LITE CHAPTER ONE Part2 3
LITE CHAPTER ONE Part2 3
SECOND EDITION
2021
LITE MATTERS 2021
LESSON 1.4
COMPUTER NETWORKS AND
THE INTERNET
COMPUTER NETWORKS
Computer networks are the basis of communication in IT. They are used in a wide
variety of ways and can include many different types of networks. A computer network is a
set of computers that are connected so that they can share information. The earliest
examples of computer networks are from the 1960s, but they have come a long way in the
half-century since then. Besides physically connecting computer and communication
devices, a network system serves the essential function of establishing a cohesive
architecture that allows various equipment types to transfer information in a near-seamless
fashion. Two popular architectures are ISO Open Systems Interconnection (OSI) and IBM's
Systems Network Architecture (SNA). Some of the things that networks are used for include:
CLASSIFICATION OF NETWORKS
Geographical Span
It may be spanned across your table, among Bluetooth enabled devices, Ranging not
more than few meters.
It may be spanned across a whole building, including intermediate devices to connect
all floors.
It may be spanned across a whole city.
It may be spanned across multiple cities or provinces.
It may be one network covering the whole world.
Interconnectivity
Every single device can be connected to every other device on the network, making
the network mesh.
All devices can be connected to a single medium but are geographically
disconnected, created a bus-like structure.
Each device is connected to its left and right peers only, creating a linear structure.
Administration
Network Architecture
Computer networks can be discriminated against into various types such as Client-
Server, peer-to-peer, or hybrid, depending upon their architecture.
There can be one or more systems acting as servers. Another being client requests
the server to serve requests. The server takes and processes the request on behalf
of Clients.
Two systems can be connected Point-to-Point, or in a back-to-back fashion. They
both reside at the same level and are called peers.
There can be a hybrid network that involves network architecture of both the above
types.
Specialized devices such as switches, routers, and access points form the foundation of
computer networks.
Switches connect and help to internally secure computers, printers, servers, and
other devices to networks in homes or organizations. Access points are switches that
connect devices to networks without the use of cables.
Routers connect networks to other networks and act as dispatchers. They analyze
data to be sent across a network, choose the best routes for it, and send it on its
way. Routers connect your home and business to the world and help protect
information from outside security threats.
While switches and routers differ in several ways, one key difference is how they identify
end devices. A Layer 2 switch uniquely identifies a device by its "burned-in" MAC address. A
Layer 3 router uniquely identifies a device's network connection with a network-assigned IP
address. Today, most switches include some level of routing functionality. MAC and IP
address uniquely define devices and network connections, respectively, in a network.
TYPES OF NETWORKS
There are many different types of networks, which can be used for various purposes
and by different people and organizations. We can categorize them according to their size as
well as their purpose. The size of a network should be expressed by the geographic area,
and number of computers, which are a part of their networks. It includes devices housed in a
single room to millions of devices spread across the world.
ADVANTAGES DISADVANTAGES
PAN networks are relatively secure and It may establish a bad connection to
safe other networks at the same radio
It offers only short-range solution up to bands.
ten meters Distance limits.
Strictly restricted to a small area
ADVANTAGES DISADVANTAGES
Computer resources like hard-disks, LAN will save costs because of shared
DVD-ROM, and printers can share local computer resources, but the initial cost
area networks. This significantly of installing Local Area Networks is
reduces the cost of hardware relatively high.
purchases. The LAN admin can check every LAN
You can use the same software over user's data files, so it does not offer
the network instead of purchasing the good privacy.
licensed software for each client in the Unauthorized users can access an
network. organization's critical data if LAN admin
Data of all network users can be stored cannot secure a centralized data
on a single hard disk of the server repository.
computer. Local Area Network requires a constant
You can easily transfer data and LAN administration as there are issues
messages over networked computers. related to software setup and hardware
It will be easy to manage data in only failures.
one place, which makes data more
secure.
Local Area Network offers the facility to
share a single internet connection
among all the LAN users.
