Week5 - Internet and Web Based System
Week5 - Internet and Web Based System
1
Week 5: Lecture 1
COMPONENTS OF E-BUSINESS INFRASTRUCTURE
We are going to learn
• Goal of quality information services
• Components of the e-business technology
infrastructure
3
Goals for quality of information services
• Performance
• Scalability
Networking Infrastructure
Networking overview
Communication Protocols
Network Security
Digital Payment Systems
Web System Architecture
Internet
HTTP Server
TCP/IP
Operating System
Hardware
Processor, Disks, Network Interfaces etc.
Characteristics of a Web server
• Also known as HTTP Server/ HTTP Daemon
• Continuously listens to the client requests and
returns the requested file
• Handles more than one request at a time
– Forking / Multithreading
Performance metrics for the Web server
• Throughput
– The rate at which the HTTP requests are serviced
– Measured in HTTP operations/second OR megabits
per second (Mbps)
• Latency
– The time required to complete a request
– Average latency is the average time for handling
requests.
Dynamic Load Balancing
• Splitting the traffic across the servers
• Mirroring the site
• Methods
– DNS Based
• Mapping to a cluster of servers in a round-robin fashion during address
translation.
– Dispatcher based
• Address of a special TCP router as the address of the Web server
• Router diverts the request to the server with less load
– Server based
• Address redirection
• Increase in client response time
Application Server
• Handles all the transactions between the Web
server and the backend database
• Supports different programming languages
and/or scripting languages
Database Server
• Database management system
• Structured query language
• Database connectivity
Other important components and concepts in
E-business infrastructure
• Mainframe and Legacy systems
– Integration Technologies
• Proxies
– Network traffic reduction
– Privacy and security (Firewalls)
– Load balancing
• Caches
– Traffic reduction
– Levels of Caches
– Dedicated community proxy servers
• Third party Services
– Security services, Ad servers, Trust services,
Escrow services
– A source of additional delay in the Web servers
response time
Other data resources
• Data warehouses and data marts
• Online Analytical Processing Queries (OLAP)
• Business Intelligence
18
Week 5: Lecture 2
19
We are going to learn
• Features of the Internet
• Infrastructure for connecting to the Internet
• Domain name system
• HTTP protocol and webpage generation
20
The Internet
• Originated in 1960 as a result of research supported by
Advances Research Project Agency by US DOD
– ARPANET
• A collection of networks
• Basic Features
– Data Centric
– Separation of communication from data processing
– Packet Switching
Features of a packet switched Network
• Network consists of two types of nodes
– Hosts: Originators and destinations of data packets
– Routers: Responsible for routing the packets
• A connectionless system
– No-fixed routing scheme between the hosts
– Routing tables changes based on network state
• Congestion or link failure
– Packets arrive out of sequence packets
• A “Best-effort” delivery network
– In case of congestion or link failure the packets are discarded
– Recognition of failure and the corrective action is the task of the host
computer.
Connecting to the Internet
• To connect a computer to the internet it must be
connected to a router that is a part of the Internet
• Routers are sponsored by a university, research centers,
or commercial companies (ISPs).
• ISPs Operate at many levels
– Local ISPs
• Lease Connections from the national or regional ISPs
• Provide dial-up access to the users and charge them
– National or regional ISPs
• Have their own backbone to carry traffic
• Charge local ISPs for providing
Some pieces of the Internet
24
Domain Name System
• Converting IP addresses to human readable form
• An application on which many other application level
protocols rely
• Includes a distributed database system responsible for storing
domain names
How DNS works
• Client enters a domain name (www.domainname.com) into his
browser.
• The browser contacts the Client's ISP for the IP address of the
domain name.
• The ISP first tries to answer by itself using "cached" data.
• If the answer is found it is returned. Since the ISP isn't in
charge of the DNS, and is just acting as a "dns relay", the
answer is marked "non-authoritative"
• If the answer isn't found, or it's too old, then the ISP DNS
contacts the nameservers for the domain directly for the
answer.
• If the nameservers are not known, the ISP's looks for the
information at the 'root servers', or 'registry servers'.
Getting a domain name
• ICANN (Internet Corporation for Assigned
Names and Numbers) is the private (non-
government) non-profit corporation with
responsibility for IP address space allocation,
protocol parameter assignment, domain name
system management, and root server system
management functions.
27
https://whois.icann.org/en/domain-name-registration-process
28
Uniform Resource Locator
• Unique address of an Internet resource
Protocol://domain-name:port/directory/resource
• http://www.accd.edu/sac/lrc/john/wwwtest2.htm
t2 Serve r S e nd
t3 2.Sends HTTP request (header+data)
t4
3. Server returns HTTP response.
t5 Reque
st for Pag (Status, header, requested resource)
eB
t6
Static Web page generation
• HTML Tags
• Browser
32
Dynamic Webpage Generation
Server side programming
Database Connectivity
Passing additional data to the Web server
Java: Servlets, JSP
Microsoft: ASP
PHP, CGI Script
Client side programming
Java scripts
Cookies
To cope with stateless nature of HTTP
Tracking a client
Supporting applications like shopping cart
Privacy issues
Servers sets cookies by sending a set-cookie header in HTTP
response
Set-cookie: Name=Value
Whenever required by the server the client includes cookie in the
request header by using
Cookie: Name=value
Week 5: Lecture 3
NETWORKING RESOURCES
35
We are going to learn
• ISO-OSI reference model
• TCP/IP protocol stack
36
Computer Network
• A set of communicating computing devices
• Consisting of the following building blocks
– The framework
• Standard Organizations
• ISO-OSI Reference Model
• Addressing
– Protocols
• Protocol suit
• Applications
– Hardware Kurose, J.F. and Ross, K.W., 2010. Computer
networking: a top-down approach (Vol. 5).
