Tuesday, 30 April 2013

P3

SECURITY RISKS

Viruses - Viruses are easily picked up and can spread vastly causing significant damage, computer viruses are able to copy themselves and infect your computer. If someone owns a website and it becomes infected with a virus, it won't only potentially affect the owner's computer and website but will more than likely spread to other users when they enter their website, so the virus could infect millions of people at one time. The website can be affected by crashing or becoming unresponsive.


Hacking - Hacking is referred to as the re-programming of a system to function in ways not authorized by the owner, administrator or designer. It is also referred to as the modification of a program or device to give the user access to features that were previously unavailable. If someone's website was to be hacked, it may cause massive problems such as the hacker gaining access to all the owner's customers details, they are also able to change the prices of products and all the other little details. They can change almost everything, so this is potentially dangerous for a website.


ID theft - ID theft is a form of fraud which involves using another person's identity, typically in order to access resources, to claim benefits and make money. This is particularly dangerous on the internet as many people share their details, thinking the internet is secure and others won't be able to access it, but it's very easy to retrieve information from the web. ID theft is most easily done through the internet, once you know how to hack into someone's website, you're able to retrieve a lot of information about them.

PROTECTION MECHANISMS

Firewall - Firewall is part of a network that is designed to block unauthorized access. It is a device that is used to permit or deny network transmissions based on a set of rules. When owning a web company or any other business, it is very important to have a hardware firewall (this may be a router) as well as software firewall because its important that someone has those when running a network of computers as it will help that person to prevent the spread of virus throughout his network. So if one computer is to become infected it won't spread to the rest.


SSL (Secure Socket Layer) - The secure socket layer provides communications security over the internet. SSL encrypts sections of network connections above the transport layer using a keyed message authentication code for message reliability. For websites its very important to have a certificate showing you a secure website as customers are more likely to visit you and will at ease giving out their details. There is a process of what happens when a web browser connects to a secure website.


This is a screenshot that the web owners would have in each and every site. Everyone would have Terms and Conditions about the customer and the product that they're about to apply for or buy. The user/customer is meant to accept/agree the terms and conditions before applying or going any further with their registration.

Monday, 29 April 2013

D1

TCP/IP protocols map to a four layer conceptual model. The four layers of the model are: Application, Transport, Internet and Network Interface. Each layer in the model corresponds to one or more layers of the seven layer Open Systems Interconnection (OSI) model; (application layer, presentation layer, session layer, transport layer, network layer, data-link layer and physical layer).

Internet Layer- The Internet layes is responsible for addressing, packaging and routing functions. The core protocols of the Internet layer are IP, ARP, ICMP and IGMP.
The Internet Protocol (IP) is a routable protocol responsible for IP addressing, routing and the fragmentation and reassembly of packets.
The Address Resolution Protocol (ARP) is responsible for the resolution of the Internet layer address to the Network Interface layer address such as a hardware address.
The Internet Control Message Protocol (ICMP) is responsible for providing diagnostic functions and reporting errors due to the unsuccessful delivery of IP packets.
The Internet Group Management Protocol (IGMP) is responsible for the management of IP multicast groups.

Transport Layer - The Transport layer is responsible for providing the Application layer with session and datagram communication services. The core protocols of the Transport layer are Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).
TCP provides a one-to-one, connection-oriented, reliable communcations service. TCP is responsible for the establishment of a TCP connection, the sequencing and acknowledgment of packets sent, and the recovery of packets lost during transmission.
UDP provides a one-to-one or one-to-many, connectionless, unreliable communications service. UDP is used when the amount of data to be transferred is small (such as the data that would fit into a single packet), when the overhead of establishing a TCP connection is not desired or when the applications or upper layer protocols provide reliable delivery.

Application Layer- The Application layer provides applications the ability to access the services of the other layers and defines the protocols that applications use to exchange data. There are many Application layer protocols and new protocols are always being developed. The most widely-known Application layer protocols are those used for the exchange of user information:
The Hypertext Transfer Protocol (HTTP) is used to transfer files that make up the Web pages of the World Wide Web.
The File Transfer Protocol (FTP) is used to the interactive file transfer.
The Simple Mail Transfer Protocol (SMPT) is used for the transfer of mail messages and attachments.

Additionally, the following Application layer protocls help facilitate the use and management of TCP/IP networks:
The Domain Name System (DNS) is used to resolve a host name to an IP address.
The Routing Information Protocol (RIP) is a routing protocol that routers use to exchange routing information on an IP internetwork.
The Simple Network Management Protocol (SNMP) is used between a network management console and network devices (routers, bridges, intelligent hubs) to collect and exchange network management information.