A wide-area network is another vital computer network that is spread across a large
geographical area. WAN system could connect a LAN that connects with other LAN's using
telephone lines and radio waves. It is mainly limited to an enterprise or an organization.
WANs connect computers and smaller networks to more extensive networks over
greater geographic areas, including different continents. They may link the computers
utilizing cables, optical fibers, or satellites. Still, their users commonly access the networks
via a modem (a device that allows computers to communicate over telephone lines). The
largest WAN is the Internet, a collection of networks and gateways linking billions of
computer users on every continent.
ADVANTAGES DISADVANTAGES
WAN helps you to cover a larger The initial setup cost of investment is
geographical area. Therefore, very high.
business offices situated at longer It is difficult to maintain the WAN
distances can easily communicate. network. You need skilled technicians
It contains devices like mobile and network administrators.
phones, laptops, tablet PCs, There are more errors and issues
computers, gaming consoles, etc. because of the wide coverage and
WLAN connections work using radio the use of different technologies.
transmitters and receivers built into It requires more time to resolve
client devices. issues because of the involvement of
multiple wired and wireless
technologies.
It offers lower security compared to
other types of networks.
ADVANTAGES DISADVANTAGES
A wireless local area network (abbreviated as WLAN, sometimes called a local area
wireless network or LAWN) is a wireless distribution method for two or more devices that use
high-frequency radio waves and often include an access point to the Internet. A WLAN
allows users to move around the coverage area, usually a home or small office, while
maintaining a network connection. A WLAN can be built using several wireless network
protocols, most commonly Wi-Fi or Bluetooth. Network security remains an essential issue
for WLANs. Wireless clients usually have their identity verified (a process called
authentication) when joining a wireless LAN. Technologies such as WPA raise the security
level on wireless networks to rival that of traditional wired networks.
A Storage Area Network is a type of network that allows consolidated, block-level data
storage. It is mainly used to make storage devices, like disk arrays, optical jukeboxes, and
tape libraries.
System Area Network is used for a local network. It offers high-speed connection in
server-to-server and processor-to-processor applications. The computers connected on a
SAN network operate as a single system at relatively high speed.
A Home Area Network is always built using two or more interconnected computers to
form a local area network (LAN) within the home. For example, in the United States, about
15 million homes have more than one computer. This type of network helps computer
owners to interconnect with multiple computers. This network allows sharing files, programs,
printers, and other peripherals.
POLAN is a networking technology that helps you to integrate into structured cabling. It
allows you to resolve the issues of supporting Ethernet protocols and network apps. POLAN
enables you to use an optical splitter to separate an optical signal from a single-mode optical
fiber. It converts this single signal into multiple signals.
A campus area network (or simply CAN, also known as corporate area network) is a
computer network that links the buildings and consists of two or more local area networks
(LANs) within the limited geographical area. It can be the college campus, enterprise
campus, office buildings, military base, industrial complex. CAN is one of the MAN
(Metropolitan Area Network) types on the area smaller than MAN. They can be spread
across several buildings that are relatively close to each other so users can share resources.
Thus, they are used in universities.
A VPN is a private network that uses a public network to connect remote sites or users.
The VPN network uses "virtual" connections routed through the Internet from the enterprise's
private network or a third-party VPN service to the remote site. It is a free or paid service that
keeps your web browsing secure and private over public Wi-Fi hotspots.
THE INTERNET
Every day, masses of people worldwide use the Internet to search and retrieve
information on all sorts of matter in a wide selection of areas. The information can appear in
several digital formats, such as texts, images, or videos. Individuals, companies,
governments, and other organizations make resources available. People communicate with
each other by sharing information and constructing commercial and business
communications using electronic mail. All this activity is possible because of the tens of
thousands of networks connected to the Internet and exchange information in the same
fundamental way. Never before has so much information from such a wide variety of sources
and in so many formats been available to the public.
The Internet is defined as a global wide area network (WAN) that connects billions of
computers and other electronic devices via servers and routers. With the Internet, everyone
can access information, communicate with anyone, and do other related stuff. At least 190
countries worldwide are linked into an exchange of data, news, opinions, and entertainment.
