Professional Documents
Culture Documents
FEB11013(X)
Paul Bouman
Kim Schouten
ICT
Instructions
Software
Hardware Data
General ICT Knowledge
• The smallest unit of digital data is a bit, which models two possibilities (0 or 1)
• Although all files store bits and bytes, the structure of formats can be vastly different.
• Text-based formats are designed in a way that humans can read them.
• Usually they require more space, but space is cheap nowadays
• Examples: HTML, CSV, XML.
• Binary formats are not readable by humans, but can be efficiently processed by computers.
• They require less space and can be processed a bit faster.
• Examples: video’s, images, audio, zip-files.
• Excel’s XLSX and Word’s DOCX files are secretly zip-files containing different types of files.
Communication
Systems and
the Internet
Communication Systems
• The Domain Name System translates names (that we can remember) to addresses.
• For example: www.eur.nl is a name, that has to be translated into an IP-address before you
computer can request information.
• DNS is controlled by the Internet Coorporation for Assigned Numbers and Names (ICANN)
• For top-level domains, such as .nl and .amsterdam, seperate parties control the subdomains.
• In the Netherlands, we have the SIDN for .nl domains. Verisign manages .com and .net.
• Domain names typically have a yearly registration fee.
The Internet - Issues
• Encryption relies on a secret key. The key can be used to encrypt or decrypt a message.
• On the internet, two parties that want to communicate securely need to exchange keys.
• Certificates or public keys are pieces of cryptographic information that can be used to verify
that the party you communicate with are who they claim to be.
• Using certificates, a web of trust is built. This is used to verify new keys.
• Securely ask the people who you trust whether they trust the new certificate.
• They can ask their trusted partners for information securely as well.
• As so on…
• The https protocol uses these certificates to check whether the party you communicate with
is trustworthy and encrypt the connect.
• The http protocol does not and is therefore not suitable to transport sensitive data.
• The https protocol is just regular http over a Secure Sockets Layer (SSL)
• Other communication protocols (e.g. e-mail) can be run over SSL as well.
Collaboration
and the Cloud
Collaboration and ICT
• The more frequent synchronization between users and the central repository occurs, the
sooner conflict can be detected and resolved.
Collaboration and ICT – Application Models
• Local applications
• These are applications that run on your local device and interact with data on that device.
• Regular Microsoft Office applications such as Word and Excel are some examples.
• Useful if you want to run computations locally and stay independent of other systems.
• Client-Server applications
• Tasks and/or responsibilities are divided between a client application that typically runs on
your local device, and a server application that typically runs on an external server.
• Typical examples: web browser (client) and web server, mail client and mail servers,
streaming services (servers) for music or video, etc.
• Has the advantage that data is often centralized automatically on the server.
• Possible risk: if the server has a problem, the application is not available for any user.
Collaboration and ICT – The Cloud
• The Cloud model provides an alternative to the traditional way ICT is used
• Move away from owning devices and software licenses to services
• Infrastructure as a Service (IaaS)
• Instead of having an IT department that buy and manages hardware and network
infrastructure, you rent the capacity you need from a specialize company.
• Typically deals with basic ICT systems such as hardware, servers, network infrastructure
and storage