M1

M1
Web 2.0 technologies provide a level user interaction. Websites have become much more dynamic and interconnected, producing "online communities" and making it even easier to share information on the Web. Because most Web 2.0 features are offered as free services, sites like Facebook and Wikipedia have grown highly in rates. As the sites continue to grow, more features are added. Some examples of features  considered to be part of Web 2.0 are blogs which allow users to post thoughts and updates about their life on the Web, Wikis which are sites like Wikipedia which allow users to add and update useful online content, social networking which are sites like Facebook and MySpace which allow users to both socialize and create and customize their own profile in order to communicate and share interests with friends and other people worldwide.
Cloud computing is the next stage in the Internet's evolution, providing the means through which everything — from computing power to computing infrastructure, applications, business processes to personal collaboration — can be delivered to you as a service wherever and whenever you need. The “cloud” in cloud computing can be defined as the set of hardware, networks, storage, services, and interfaces that combine to deliver aspects of computing as a service. Cloud services include the delivery of software, infrastructure, and storage over the Internet (either as separate components or a complete platform) based on user demand. 


Wednesday, 24 April 2013

P2

Download Speeds - Depending on how the website viewer has their own connection set up at home, or a work place it can effect their download speeds, for example if they have a direct connection to their ISP without interference of a router, use Ethernet instead of wireless and don't have other devices taking up network bandwidth, their download speeds will inevitably be faster. If this is the case, then they should have no problem with time consumption while loading web-pages, but even if they have many devices and not a direct link to their ISP the website will usually load quickly anyway due to the fact that ISP providers offer a fast download speeds.

PC Performance Factors

Browser - Depending on what browser is being used to view the website, it can affect the viewer's experience. One of the most common problems encountered when viewing a website with a browser is if that specific browser does not support certain objects that are places within the website (such as flash) which can be downloaded and installed as an add-on within a browser.
Cache memory - This is used by your browser to load commonly visited website pages more quickly, if the user is visiting a lot of web pages, it's recommended to have a higher cache memory capacity which can be configured from within the browser's settings.
Processor speed - If the viewer of a website does not have a good processor, it will take longer for website pages to display due to the amount of calculations made per second.A better processor would typically make website pages load quicker especially if they are hosting images, videos and other objects such as animations.

Server Side Factors

File types - A problem with using specific file types is that some browsers may not be able to view specific media within a website page, this can include audio formats, images or animation. It's more likely that the problem lies within the users' computer not having a certain add-ons for their website browsers if the page developer decided to use formats such as JPEG for pictures and MP3 for audio it will save him more capacity on the server, also it will allow the viewer of the website to be able to load media more quickly and take up less bandwidth.
Number of hits - The number of hits on a web page is requests sent by someone's computer to a server that hosts the web page. The number of hits doesn't stand for how many visitors has viewed the page because a single page can hold many different files, each one that's downloaded is called a hit. If you know how many hits are going to be downloaded per page, it can give a rough estimate of how many viewers are there.
Available bandwidth - Bandwidth is what determines how much the user can download through their ISP. It is usually measured over a length of time such as seconds. A higher bandwidth basically means that the user can download more within a certain period. If someone has a high speed Internet but does not have a good bandwidth, they still wont be able to download that much because they are restricted.

Monday, 22 April 2013

P1 (Unit 28)

The first most important thing that goes along with the Internet process is the hardware. Which is anything that will give the access to the Internet. This includes things like cables that carry terabits of information every second to the computer that you are using. Other types of important hardware are things like routers, servers, cell phone, towers, satellites, radios, smartphones and other devices. The information is passing through the browsers like Internet Explorer, Chrome, Mozilla Firefox…etc. When you connect your computer to the internet, you are connecting to a special type of server which is provided and operated by your Internet Service Provider (ISP). The job of this "ISP Server" is to provide the link between your browser and the rest of the internet. A single ISP server handles the internet connections of many individual browsers - there may be thousands of other people connected to the same server that you are connected to right now. ISP servers receive requests from browsers to view webpages, check email, etc. In order to provide browsers with the pages and files they ask for, ISP servers must connect to other internet servers. This brings us to the next common type of server: the "Host Server". Host servers are where websites are. Every website in the world is located on a host server somewhere. The host server's job is to store information and make it available to other servers. And finally when you want to view a certain website, you get onto your browser and type a certain URL of the website that you want to go to which always starts from “www. “ and ends with either “com, co.uk, fr..etc.” depending on the region of the website and which country it is located in. After you type in the address, your browser sends a request to your ISP server asking for the page. Your ISP server looks in a huge database of internet addresses and finds the exact host server which houses the website in question, then sends that host server a request for the page. The host server then sends the requested page to your ISP server and finally, the ISP sends the page to your browser and you see it displayed on your screen. This is how people can get by through the Internet and exploring different websites.