This information that travels over the Internet does so via a variety of languages called
protocols.
It is often used interchangeably with the term world wide Web (or simply WWW);
however, they're not the same. To differentiate the two terms: Internet denotes the global
communication system that involves the hardware and infrastructure. On the other hand, the
world wide Web (or simply the Web) pertains to one of the services that are communicated
over the Internet.
Preparing for a
The Modern
Precursors Global Network
Internet (1970's)
(1960's)
The Internet
Internet and Web The Web Takes
Gives Birth to the
for All (2000's) Off (1990's)
Web (1980's)
Precursors
In 1844, Samuel Finley Breese Morse, an American painter, and inventor, transmits
the first electric telegraph message, eventually making it possible for people to send
messages around the world in minutes. The first telegraph message was done by
transmitting electric signals over a wire between stations, from Washington DC to Baltimore,
Maryland. Also, Morse developed the code (called Morse Code) that assigns a letter on the
English alphabet by a set of dots and dashes that allowed the simple transmission of
complex messages across telegraph lines.
FUN FACT
1876 The invention of the telephone and the refinement of the phonograph (1886)
FUN FACT
The patent for the invented telephone was given to Bell on March 7,
1876. In 1877, he created the Bell Telephone Company (presently
known as the AT&T.
FUN FACT
Published the paper "As We May Think", which anticipates the development of
1945 the World Wide Web by half a century
1958 AT&T and Bell commercially sold the developed modern modems.
In 1958, Bell Labs developed the modern modems, which begin selling commercially
by AT&T and Bell, aiming that it will be for the use on the public telephone system.
J.C.R. Licklider envisages a network that can link people and user-friendly
1963 computers together.
Sent the first email introducing the "@" as one way to separate a user's name
1971 from the computer name where the mail is stored.
The invention of Ethernet, linking computers and other devices in a single local
1973 network.
Introduced the improved TCP that laid the foundation of the basis of the
modern Internet.
1978
A computer bulletin board system was set up for computer hobbyists to swap
information.
Official adoption of TCP/IP as the standard way which Internet computers will
1983 communicate.
1982-
The development of a Domain Name System (DNS)
1984
1988 Internet Relay Chat was invented, allowing users to create virtual "rooms".
A grocery store, named Peapod that introduced online grocery shopping and
e-commerce.
1989
The same year, Tim Berners-Lee invents the World Wide Web at CERN, the
European particle physics laboratory in Switzerland. It owes a considerable
debt to the earlier work of Ted Nelson and Vannevar Bush.
1993
Also, World Wide Web Worm, one of the first search engines, was developed.
1996 ICQ was considered the first user-friendly instant messaging on the Internet.
1998 The Backrub search engine was developed, which was later renamed Google.
The idea of the Internet of Things (IoT) emerged, citing that computers and
1999 everyday objects could be part of the Internet.
2003 Virtually every country in the world is now connected to the Internet.
Jack Dorsey and Evan Williams found Twitter, an even simpler "microblogging"
2016 site where people share their thoughts and observations in off-the-cuff, 140-
character status messages.
As we see, technology is fast pacing. If we look at the technology trends lately, we can
say that what is hardly done before can be accessed today with a simple swipe or click of a
button. Nowadays, there are numerous ways on how an electronic device can be connected
to the Internet. From there, you can instantly connect with people virtually whenever and
wherever you are located. Plus, the options you may choose also grows as the days go by.
One of those evolving industries worldwide is internet services. With that, it can be pretty
hard to determine the kind of service available to your location, preference, and hardware
availability. Enumerated below are some of the types of internet connections.
1. Dial-up Connection
A dial-up connection requires the user to link a phone line to a computer before
accessing the Internet. This type of internet connection is typically the slowest type among
all Internet connections. It should probably avoid availing unless that this service is the last
connection available in your area. Also, with this type of connection, you can't use the
landline and the Internet simultaneously, which is a big downside.
