Friday, 24 June 2016

Task 4


Web Architecture

How packet switching network works


http://pluto.ksi.edu/~cyh/cis370/ebook/images/F03xx07.JPGIf I had a file that was 2MB (file must be over 65Kb to be able to be broken down into data packets), this could be any file i.e. word document and I wanted to send this file to someone from a different country. The file would not be sent as the whole file, the file will be broken down into smaller data packets.

Text Box: http://bit.ly/1PfJ7gxBefore the any of the packets are transmitted, it is given a header that contains the IP of who it is being sent to; it will also have the IP from who sent it. The header will also display how many packets the document was split into.

The packets aren’t transmitted just through one computer to another.  The packets are instead sent on different paths, these paths are chosen by which one is the least busy. The router will then find out what is the next least busy and fastest direction that the packets to be sent to. During the different paths that the packets will take, if any of the branches malfunction or get too crowded, the packets will be automatically routed through to another path.

When the packet arrives to its destination it will be re assembled in order from the number it was given when the document was broken up (the header of the packet will have the number of each packet in order).

However, it is possible that some of these packets can become lost and they will most likely never arrive that their intended destination. There is a system that was created to deal with this issue, what was created is called a ‘hop’ count, and this was added to the header of the packet. What the hop does it set limit to the amount of times a packet can pass through each router. For example, if the limit was to 50, if the packet has passed just over 50 times and has not arrived at its destination the packet will be deleted by the following router.  (Teach-ICT, n.d.)

Advantages


There are no tied up lines, if the packet was to go through a direct route, there would be chance of an issue of this route and would have to go back to the start and find another route, packet switching allows the packet to go through many routes. The more customers, the network will expand slowly.

http://m.eet.com/media/1109821/TCPIPFig2.gif

http://m.eet.com/media/1109821/TCPIPFig2.gif

Purpose and operation of Cloud Computing


The purpose of cloud computing is for users from around the world to store data online. This means that the user does need to have any external devices to move data around. This technology is relatively new to the world and has had its ups and downs. The most common use of cloud is with Apples iCloud. iDevice, users can upload there data to the Apple servers so that they don’t have to have the data on their phone.

However with this technology comes with many security risks. It has been said that it is possible that hackers can gain access to the server and can view unencrypted data. Recently celebrities such as Jennifer Lawrence have said to have stored private images on the Apple iCloud service and hackers where able to breach the server and take these photos and upload them online. (STRANG, 2014)

Methods of information sharing and movements (Web 2.0)


The old web only consisted of static webpages these webpages made it hard for websites to interact with what is being hosted on a web server. This made the webpages look very dull; they were also much harder to develop. When Web 2.0 was introduced it was much easier to develop webpages and websites that where dynamic. One of the first concepts was Wikipedia, which allows information to be developed easily, unlike the old web that required code to constantly be changed when something was needed to be changed on the page. Web 2.0 has allows users to interact with communities and express their opinions on things like Blogs. Web functionality such as blogs are seen as online journals which are usually public, they allow other users to comment on them and express their feelings. Social networking sites are another method of information sharing and movement, sites such as Facebook and Twitter. These sites require people to sign up and use their own details such as name, and town they are currently living in. People can chat to one another via the chat rooms and share photos. These sites encourage the users to add more people to their friend list. (Anon., n.d.)

Another popular way for people to share information with Web 2.0 is the introduction of online applications. Usually applications will need to be installed to the clients computer, however these online applications usually only require the user to sign up. These applications most likely will use the Cloud computing technology. The cloud server will have all the users’ data they created from documents (Google Docs) however the user also has the option to save onto their local driver as well. Because these applications are online, Web 2.0 allows most popular websites to share the cloud data amongst each other, for example, Blogger allows users to embed Google Docs files. (Anon., n.d.)


Bibliography



Anon., n.d. [Online]
Available at: https://unit27and28.wordpress.com/m1-2/
[Accessed 3 December 2015].

Anon., n.d. Unit 28- website production. [Online]
Available at: https://prezi.com/847ax8jhcwhq/unit-28-website-production/
[Accessed 3 December 2015].

STRANG, F., 2014. Celebrity 4chan shock naked picture scandal: Full list of star victims preyed upon by hackers. [Online]
Available at: http://www.mirror.co.uk/3am/celebrity-news/celebrity-4chan-shock-naked-picture-4395155
[Accessed 3 December 2015].

Teach-ICT, n.d. What is .......... Packet Switching?. [Online]
Available at: http://www.teach-ict.com/technology_explained/packet_switching/packet_switching.html
[Accessed 27 November 2015].

 


 

No comments:

Post a Comment