260 likes | 432 Views
Networking and the Internet (1). Where the module fits in: Mandatory module for IT and e-Commerce Pathways Useful for any business that depends on technology Goals of the Module Build understanding of Computers and Networks Prepare you to make decisions with IT implications
E N D
Networking and the Internet (1) • Where the module fits in: • Mandatory module for IT and e-Commerce Pathways • Useful for any business that depends on technology • Goals of the Module • Build understanding of Computers and Networks • Prepare you to make decisions with IT implications • e-Commerce, internal networking • Judgement is improved by understanding the issues • Enable understanding of Computer press • So that you can stay current in fast-moving area • Build practical skills with HTML and the Web
Hot Issues to be considered • The Internet and Intranets • Thin client computing • e-Commerce • “Web2” • Corporate networking • Inside and between enterprises • Operating system directions • Can Linux reduce dependency on Windows? • Does the mainframe still have a role? • Future of telephony • Convergence of voice and data; and cellular with WiFi • Voice over Internet Protocol (VoIP), Skype, etc.
Telling significant trends from hype • It’s not easy: • People once thought satellite was the way of the future… • ...and that the Network Computer would challenge Microsoft (it didn’t, but the idea is being revived as Cloud computing) • Best approach is to learn the principles • Basic understanding of how computer works • Knowledge of Operating System fundamentals • Key elements of networking technology • If you look at the underlying problem, it’s easier to understand the solutions arrived at
Week 1 Agenda • What do you know already? • Why does Networking matter? • Some thoughts about e-Business • Electronic Commerce • “dot.com” boom and bust in 2000 – and partial recovery(now it’s just another channel to market for most firms) • The rest of e-Business • Hardware foundation – Computer architecture • Software • Operating Systems • File storage • Introduction to Networking
Know about Creating web sites ADSL Indirect telephone services Internals of computer Local Area Networks (LAN) Instant Messaging Streaming audio and video Voice over the Internet B2C e-commerce Internet banking Data Encryption Wireless technologies Cellular technologies Have already done/got/used Web site creation ADSL VarTec, OneTel etc. Computer upgrade LAN Set up MSN Messaging or equivalent Internet radio or video Conversation over Internet Bought things on-line Internet banking Set up 128-bit encryption WiFi or other wireless LAN Data/photo over mobile phone What is your current experience? What else do we need to cover?
Why does Networking matter? • Because business is about interactions between people: • Stand-alone computers are only a small part of our world • Networking is prevalent within companies • Increasingly used in interactions between companies • Growth of high-capacity, long-distance networking • Distance ceasing to be important (http://www.telecom-tariffs.co.uk ) • Driving globalization of trade • Networking is an enormous business it its own right • Multi-billion mergers: Time-Warner/AOL, Skype/eBay • No sign that growth in traffic will decline… • …though the profits have largely evaporated
Business Implications • Investment: is it safe to invest in networking companies? • If you get it wrong, you’ll lose your shirt or miss out on major growth opportunity • In your own enterprise, should you stick to vendors so big they are likely to survive? • Or prefer the more innovative and fleet of foot? • In any case, does big mean safe? Think of Enron, HBOS • Best approach is to: • Apply normal business principles • Use understanding of the underlying technology to decide who to trust
e-Business IBM’s term for a business making full use of IT • Not just e-Commerce – includes any of: • Electronic support for business processes, for example • Integrated manufacturing • Enterprise Resource Planning • Customer Relationship Management • Computer-aided telephony • Communications for: • Internal activities such as e-mail and information sharing • Publicity and support • Supply-chain management • e-Commerce – B2B and B2C
Electronic Commerce • Already a key part of industrial supply-chain • Orders, bids, payment transferred between partner firms • Allows “Just in Time” logistics • Typically heavily coded information • Use of XML will enable growth of “open” B2B • Retail uses widespread; slightly limited by interfaces: • Great for commodities, where buying determined by price • Lack of “look and feel” limits range of goods • Attempts to provide more attractive images can lead to intolerable response times, a killer on dial-up • Key issue is mapping customers’ paradigms to web-site • Must merge business data with web content to have any chance of meeting user expectations
Forms of e-Commerce • B2C – Business to Consumer • Business operates computer, Customer is human user • Significant use for business customers – it’s still B2C • After 10 years growth, user population now extends to many people in developed world • B2B – Business to Business • Heavy use in well-developed niches, usually proprietary • EDI between companies with permanent relationship, Previously on private networks, now mainly over Internet • BACS and other banking systems, including EFT • Open B2B, without need for proprietary network or software • Relatively small coverage so far – most so-called B2B actually has a human user at the customer end
Growth Implications • B2C • Most G7 households now able to purchase on-line • Actual purchases low relative to customers’ total spending • Think of the concurrent users you’d get if they all piled on! • B2B • Open B2B development is very patchy • Transaction rate is not constrained by human think time • Only constraints are speed of partner computer and Internet connections • Server reliability & scalability is going to be a key factor • Tilting balance from Windows to Solaris and z/OS
“Legacy” Applications • Most of world’s money transactions go via CICS/390 • 30B transactions/day from 30M users – $300B/week • 5000 packages from 2000 vendors, plus bespoke applications developed over 30 years • 950K programmers earn living from CICS • Most CICS applications are 3270 terminal based – how do they play on the Internet? • z/OS and CICS contain Web-server functionality • Easy to web-enable old and new applications • Underlying code remains unchanged (often COBOL) • z-Series scales from desk-side processor to parallel sysplex able to handle >250,000 concurrent users 2000figures
Other e-Business considerations • Not just a matter of electronic sales and purchases • How do you milk the data you get? • Enterprise Resource Planning – Integration of production and inputs with sales • Customer relationship management (see BS3917) • Marketing information and exploiting it • Effect on economic balance of power • Large companies will need huge database processing • Can then get strong control on suppliers, andunderstanding of existing customer base • Smaller enterprises can still “join” relatively cheaply to exploit new markets missed by big boys • But cost of entry to e-commerce has been growing–why?