2. Broadband
A broadband (short for "broad bandwidth") internet service offers better high-speed
connections than dial-up service. Generally, it can be categorized as follows.
A digital subscriber line (or DSL) service uses a broadband connection, making it
faster than a dial-up connection. DSL connects to the Internet via an existing 2-wire
copper phone line. In contrast to a dial-up connection, users using a DSL connection can
simultaneously use the Internet and your phone line.
Cable Internet
A cable internet service operates via cable TV lines, although you do not necessarily
need to have cable TV to get it. It uses a broadband connection that greater bandwidth
than DSL – meaning faster access than a DSL and a dial-up service. On the other hand,
it is only available where cable TV is available. Also, its speed can depend on the usage
of the access and whether you upload or download any file.
Wireless
Unlike DSL and cable services, wireless is a kind of internet connection that uses
radio frequencies to access the Internet. It is commonly termed as "WiFi" (which some
people say it stands for "wireless fidelity"), an abbreviation that has almost become
synonymous with "Internet". This type of connection is always on and accessible
anywhere if the user is in the network range. Nowadays, it is one of the fastest options to
avail.
Fiber Optics
Fiber optic internet is one of the latest trends in the broadband world. With this
technology, it offers an incredibly fast internet speed. Given this speed, it is an excellent
option for a household to use multiple devices all at the same time without affecting the
speed of the Internet. In addition to this, a fiber optic internet connection is the right
Internet connection for small businesses that can rely on for their day-to-day activities.
3. Satellite
A satellite connection uses broadband but does not require cable or phone lines to
access the Internet. It connects to the Internet through satellites orbiting the Earth. As a
result, it can be used almost anywhere globally, but the connection may be affected by
weather patterns. Satellite connections are also usually slower than DSL or cable.
4. Cellular Technology
It provides wireless Internet access through mobile phones, where speeds vary depending
on the internet service provider (ISP). Commonly used cellular connections are 3G and 4G
services.
LESSON 1.5
INTERNET APPLICATIONS
INTRODUCTION
Now that you know that internet is everywhere, we will now go to its services and
applications to us. But first, have you ever wondered why is the Internet and the underlying
technology so successful and why it works extremely well? How could a technology from a
research project become the foundation of the world’s largest communication system?
Internet Applications can be described as the type of applications which use the internet for
operating successfully, that is, by using the internet for fetching, sharing, and displaying the
information from the respective server systems. It can be accessed only with the help of the
internet facility, and it cannot be functional without internet.
These applications use the Internet protocol to receive requests from a client, typically a
Web browser, process associated code, and return data to the browser.
Electronic mail (email) was originally designed to allow a pair of individuals to communicate
via computer. The first electronic mail software provided only a basic facility: it allowed a
person using one computer to type a message and send it across the Internet. Later, the
person to whom the mail addressed could access the message.
Current email systems provide services that permit complex communication and interaction.
For example, email can be used to:
The email address has three essential parts: (1) a username, (2) an "at" sign (@) and (3) the
address of the user's mail server. Example: [email protected]
An email client is a program that lives on your computer and lets you send or receive emails.
With an email client, the emails themselves are stored on your computer’s hard drive as
small files. You will not be able to check all your emails from a different computer if you use
an email client. Example email clients include Microsoft Outlook, eM Client, Mozilla's
Thunderbird, macOS Mail, Mailbird, Mailbox, Hiri and iOS Mail.
On the other hand, webmail is an email service intended to be primarily accessed via a web
browser. The emails live online in the cloud which makes it popular as it allows you to send
or receive email from anywhere – you simply need to log in to your account to access them.
Popular webmail providers are AOL Mail, Mailfence, Google’s Gmail, Microsoft’s
Outlook.com (formerly called Hotmail), and Yahoo! Mail.
An example will help explain how an email transfer occurs when a provider is used. Assume
Bob is a customer of Provider 1 and has an email address [email protected]. Also
assume Alice is a customer of Provider 2 and has an email address [email protected].
Suppose Bob sends an email message to Alice.
