15.5 Blockchain

Blockchain is a network-based technology that was originally developed to support Bitcoin, a cryptocurrency that has been in use since 2009. A cryptocurrency is a currency that exists only in the digital world, instead of as paper money or some other physical representation. But the importance of blockchain is spreading beyond cryptocurrency; many think that it represents the future of online transactions.

Blockchain is like a public ledger, recording important data about economic transactions. Although originally designed for financial transactions, it can be used to record anything of value, such as contracts, medical data, or voting records.

A block is a record of new transactions. Once verified using established algorithms and encryption technology, a transaction is added to a block, and the block is added to the chain of ongoing sequential transactions (the blockchain).

One reason blockchain technology is so exciting is that the record of transactions is considered incorruptible. The ledger of transactions is decentralized—that is, it’s not stored in only one place, but across the Internet on many computers. It is also self-auditing: Every ten minutes, the ledger is reconciled across the network. Therefore, there is no single point of failure; no centralized version of the information exists that a hacker could corrupt. It cannot be controlled by any single entity.

Blockchain creates the ability to bypass traditional entities involved in these transactions, such as banks or even governments.

It is also thought that blockchain may have a significant impact on the economic status of people around the world. Just as anyone can have a voice on the Internet, blockchain promises to empower people economically, allowing anyone to register property rights, for instance, who wouldn’t otherwise have access to such services.

SUMMARY

A network is a collection of computers connected to share resources and data. Network technologies must concern themselves with underlying protocols and data transfer speeds. The client/server model has emerged as an important software technology given our ever-increasing reliance on networks.

Networks are often classified by their scope. A local-area network (LAN) covers a small geographic area and a relatively small number of connected devices. A wide-area network (WAN) embraces the concept of internetworking, connecting one network to another, and covers a large geographic area. A metropolitan-area network (MAN) is specially designed for large cities. LAN topologies include ring, star, and bus networks. Ethernet has become a standard topology for local-area networks.

Open systems are based on a common model of network architecture and protocols, allowing for interoperability. The OSI Reference Model is a seven-layer description of network processing based on open-system principles.

The Internet backbone is a set of high-speed networks provided by various companies. Internet service providers (ISPs) connect to the backbone or to other ISPs and provide connections for both home and business computing. Home connection technologies include phone modems, digital subscriber lines (DSL), and cable modems. Phone modems transfer data as audio signals and, therefore, are quite slow. DSL uses the same phone lines but transfers data digitally. Cable modems are also digital but use cable TV wiring to transfer data.

Messages are transferred over the Internet by breaking them up into packets and sending those packets separately to their destination, where they are reassembled into the original message. Packets may make several intermediate hops between networks before arriving at their destination. Routers are network devices that guide a packet between networks. Repeaters strengthen digital signals before they degrade too much.

Network protocols are layered so that a high-level protocol relies on lower-level protocols that support it. The key lower-level protocol suite for Internet traffic is TCP/IP. IP protocols and software deal with the routing of packets. TCP protocols and software divide messages into packets, reassemble them at the destination, and handle any errors that occur. High-level protocols include SMTP for email traffic, FTP for file transfers, telnet for remote login sessions, and HTTP for web traffic. Several high-level protocols have been assigned port numbers, which are used to help control and process network traffic. MIME types have been defined for many types of documents and special data formats.

A firewall protects a network from inappropriate access and enforces an organization’s access control policy. Some firewalls simply block traffic on specific ports; other, more sophisticated firewalls analyze the content of network traffic.

An Internet network address must pinpoint a particular machine among all possible ones in the world. A hostname uses readable words separated by dots. A hostname is translated into an IP address, which is a numeric address separated into four sections. One part of the IP address identifies the network, and another part identifies the specific host on that network. How the IP address is broken down depends on the network class (A, B, or C) that the address references.

The domain name system (DNS) translates hostnames into IP addresses. DNS has evolved from using a single file containing all of the information into a distributed system dividing the responsibility among millions of domain name servers. Top-level domains, such as .com and .edu, have become crowded, so some new top-level domains, such as .info and .biz, have been approved.

Cloud computing is a service that provides storage space and other resources on the Internet, largely freeing you from the responsibility of managing data and making it available wherever you are. There are various types of cloud services available at varying costs.

KEY TERMS

EXERCISES

For Exercises 1–6, match the word or acronym with the definition or the appropriate blank.

  1. LAN

  2. WAN

  3. Gateway

  4. Bus topology

  5. Ethernet

  6. Internet

  1.   1. The Internet is a _________.

  2.   2. The industry standard for LANs.

  3.   3. A node that handles communication between its LAN and other networks.

  4.   4. A network that connects other networks.

  5.   5. Star topology is a ______ configuration.

  6.   6. Ethernet uses __________.

For Exercises 7–15, match the word or acronym with the definition or the appropriate blank.

