Professional Documents
Culture Documents
Full Slides
Full Slides
Full Slides
FEB11013(X)
Paul Bouman
Kim Schouten
ICT
Instructions
Software
Hardware Data
General ICT Knowledge
• The smallest unit of digital data is a bit, which models two possibilities (0 or 1)
Bits and Bytes
• The smallest unit of digital data is a bit, which models two possibilities (0 or 1)
• The smallest unit of digital data is a bit, which models two possibilities (0 or 1)
• Although all files store bits and bytes, the structure of formats can be vastly different.
Data Formats
• Although all files store bits and bytes, the structure of formats can be vastly different.
• Although all files store bits and bytes, the structure of formats can be vastly different.
• Text-based formats are designed in a way that humans can read them.
• Usually they require more space, but space is cheap nowadays
• Examples: HTML, CSV, XML.
Data Formats
• Although all files store bits and bytes, the structure of formats can be vastly different.
• Text-based formats are designed in a way that humans can read them.
• Usually they require more space, but space is cheap nowadays
• Examples: HTML, CSV, XML.
• Binary formats are not readable by humans, but can be efficiently processed by computers.
• They require less space and can be processed a bit faster.
• Examples: video’s, images, audio, zip-files.
Data Formats
• Although all files store bits and bytes, the structure of formats can be vastly different.
• Text-based formats are designed in a way that humans can read them.
• Usually they require more space, but space is cheap nowadays
• Examples: HTML, CSV, XML.
• Binary formats are not readable by humans, but can be efficiently processed by computers.
• They require less space and can be processed a bit faster.
• Examples: video’s, images, audio, zip-files.
• Excel’s XLSX and Word’s DOCX files are secretly zip-files containing different types of files.
Communication
Systems and
the Internet
Communication Systems
• The Domain Name System translates names (that we can remember) to addresses.
The Internet – Domain Name System (DNS)
• The Domain Name System translates names (that we can remember) to addresses.
• For example: www.eur.nl is a name, that has to be translated into an IP-address before you computer
can request information.
The Internet – Domain Name System (DNS)
• The Domain Name System translates names (that we can remember) to addresses.
• For example: www.eur.nl is a name, that has to be translated into an IP-address before you computer
can request information.
• DNS is controlled by the Internet Coorporation for Assigned Numbers and Names (ICANN)
The Internet – Domain Name System (DNS)
• The Domain Name System translates names (that we can remember) to addresses.
• For example: www.eur.nl is a name, that has to be translated into an IP-address before you computer
can request information.
• DNS is controlled by the Internet Coorporation for Assigned Numbers and Names (ICANN)
• For top-level domains, such as .nl and .amsterdam, seperate parties control the subdomains.
• In the Netherlands, we have the SIDN for .nl domains. Verisign manages .com and .net.
• Domain names typically have a yearly registration fee.
The Internet - Issues
• Encryption relies on a secret key. The key can be used to encrypt or decrypt a message.
Encryption
• Encryption relies on a secret key. The key can be used to encrypt or decrypt a message.
• Encryption relies on a secret key. The key can be used to encrypt or decrypt a message.
• Encryption relies on a secret key. The key can be used to encrypt or decrypt a message.
• On the internet, two parties that want to communicate securely need to exchange keys.
Encryption – Key Exchange and HTTPS
• On the internet, two parties that want to communicate securely need to exchange keys.
• Certificates or public keys are pieces of cryptographic information that can be used to verify that the
party you communicate with are who they claim to be.
Encryption – Key Exchange and HTTPS
• On the internet, two parties that want to communicate securely need to exchange keys.
• Certificates or public keys are pieces of cryptographic information that can be used to verify that the
party you communicate with are who they claim to be.
• Using certificates, a web of trust is built. This is used to verify new keys.
• Securely ask the people who you trust whether they trust the new certificate.
• They can ask their trusted partners for information securely as well.
• As so on…
Encryption – Key Exchange and HTTPS
• On the internet, two parties that want to communicate securely need to exchange keys.
• Certificates or public keys are pieces of cryptographic information that can be used to verify that the
party you communicate with are who they claim to be.
• Using certificates, a web of trust is built. This is used to verify new keys.
• Securely ask the people who you trust whether they trust the new certificate.
• They can ask their trusted partners for information securely as well.
• As so on…
• The https protocol uses these certificates to check whether the party you communicate with is
trustworthy and encrypt the connect.
• The http protocol does not and is therefore not suitable to transport sensitive data.
• The https protocol is just regular http over a Secure Sockets Layer (SSL)
• Other communication protocols (e.g. e-mail) can be run over SSL as well.
Collaboration
and the Cloud
Collaboration and ICT
• The more frequent synchronization between users and the central repository occurs, the sooner
conflict can be detected and resolved.
Collaboration and ICT – Application Models
• Local applications
• These are applications that run on your local device and interact with data on that device.
• Regular Microsoft Office applications such as Word and Excel are some examples.
• Useful if you want to run computations locally and stay independent of other systems.
Collaboration and ICT – Application Models
• Local applications
• These are applications that run on your local device and interact with data on that device.
• Regular Microsoft Office applications such as Word and Excel are some examples.
• Useful if you want to run computations locally and stay independent of other systems.
• Client-Server applications
• Tasks and/or responsibilities are divided between a client application that typically runs on your
local device, and a server application that typically runs on an external server.
• Typical examples: web browser (client) and web server, mail client and mail servers, streaming
services (servers) for music or video, etc.
Collaboration and ICT – Application Models
• Local applications
• These are applications that run on your local device and interact with data on that device.
• Regular Microsoft Office applications such as Word and Excel are some examples.
• Useful if you want to run computations locally and stay independent of other systems.
• Client-Server applications
• Tasks and/or responsibilities are divided between a client application that typically runs on your
local device, and a server application that typically runs on an external server.
• Typical examples: web browser (client) and web server, mail client and mail servers, streaming
services (servers) for music or video, etc.
• Has the advantage that data is often centralized automatically on the server.
• Possible risk: if the server has a problem, the application is not available for any user.
Collaboration and ICT – The Cloud
• The Cloud model provides an alternative to the traditional way ICT is used
• Move away from owning devices and software licenses to services
Collaboration and ICT – The Cloud
• The Cloud model provides an alternative to the traditional way ICT is used
• Move away from owning devices and software licenses to services
• Infrastructure as a Service (IaaS)
• Instead of having an IT department that buy and manages hardware and network infrastructure,
you rent the capacity you need from a specialize company.
• Typically deals with basic ICT systems such as hardware, servers, network infrastructure and storage
Collaboration and ICT – The Cloud
• The Cloud model provides an alternative to the traditional way ICT is used
• Move away from owning devices and software licenses to services
• Infrastructure as a Service (IaaS)
• Instead of having an IT department that buy and manages hardware and network infrastructure,
you rent the capacity you need from a specialize company.
• Typically deals with basic ICT systems such as hardware, servers, network infrastructure and storage
• Platform as a Service (PaaS)
• Offers a platform for developers that provides some standardized services.
• Example: Facebook applications can rely on Facebook to offer user identification and possibly
sales/advertisements, but you can develop applications on top of these.
• Probably not that relevant for you.
Collaboration and ICT – The Cloud