Figure 5.1 Illustration of the steps taken when Bob, who uses Provider 1,
sends an email message to Alice, who uses Provider 2.
1. Bob creates a message. To send the message, Bob contacts his provider, either by
using an email app or a web browser. Bob types a message and specifies
[email protected] as the recipient.
2. The message is transferred. When Bob clicks Send, the email software running on
provider1.com contacts the email server on provider2.com, specifies aliceb as the
recipient, and transfers the message.
3. Alice reads the message. Later, Alice launches an email app or uses her browser to
contact her provider. Alice finds the message from Bob in her mailbox and reads it.
To summarize, modern email systems arrange for a user’s mailbox to be located on a
computer run by an email provider. Because providers run their computers continuously, a
provider can accept incoming email at any time, and a user can access their mailbox at any
time.
Undisclosed Recipients
Each mail message begins with header lines that specify the sender, recipient(s), and a
subject. A From: header specifies the sender’s email address. Three email headers identify
recipients: To:, Cc:, and Bcc:. The names are taken from headers used on office memos
before email was invented, when Cc: abbreviated Carbon copy, and Bcc: abbreviate Blind
carbon copy. The interpretation is:
Email software treats addresses in the To: and Cc: lists the same; the two headers are
merely meant to help recipients understand the intent of the sender. However, the Bcc: list is
hidden from other recipients. That is, when it sends a copy of the email message to a user,
the email software omits the Bcc: list. Thus, if a user receives a copy of an email message
that does not list their email address in either the To: or Cc: lists, the user can deduce that
other recipients will not know they received a copy.
If a sender wants to hide all recipients from one another, the sender can specify all recipients
in a Bcc: header, leaving the To: and Cc: headers blank. Each recipient will receive an email
message that lists no recipients. To prevent confusion, some email software is configured to
fill in the To: header of such messages with a phrase, such as “Undisclosed Recipients”. The
phrase often appears in spam messages. For example, suppose a spammer sends the
following message:
From a spammer’s point of view, the use of Bcc: means that a given recipient will not know
how to contact other recipients, so it will not be as easy for them to deduce the message is a
fraud.
Like all Internet services, the World Wide Web is not built into the Internet. Instead, the
service runs on computers attached to the Internet, and follows the client-server form of
interaction. Many web servers attached to the Internet store information. To access the
information, a user launches a web browser. The browser acts as a client that contacts one
or more servers to obtain the requested information that may contain text, images, videos,
and other multimedia and navigate between them via hyperlinks, which it then displays for
the user.
The information on a web server is divided into web pages, and a browser fetches one page
at a time. In most cases, a given web server stores a set of related pages, and we use the
term web site to refer to the entire collection of pages on a server.
How does a browser know where to find information? A user must specify the correct web
server and a web page on the server. To do so, a user enters a Uniform Resource Locator
(URL). A URL is a string of characters divided into several parts by punctuation characters.
Below illustrates how a URL is divided and gives the meaning of the three most important
parts.
Figure 5.2 The three primary parts of a URL and their meaning
As the figure shows, the first part of a URL specifies a protocol to use when contacting the
web server, the second part specifies the domain name of the server to contact, and the
third tells which web page on the server to request. The string :// separates the protocol from
the server name, and a slash separates the server name from the name of a specific web
page.
A browser is a complex piece of software that has many capabilities. For example, a browser
understands how to download and display information from a local file on your computer, a
remote web server, or a remote file storage server. A browser also understands how to
launch an email app that can send email. The first item in a URL tells the browser what to
do. For example, http specifies that the browser should use the HyperText Transfer Protocol
to download a web page, https specifies that the browser should use a secure version of http
to download a web page, and ftp specifies that the browser should use the File Transfer
Protocol to download a file.
The figure below illustrates that a browser contains the software needed to handle a request.
Figure 5.2 The internal structure of a browser with a software module for each type of request.
Many people use the terms Internet and World Wide Web, or just the Web, interchangeably,
but the two terms are not synonymous, and they are quite different. The World Wide Web, or
web for short, are the pages you see when you're at a device and you're online.