  1. DSL

  2. TCP/IP

  3. UDP

  4. IP

  5. TCP

  6. Broadband

  1.   7. _________ and voice communication can use the same phone line.

  2.   8. DSL and cable modems are _________ connections.

  3.   9. An Internet connection made using a digital signal on regular phone lines.

  4. 10. Network technologies that generally provide data transfer speeds greater than 25 Mbps.

  5. 11. The network protocol that breaks messages into packets, reassembles the packets at the destination, and takes care of errors.

  6. 12. The suite of protocols and programs that supports low-level network communication.

  7. 13. An alternative to TCP that achieves higher transmission speeds.

  8. 14. Software that deals with the routing of packets.

  9. 15. _________ has more reliability than UDP.

For Exercises 16–20, match the protocol or standard with what it specifies or defines.

  1. SMTP

  2. FTP

  3. Telnet

  4. HTTP

  5. MIME type

  1. 16. Transfer of electronic mail.

  2. 17. Log in to a remote computer system.

  3. 18. Transfer files to and from another computer.

  4. 19. Format of email attachments.

  5. 20. Exchange of World Wide Web documents.

For Exercises 21–28, mark the answers true or false as follows:

  1. True

  2. False

  1. 21. A P2P network establishes a single portal through which communication is managed.

  2. 22. A port is a numeric designation that corresponds to a particular high-level protocol.

  3. 23. A firewall protects a local-area network from physical damage.

  4. 24. Each company can establish its own access control policy.

  5. 25. A TV cable company cannot also be an Internet service provider.

  6. 26. Some top-level domains are based on the country in which the registering organization is based.

  7. 27. There are now hundgreen1s of top-level domains in the domain name system.

  8. 28. Two organizations cannot have the same name for a computer. Exercises 29–67 are problems or short-answer questions.

  9. 29. What is a computer network?

  10. 30. How are computers connected together?

  11. 31. To what does the word node (host) refer?

  12. 32. Name and describe two key issues related to computer networks.

  13. 33. What is a synonym for data transfer rate?

  14. 34. Describe the client/server model and discuss how it has changed how we think about computing.

  15. 35. What is a P2P network?

  16. 36. Just how local is a local-area network?

  17. 37. Distinguish between the following LAN topologies: ring, star, and bus.

  18. 38. How does the shape of the topology influence message flow through a LAN?

  19. 39. What is a MAN, and what makes it different from a LAN and a WAN?

  20. 40. Distinguish between the Internet backbone and an Internet service provider (ISP).

  21. 41. Name and describe three technologies for connecting a home computer to the Internet.

  22. 42. What role do ISPs play with the three technologies in Exercise 41?

  23. 43. What are the advantages and disadvantages of each of the technologies in Exercise 41?

  24. 44. Phone modems and digital subscriber lines (DSL) use the same kind of phone line to transfer data. Why is DSL so much faster than phone modems?

  25. 45. Why do DSL and cable modem suppliers use technology that devotes more speed to downloads than to uploads?

  26. 46. Messages sent across the Internet are divided into packets. What is a packet, and why are messages divided into them?

  27. 47. Explain the term packet switching.

  28. 48. What is a router?

  29. 49. What is a repeater?

  30. 50. What problems arise due to packet switching?

  31. 51. What are proprietary systems, and why do they cause a problem?

  32. 52. What do we call the ability of software and hardware on multiple platforms from multiple commercial vendors to communicate?

  33. 53. What is an open system, and how does it foster interoperability?

  34. 54. Compare and contrast proprietary and open systems.

  35. 55. What is the seven-layer logical breakdown of network interaction called?

  36. 56. What is a protocol stack, and why is it layered?

  37. 57. What is a firewall, what does it accomplish, and how does it accomplish it?

  38. 58. What is a hostname, and how is it composed?

  39. 59. Why was the IPv6 protocol created for IP addresses?

  40. 60. What is the primary difference between the IPv4 and IPv6 protocols?

  41. 61. What is a domain name?

  42. 62. What is a top-level domain name?

  43. 63. What is network neutrality?

  44. 64. How does the current domain name system try to resolve a hostname?

  45. 65. What is cloud computing?

  46. 66. Compare cloud computing to an email service such as Gmail.

  47. 67. What are the four types of cloud computing services?

  48. 68. What is blockchain?

THOUGHT QUESTIONS

  1.   1. What networking facilities have been set up at your school? Are there any restrictions?

  2.   2. If you wanted to register a domain name, how would you go about it? .biz, .info, .pro, .museum, .aero, and .coop are top-level domain names. Are there any current restrictions on the use of these top-level domain names?

  3.   3. Do you think that the term Internet is appropriate? Would Intranet be a better name?

  4.   4. How many social networking sites do you use regularly? What abuses of the technology have you seen?

  5.   5. In your opinion, does the good side of social networking sites outweigh the bad?

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.222.163.31