Web
Architecture
How packet switching network works
If
I had a file that was 2MB (file must be over 65Kb to be able to be broken down
into data packets), this could be any file i.e. word document and I wanted to
send this file to someone from a different country. The file would not be sent
as the whole file, the file will be broken down into smaller data packets.
Before
the any of the packets are transmitted, it is given a header that contains the
IP of who it is being sent to; it will also have the IP from who sent it. The
header will also display how many packets the document was split into.
The packets aren’t transmitted just through one computer to
another. The packets are instead sent on different
paths, these paths are chosen by which one is the least busy. The router will
then find out what is the next least busy and fastest direction that the
packets to be sent to. During the different paths that the packets will take, if
any of the branches malfunction or get too crowded, the packets will be
automatically routed through to another path.
When the packet arrives to its destination it will be re
assembled in order from the number it was given when the document was broken up
(the header of the packet will have the number of each packet in order).
However, it is possible that some of these packets can
become lost and they will most likely never arrive that their intended
destination. There is a system that was created to deal with this issue, what
was created is called a ‘hop’ count, and this was added to the header of the
packet. What the hop does it set limit to the amount of times a packet can pass
through each router. For example, if the limit was to 50, if the packet has
passed just over 50 times and has not arrived at its destination the packet
will be deleted by the following router. (Teach-ICT, n.d.)
Advantages
There are no tied up lines, if the packet was to go through
a direct route, there would be chance of an issue of this route and would have
to go back to the start and find another route, packet switching allows the
packet to go through many routes. The more customers, the network will expand slowly.
http://m.eet.com/media/1109821/TCPIPFig2.gif
Purpose and operation of Cloud Computing
The purpose
of cloud computing is for users from around the world to store data online.
This means that the user does need to have any external devices to move data
around. This technology is relatively new to the world and has had its ups and
downs. The most common use of cloud is with Apples iCloud. iDevice, users can
upload there data to the Apple servers so that they don’t have to have the data
on their phone.
However with
this technology comes with many security risks. It has been said that it is
possible that hackers can gain access to the server and can view unencrypted
data. Recently celebrities such as Jennifer Lawrence have said to have stored
private images on the Apple iCloud service and hackers where able to breach the
server and take these photos and upload them online. (STRANG, 2014)
Methods of information sharing and movements (Web 2.0)
The old web only consisted of static webpages these webpages
made it hard for websites to interact with what is being hosted on a web
server. This made the webpages look very dull; they were also much harder to
develop. When Web 2.0 was introduced it was much easier to develop webpages and
websites that where dynamic. One of the first concepts was Wikipedia, which
allows information to be developed easily, unlike the old web that required
code to constantly be changed when something was needed to be changed on the
page. Web 2.0 has allows users to interact with communities and express their
opinions on things like Blogs. Web functionality such as blogs are seen as
online journals which are usually public, they allow other users to comment on
them and express their feelings. Social networking sites are another method of
information sharing and movement, sites such as Facebook and Twitter. These
sites require people to sign up and use their own details such as name, and
town they are currently living in. People can chat to one another via the chat
rooms and share photos. These sites encourage the users to add more people to
their friend list. (Anon.,
n.d.)
Another popular way for people to share information with Web
2.0 is the introduction of online applications. Usually applications will need
to be installed to the clients computer, however these online applications
usually only require the user to sign up. These applications most likely will
use the Cloud computing technology. The cloud server will have all the users’
data they created from documents (Google Docs) however the user also has the
option to save onto their local driver as well. Because these applications are
online, Web 2.0 allows most popular websites to share the cloud data amongst
each other, for example, Blogger allows users to embed Google Docs files. (Anon., n.d.)
Bibliography
Anon., n.d. [Online]
Available at: https://unit27and28.wordpress.com/m1-2/
[Accessed 3 December 2015].
Available at: https://unit27and28.wordpress.com/m1-2/
[Accessed 3 December 2015].
Anon., n.d. Unit
28- website production. [Online]
Available at: https://prezi.com/847ax8jhcwhq/unit-28-website-production/
[Accessed 3 December 2015].
Available at: https://prezi.com/847ax8jhcwhq/unit-28-website-production/
[Accessed 3 December 2015].
STRANG, F., 2014. Celebrity
4chan shock naked picture scandal: Full list of star victims preyed upon by
hackers. [Online]
Available at: http://www.mirror.co.uk/3am/celebrity-news/celebrity-4chan-shock-naked-picture-4395155
[Accessed 3 December 2015].
Available at: http://www.mirror.co.uk/3am/celebrity-news/celebrity-4chan-shock-naked-picture-4395155
[Accessed 3 December 2015].
Teach-ICT, n.d. What
is .......... Packet Switching?. [Online]
Available at: http://www.teach-ict.com/technology_explained/packet_switching/packet_switching.html
[Accessed 27 November 2015].
Available at: http://www.teach-ict.com/technology_explained/packet_switching/packet_switching.html
[Accessed 27 November 2015].