But the internet is the network of connected computers that the web works on, as well as
what emails and files travel across.
Think of the internet as the roads that connect towns and cities together. The world wide
web contains the things you see on the roads like houses and shops. And the vehicles are
the data moving around - some go between websites and others will be transferring your
emails or files across the internet, separately from the web.
Types of Website
Conventional or Static – A static website is one that has web pages stored on the server in
the format that is sent to a client web browser, and mainly its contents do not change. It is
primarily coded in Hypertext Markup Language (HTML). Because a browser hides the
specification completely when displaying a web page, most users never encounter HTML.
Instead, when a user gives a browser a URL, the browser contacts the specified server,
obtains a copy of the web page, interprets the HTML, and displays the result.
Dynamic – A dynamic website is one that changes or customizes itself frequently and
automatically, based on certain criteria. Example of these are online shopping and social
networking sites wherein the contents depend on the inputs of the user itself.
The Internet triggered a shift away from the said traditional publish-subscribe paradigm that
had been used to disseminate information. A variety of new publication mechanisms have
been invented, including moderated and unmoderated discussion forums (also called
electronic bulletin boards or newsgroups), blogs, cooperative publishing systems (wikis), and
social networking sites (i.e., Facebook, Twitter, Snapchat, Instagram, and YouTube).
The driving force for much of the change arises from the low cost of equipment needed to
supply information on the Internet. Some mechanisms employ a pay-to-publish paradigm in
which a user pays the entire cost of making their information available. Social networking
uses the interesting twist of a pay-to-publish model in which a user gives up privacy and
agrees to read ads in exchange for having their personal information hosted on a web page.
We use the term Internet of Things (IoT) to refer to devices – sensors (devices that
measure or sense their surroundings) and actuators (devices that change or control their
surroundings) that can be accessed and controlled over the Internet. In addition to wearable
medical and health monitoring systems, IoT encompasses point-of-sale terminals, such as
cash registers, ATMs, and vending machines; household appliances and gadgets; building
infrastructure components, such as lighting, security, and HVAC systems; and civil
infrastructure monitoring, such as bridges and tunnels.
Many IoT devices use wireless networking, especially consumer products designed for use
in a home (smart home). The IoT industry has taken two approaches to wireless networking.
In one approach, a centralized wireless router (possibly with a repeater) connects all IoT
devices in the home to the Internet. In the other approach, a centralized wireless router
connects to nearby IoT devices, and remaining devices form a mesh in which a device
agrees to forward packets on behalf of devices that are farther away from the wireless
router.
Internet search is among the most popular services available. To achieve accurate results, a
search engine uses indexing in which a set of keywords are extracted from a page that
distinguish the page from others.
To return results without delay, a search engine uses a web crawler that runs before a user
requests a search. The crawler indexes as many pages as possible and stores the
information; a search server uses the stored information to find a list of pages pertinent to a
given request.
Search engines use a variety of techniques to gather information about users. The engine
uses the information in two ways: to provide personalized answers to search queries and to
sell ads that are delivered along with search results.
Because it uses packet switching (a method of grouping data that is transmitted over a
digital network into packets), the Internet introduces jitter, which impacts the streaming of
real-time information. A technology known as a playback buffer solves both the problem of
jitter and the problem of a low-throughput connection. An app that uses a playback buffer
accumulates information before playback begins. If all goes well, the playback buffer allows
a user to experience uninterrupted playback.
One example of this is video conferencing which permits a group of users to hold a group
discussion that optionally includes video. Each user runs software on their device that
connects to the discussion. The software provides two-way communication, sending video
and audio from the user to the rest of the group, and playing audio and video from other
users in the group.
Telephone companies are switching from analog technologies to Voice over IP (VoIP), and
most phone calls now use the Internet Protocol for some part of the path. It is possible to
obtain a VoIP telephone; a VoIP phone has a conventional phone number, and can
communicate with an analog phone, a cell phone, or another VoIP phone.
Although email and messaging systems can be used to transfer small data items, a file
transfer mechanism is needed to transfer arbitrarily large files. One of the oldest file transfer
services uses the File Transfer Protocol (FTP). FTP allows a user to download files, upload
files, and list the contents of folders on a remote computer. Users access FTP through a web
browser — when the user supplies a URL that begins with the string ftp:/ /, the browser
becomes an FTP client and accesses an FTP server.
Figure 5.7 Illustration of file transfer in which (1) a browser uses FTP to request a file,
(2) the FTP server reads the file from its local storage, and (3) the server returns a
copy to the browser.
A variety of data sharing services exist, including file sharing, photo sharing, video sharing,
and document sharing. The services permit users to share items without requiring any of the
users to own and operate a server. In most services, a user uploads a data item, and other
users can then download a copy. Some services permit collaboration in which users can
modify an item.
Figure 5.8 The steps taken to share a data item: (1) a user uploads an item, that (2)
the server places on storage, (3) another user requests the item, (4) the server obtains
a copy from storage, and (5) downloads the item to the user. (6,7,8) Other users also
obtain a copy.
Illegal file sharing was once popular as a way for users to exchange copyrighted materials,
such as music, movies, and books. The mechanism is classified as a peer-to-peer
application (P2P) because each participating user agrees to make copies of files available to
others in exchange for the right to access the files others have.
Figure 5.9 Illustration of a remote desktop session in which (1) mouse input and
keystrokes are sent to a remote computer, and (2) after the remote display changes, a
copy is sent back and shown on the user’s display.
A remote access facility permits a user who is using one device to access and control
another device. Because early computers used textual interfaces, the first remote access
mechanisms, known as remote login mechanisms, sent keystrokes to a remote system and
displayed the text that the system returned. More recent services offer a remote desktop
capability that shows the user a graphical interface. Client software running on a user’s local
system sends mouse events and keystrokes to a remote system. When the display on the
remote system changes, including cursor motion, the remote desktop server returns a copy
of the updated screen, which is displayed for the user to see.
The goal of all remote access systems is straightforward: provide a user with the illusion of
working directly on a remote computer. Remote access software does an excellent job of
meeting the goal; the illusion is only broken when congestion along the path through the
Internet introduces high delay. The next chapter explains that remote access is important for
cloud computing.
Remote desktop services have several advantages, including allowing a mobile user to
access a powerful computer without carrying heavy hardware or a heavy battery. However,
remote access technologies have unexpected consequences: although apps appear on a
user’s display as if they are running locally, such apps can only access files, printers, and
other facilities on the remote system. Thus, a file saved to the desktop will only be saved on
the remote system.
Directly connected to how file transfer and data sharing (5.3.7) works, the cloud paradigm
represents a major shift in the way individuals and corporations use computing, and if the
trend continues, the new paradigm will affect just about everyone. It is required for the
Internet of Things (IoT) devices to run and operate. Remote access (described in the 5.3.8)
forms one of the foundations of this technology.
The computing industry has moved from a centralized form of computing, in which an entire
organization shared a single, large computer, to a distributed form in which each user has
one or more devices. When a user has multiple devices, synchronizing data among them
becomes tedious and time-consuming. Vendors offer a variety of cloud services, including
data storage and data synchronization services.
Companies have started to move to a generalized cloud computing paradigm in which the
company moves its computing to facilities leased from a public cloud provider. The
motivation for adopting cloud computing is lower cost; moving to the cloud can lower both
operational expenditures (opex) and capital expenditures (capex). If a company has special
requirements for data, the company can choose to run a private cloud facility internally; it is
also possible to use a hybrid cloud approach in which some of the company’s data and
processing is moved to a public cloud, and more sensitive data is kept in the company’s
private cloud.
It includes the entire online process of developing, marketing, selling, delivering, servicing,
and paying for products and services.
Each block in the chain contains a number of transactions, and every time a new transaction
occurs on the blockchain, a record of that transaction is added to every participant’s ledger.
The decentralized database managed by multiple participants is known as Distributed
Ledger Technology (DLT).