Any Computers Here? DVD recorder makes and plays DVDs, with a fixed user interface When this hard-disk recorder downloads new software, its user interface can change DVD player with fixed user interface
What is a Computer? • Full of electronics? • But that’s true of a radio or television or video recorder • Does complex things? • Like a C17 musical clock or an automaton • Does calculations? • But a pocket calculator does that • And the WW2 code-cracking machines at Bletchley Park did whole streams of calculations using electronics • All those devices do exactly what they were built to do: • Their capabilities are wired in, so if you want to do something different, you need to tell them to (calculator) • or rebuild the device to do a different sequence of things (Bletchley Park code machines)
Key features of a Computer • Computers are programmable • They contain memory into which you can load instructions which they execute one after another • Change the contents of memory, you change what they do • Program can interact with the world, and take different actions depending on what happens • For example, cell-phone measures strength of signal, and hunts for a new cell when it gets weak • Windows reacts to mouse-clicks and keyboard actions • We call its interactions “inputs” and “outputs” • Computer invented in 1935; nobody built one until 1948 • That’s when the first memory technology arrived
Modern Computers • Contain microprocessors – chips containing circuits for calculations and for handling data • Now several million transistors etched on the chip • Some of them function as a clock to organize operations • Contain electronic memory to hold programs and data • These chips are much more repetitive than microprocessors • Have some mechanism for saving data from memory and getting it back (such as disk drives, SIM cards) • Interact with the world through input and output devices (sometimes called peripherals) • Also contain interrupt hardware to handle asynchronous events from outside (or inside)
Foundation for Networking • You have an understanding of basic computer architecture and networking from last year • We need to build on this in several ways: • pursue the idea of “encapsulation” of function into operating systems • Plus how to do things concurrently • understand the factors that determine performance • First let’s revise basic hardware design • Some of this should be familiar from 14 months ago
Computer Architecture • Processor executes instructions from memory, • and works on data in memory • Other data flows through the bus Memory Processor 1234567890-= QWERTYUIOP[]# ASDFGHJKL;’ ZXCVBNM,./ Output (Information) Input (Data) Bus Other long-term Storage Disk Storage
Storage Hierarchy • Cache on processor chip • Very fast indeed, very expensive, rarely over 2MB • Allows actions to take place entirely on the chip • http://www.extremetech.com/article2/0,1697,1155325,00.asp • 2nd-level cache • Very fast, less expensive, typically 2MB • Main memory • Fast: quoted speed <30nsec • Price down from £25/MB in 1996 to under 2p now • Magnetic Disk: non-volatile (unlike main memory) • Slower: 10msec access, longer if heads must move • Large and cheap; e.g. 750GB disk now under £50 sec msec µsec nsec
Operating Systems • Though the processor is simple and serial, we want to do more complex things, often several at once • An operating system is a program that provides the building blocks of complex systems • Some simply encapsulate function to save every application from having to include a copy • Others handle specific hardware, presenting a generic interface that hides behaviour unique to that hardware • Sometimes the interface is so generic that it has little to do with the hardware – file structures are the best example • Modern operating systems make it look as if the computer is doing several things at the same time • Our operating system is Windows XP – how many of you are now on Vista (bad luck) or W7?
Concurrent Operations • To give the appearance of doing several things at once: • OS must stay ready to accept work: • keystrokes, mouse clicks, signals from modem, printer ready to receive another buffer of data • These can interrupt a computation already being run • It then does a bit of the required work, • then goes back to an interrupted task, and so on. • We say the machine is doing things “concurrently” – they’re not simultaneous, but they look it! • The key is switching the CPU between logical processes • In theory, you could go round “polling” – high overhead • In practice, concurrency depends on hardware interrupts
Typical File Storage • PC disks are organized into “allocation units” • Identical blocks, addressed by number • Some of these are used to hold the actual data • The others contain pointers to the data, and names so you can refer to it – these are directories to the files • A “folder” is a piece of data consisting of a directory, so you can build a hierarchy in the file system • Most modern computer systems work in this way, including: DOS, Windows XP, NT, OS/2, Unix, VMS, VM • DOS file identifier are made up of two pieces: • a name of up to 8 characters, such as fred0516 • a type (or extension) of up to 3 characters, such as doc
Files in Windows • Windows uses the file type to give short cuts to processing the file • In Windows 3.x, done by an “association” in WIN.INI • In Windows 9x, NT, 2000 & later, by Registry entries • For any file type, you can define “methods” (operations) • Most have an Open method (usual default for double-click, though not for Word templates) • Other methods accessible by right-clicking the file ID • Files can now have “long names” – longer than 8+3 • Stored in a separate place in the directory • 8+3 name generated to go in the “old” file ID position • You may sometimes see the 8+3 name on a diskette
Root Directory C:\ My letters My programs Windows c:\mylets\ c:\myprogs\ c:\windows\ This year Archives System files c:\mylets\2010\ c:\mylets\oldies\ c:\windows\system\ Directory structure on Windows