– Physical Connectivity Reading: Addison-Wesley.
Standard Organizations
• ISO (International Standard Organization)
• IAB (Internet Advisory board)
• IEEE (Institute of Electrical and Electronic
Engineers)
The ISO-OSI
Model
Reference Model
for Computer
Network
Why do we need such a model
• Originally intended as the benchmark for the international
standardization of computer networking protocols.
• A divide and conquer approach
• Layers are used to isolate groups of related functions so that
development and flexibility are promoted through the use of well-
defined interfaces.
• Each layer is insulated from the addressing details used by the layer
below.
• Networking Protocols/ Protocol suits can be designed and
compared in the framework of this model.
• Today TCP/IP is the most important protocol suit
TCP/IP – A Layered Model
Application Layer Provides a specific application
5. Session Layer
2. Data Link Layer LLC (Logical Link Control)–MAC (Medium Access Control)
TCP TCP
IP IP
IP IP
Link Link Link Link
Link Layer
• Provides access to the network
• Addresses physical characteristics
• Handles many access control protocols for each
physical network standard
• Functions
– Encapsulation of IP datagrams into frames
– Mapping of IP addresses to physical address used by the
network
Network Layer
• Internet Protocol
– Defining datagram
– Defining Internet addressing scheme
– Moving data between Network layer and Transport
layer
– Routing datagrams
– Performing segmentation and reassembling of
datagrams
IP Addresses
• IPv4 – 32 bit address
• IPv6 – 128 bit addresses
0 IPv4 Header Format 31
Other Control fields
Other Control fields
TTL PID Check Sum
Destination Address
Source Address
Options and Padding
Representation of IP Addresses
• Dot decimal format
– Ex. 128.0.0.1
– Binary equivalent of the above is
• 10000000.00000000.00000000.00000001
• Consists of two parts
– Network number
– Host number (within the network)
Transport Layer
• TCP and UDP
• TCP (Transmission control protocol)
– Connection oriented
– Handshaking
– Source port, destination port, sequence number and
acknowledgement.
– Sliding window mechanism
• UDP (User datagram protocol)
– Connectionless
– No handshaking
– Source port and destination port
– No acknowledgement
– No retransmission
0 UDP Header Format 31
53
We are going to learn
• Networking hardware
• Computing hardware
• Storage options
• Software resources
54
Networking hardware in Context
7. Application Layer
6. Presentation Layer
4. Transport Layer
Routers
3. Network Layer Bridge-
Routers
2. Data Link Layer Switches, Bridges
C Memory
CPU a
c Bus Memory I/O Bus I/O Devices
Register h
e
Memory Disk
Register Cache Reference Memory
Reference Reference Reference
Faster Slower
The cache
• A cache is a small, fast memory located close to the CPU that
holds the most recently accessed code or data.
– cache hit.
– cache miss
– Temporal locality
– spatial locality
• The time required for the cache miss depends on both the
latency of the memory and its bandwidth, which determines
the time to retrieve the entire block.
• A cache miss, which is handled by hardware, usually causes
the CPU to pause, or stall, until the data are available.
Main Memory
• all objects referenced by a program need to reside in
main memory.
– virtual memory
– pages.
– page fault
SAN
•Efficient data integrity, backup and recovery
•Faster, No congestion
•Not easily scalable
•Data can not be transferred over a long distance
Software Resources
The Operating System
• Operating System is a collection of programs designed to
manage the system’s resources, namely, memory, processors,
devices and information (program and data).
• The operating system keeps track of the resources, deciding
on which process is to get the resource (how much and
when), and allocating it and reclaiming it if necessary.
Functions of Operating Systems
7A-85
86
Week 5: Lecture 5
DATA RESOURCES
87
We are going to learn
• Types of data resources
88
logical data elements in information systems
89
The concept of entities and relationships
90
Entity Relationship Diagram
91
Relational database structure
92
Logical User Views
Data elements and relationships (the
subschemas) needed
for checking, savings, or instalment loan
processing
Data elements and relationships (the schema)
needed for the support of all bank services
Software Interface
The DBMS provides access to the bank’s
databases
Physical Data Views
Organization and location of data on the storage
media
93
The concept of a
database
management
system
94
The concept of Structured Query Language
95
Major types of databases used by organizations and end users
96
Components of a complete data warehouse system
97
Data mining process
98
99
Multi dimensional view of the data
100
Online analytical processing (OLAP)
Consolidation. Consolidation involves the aggregation of
data, which can involve simple roll-ups or complex
groupings involving interrelated data.
101
Online analytical processing (OLAP)
Drill-down. OLAP can also go in the reverse direction
and automatically display detailed data that comprise
consolidated data. This process is called drill-down.
102
Online analytical processing (OLAP)
Slicing and Dicing. Slicing and dicing refers to the ability
to look at the database from different viewpoints. One
slice of the sales database might show all sales of a
product type within regions. Another slice might show
all sales by sales channel within each product type.
Slicing and dicing is often performed along a time axis
to analyse trends and find time-based patterns in the
data.
103
104