions and protocols does the Internet use? Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 102 Chapter 13 Summary Questions 4. Why are IP addresses and domain names important for Internet communications? Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 103 Chapter 13 Summary Questions 5. What web technologies are used to develop web applications? Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 104 Chapter 13 Summary Questions 6. How do e-mail and instant messaging work, and how is information using these technologies kept secure? Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 105 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall