1,916
27
Essay, 11 pages (2500 words)

Free critical thinking on technology reflection

In the first week we learnt about HTTP refers to Hyper Text Transfer Protocol, a term that I had heard about many instances before the first lecture. It is used in telecommunications and networks, and it made me interested in the topic since it was applicable to the internet and websites, and I had used it when browsing the internet although I did not understand its applications fully. It was exciting to learn about the previous version of HTTP (version 1. 0) and the newer version that is currently in use, HTTP 1. 1. The current version of HTTP is a faster upgrade from the previous version, and it allows several requests to be sent simultaneously in a process known as request pipelining. Some of the areas of confusion that I encountered were the issues of HTTP request methods. There are eight methods that can be used to communicate between a client and a server, for example, the idempotent methods. Cookies were interesting to learn and there was a lot of relevance in the topic for internet users.

In week 2, I learnt about how the web works in the physical layer (routers, switches, cables) and how protocols are used to communicate between devices in a network. I had participated in the setting up of various networks at home and in the office, and this topic was very relevant to me as an IT person. Even after participating in these types of networking, I had not learnt about certain important aspects of networking such as the difference between routers, switches and hubs. A hub connects multiple devices through a port, and neither does it listen to traffic or manage bandwidth. The data comes in and is broadcast to the other ports, leading to huge traffic and package collisions in the network segment. A switch has a collision detector and it can listen to traffic, while a router has a built-in routing table for joining several LANS together. The area of confusion was the TCP/IP and DNS aspects, but I later understood that DNS servers are formed as vertical hierarchy.

During the week 3 classes, we learnt about TCP and the sliding window technique. The lecturer explained the process of sending TCP/IP packets through the internet, The acknowledgment system, checksum, error detection, sliding window, and round trip time, these are all new things that I never thought of and today’s lecture was really useful to understand things in much more depth.  I had conflicts when it came to round trip time set and how to determine the window size, but after researching about it, I managed I managed to understand these issues. Round trip time (RTT) is also called round-trip delay time (RTD), meaning the length of time taken for the packets to be sent to the receiver plus the time it takes to acknowledge of that packets’ reception. Pinging can easily establish the RTT for the packets sent. I also realized more about Receiver Advertised Window and the Congestion Window, and the factors that affect these parameters such as transmission media, number of nodes, traffic on the LAN, and the physical distance between the sender and receiver.

In the fourth week, there was a lot about summarizing what had been learnt before in the previous weeks. It was mostly about recapping and understanding how the OSI (Open System Interconnection) Model works between all the layers, and the 5 layers OSI Model. The relevance of this week’s work was great since I managed to revise all the work that I had done in the other classes. I managed to understand more about TCP/IP protocol and User Datagram Protocol that are part of the networking protocol stack/ suite. UDP is faster in transferring data because it doesn’t do error checking and correction. Another protocol I found interesting is Stream Control Transmission Protocol (SCTP).

In the 5th week, I learnt about managing a web server. It was more complicated than other previous lessons but I managed to understand and enjoy the lesson when we installed a web server in our PC. The web-server is responsible to serve the request sent from the users from their browsers and delivers the response by web pages or we can say HTML files and any additional contents that come with it like images. Apache server is the main web server since it is free and an open source and it is very easy to install. The only part I found complicated was the configuration of the files in Apache server. We had a chance to change the httpd. confor . htaccessfile in the tutorial which helped in understanding how to change some configurations of the Apache server. One should avoid using the . htaccess file because it will affect the performance of the Apache server and it is a security issue by allowing users to change server configuration that administrator has no control of.

In the 6th week, we learnt about XML, XHTML and XSL. I did not have an idea what they were but later on I realized that XML stands for Extensible Markup Language. I understood that XML is different than HTML and it is used to describe and carry the data. In other word XML provides the designer a way to separate data from the format. I know that HTML stands for Hyper Text Markup language. So for better understanding I read more about XSL and I found out that it contains three parts. XSLT language allows an XML designer to write content only once and put it in many different formats. XPath language allows XML designer to link to very specific locations within an XML document. XSL-FO is a language used to define the formatting for various objects or portions of the XML document.

In week 7, we were introduced to AJAX (Asynchronous JavaScript and XML), used to send and receive data between the browser and the web server asynchronously in the background without reloading the whole page. This technique is achieved by allowing the JavaScript to communicate directly with the server by using the XML Http Request object. AJAX is usually used to make web applications user friendly and quite interactive. There are three properties for the XML Http Request object; onreadystatechange, readystate, and status. I found it hard to understand when to use the onreadystatechange or what it does.  But after going thru the w3schools site, I think I got the idea. The onreadystatechange is used to define your next action after receiving the server response which can be triggered by the readystate property.

In the 8th week, we learnt about web services such as SOAP (Simple Object Access Protocol, UDDI (Universal Description, Discovery and Integration) and   WSDL (Web Services Description Language). Most of the big companies that offer services online are now enabling this feature for other companies or sites to use their services to expand their work and services to more users. As a matter of fact it is making the life of the customer easier and simpler by being at the same site. For example when buying a product online and you want to choose the delivery option, you can see all delivery carriers services integrated in this site and you can chose the one reliable to you. I found out there is something called REST (Representational State Transfer). It is Lightweight – not a lot of extra xml markup, Human Readable Result, and Easy to build – no toolkits required. REST can be used in Twitter, and Yahoo’s web services use REST.

In week 9, we learnt a lot about content management systems, a web application that is used to manage the content of the web site. CMS consists of two elements: the content management application (CMA) and the content delivery application (CDA). The CMA element allows the content manager or author to manage the creation, modification, and removal of content from a Web site without needing the expertise of a Webmaster. The CDA element uses and compiles that information to update the Web site. With CMS, one does not need HTML and also it has many features such as Web-based publishing, format management, revision control, and indexing, search, and retrieval.

In week 10, we learnt about a new concept called Network management- FCAPS. FCAPS stands for Fault Management, Configuration Management, Accounting Management, Performance Management, and security Management. I tried on searching for the FCAPS implementation on the web and unfortunately there were little information about it and most of the sites just repeated the same definitions for FCAPS. I found a comprehensive document in explaining FCAPS in depth and explaining what to do at each level. At the end I understood the purpose of following FCAPS standards as businesses and service providers cannot bear the downtimes for the network and in the meantime they want to be in control and able to manage their network. Apart from FCAPS, there is also ITIL (Information Technology Infrastructure Library) that to me was familiar and quite popular. Now there is ITIL (V. 3) and it has five cores; Service Strategy, Service Design, Service Transition, Service Operation, and Continual Service Improvement. ITIL can be used to improve recourse utilization, remove redundant work, and combine central processes.

In week 11, the topic for the week was a self-study topic since there was no lecture, and I must admit that it was the hardest topic I read. I wanted to learn much about SNMP (Simple Network Management Protocol). Reading this topic on my own made me to realize that lectures are so important especially when the topic is new. I tried to go through the slides and tutorials provided on student central, but I really faced hard time to understand how SNMP works. That’s why my reflection is poor and there are no many things to reflect on. Network Management is all about keeping the network up and running, monitoring, and controlling network devices using conventional network technology. When the network devices are more and the network is widespread, management becomes tedious and impossible. Therefore, there arises the need to manage the network remotely. This is enhanced by SNMP. Simple Network Management Protocol is an application-layer protocol that facilitates the exchange of management information between network devices. It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. SNMP enables network administrators to manage network performance, find and solve network problems, and plan for network growth on an Internet Protocol (IP) network. Some of the things I studied on my own are:

1. SNMP went through number of versions to enhance the capabilities and advantages, and now we are using SNMPv3.
2. SNMPv1 was the first version of SNMP. Although it accomplished its goal of being an open, standard protocol, it was found to be lacking in key areas for certain applications.
3. SNMPv2 key advantages over previous versions are the Inform command. Unlike Traps, which are simply received by a manager, Informs are positively acknowledged with a response message. If a manager does not reply to an Inform, the SNMP agent will resend the Inform. Other advantages are; improved error handling, improved SET commands.
4. I also learned about the main advantages of SNMP such as it is a standardized protocol, it is universally accepted, it has portability and extendibility, and it is widely available.

In the 12th week, the focus was on manipulating the CSS file (for Cascading Style sheet), and to see the effect on the HTML page. The style defines how to display HTML elements such as layout colors, fonts, and font size. This option was added to HTML 4. 0. The purposes of the CSS are to solve problems and save time. The style defines how to display HTML elements such as layout colors, fonts, and font size. This option was added to HTML 4. 0. The purposes of the CSS are to solve problems and save time.

I have learnt aboutW3C Validator, a free service by W3C that checks the validity of Web document. This validator can process documents written in languages such as HTML, XHTML, and XML. I found out this service really can save me a lot of time by validating my code. It eases the work of identifying the problems and gives me directions on how to solve it.

Upon completing the tutorial, I learned that the style sheet can be specified inside the HTMLelement of an HTML page. But the other professional way is to have the CSS as an external file, and then reference it inside the HTML document. Moreover I learned that I can have multiple style sheets for one web page. Another useful technique is to apply multiple CSS classes to single element.

References

Aaqib, S., & Sharma, L. (2012). Analysis of Compute Vs Retrieve Intensive Web Applications and Its Impact On The Performance Of A Web Server. International Journal Of Advanced Networking & Applications, 3(4), 1233.

About Routers, Hubs, and Switches. (2012). Macworld, 29(4), 87.

Akerman, R. (2007). Library Web Services. Library Journal, 1326-8.
Barford, P. P., & Crovella, M. M. (1999). A Performance Evaluation of Hyper Text Transfer Protocols. Performance Evaluation Review, 27(1), 188-197.
Blansit, B. (2008). An Introduction to Cascading Style Sheets (CSS). Journal Of Electronic Resources In Medical Libraries, 5(4), 395-409. doi: 10. 1080/15424060802453811 cascading style sheetsCSS [article]. (2010).

Clark, J. A. (2006). AJAX(Asynchronous JavaScript and XML): This Isn’t the Web I’m Used To. Online, 30(6), 31-34.

Daewook Lee, (., Joonho Kwon, (., Sangjun Lee (d, ⁎., Seog Park, (., & Bonghee Hong, (. (n. d). Scalable and efficient web services composition based on a relational database. The Journal Of Systems & Software, doi: 10. 1016/j. jss. 2011. 05. 068
EDWARDS, W., GRINTER, R. E., MAHAJAN, R., & WETHERALL, D. (2011). Advancing the State of Home Networking. Communications Of The ACM, 54(6), 62-71. doi: 10. 1145/1953122. 1953143

French, A. M. (2011). Web Development Life Cycle: A New Methodology for Developing Web Applications. Journal Of Internet Banking & Commerce, 16(2), 1-11.

GARRY RAYNO Union Leader, S. (2002, April 28). Hubs, routers and switches: Hard facts of hardware. New Hampshire Sunday News (Manchester, NH).

GILMER, B. (2011). Media network hardware. Broadcast Engineering, 53(2), 24-27.

Gordon, R. (2006). Routing TCP/IP Vol. 1./The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference. Library Journal, 131(1), 146.
Hussain, S., & Gurkan, D. (2011). Management and Plug and Play of Sensor Networks Using SNMP. IEEE Transactions On Instrumentation & Measurement, 60(5), 1830-1837. doi: 10. 1109/TIM. 2011. 21131
Ilchenko, M. E., Moshinskaya, A. V., & Urywsky, L. A. (2011). Levels separation and merging in the OSI reference model for information-telecommunication systems. Cybernetics & Systems Analysis, 47(4), 598-605. doi: 10. 1007/s10559-011-9340-4
Jacobson, V., Smetters, D. K., Thornton, J. D., Plass, M., Briggs, N., & Braynard, R. (2012). Networking Named Content. Communications Of The ACM, 55(1), 117-124. doi: 10. 1145/2063176. 2063204

Khtoom, A. M., Taleb, S., & Gharaybih, I. K. (2010). Hyper Text Transfer Protocol Compression. European Journal Of Scientific Research, 43(4), 546.

Kim, J., Jeon, H., & Lee, J. (2012). Network management framework and lifetime evaluation method for wireless sensor networks. Integrated Computer-Aided Engineering, 19(2), 165-178.
Kun Liu, (., Hui, H., & Yuhua, N. (2011). Study and Implementation of the Network Management Agent of Telecommunication Application Server in NGN. Energy Procedia, 11(2011 International Conference on Energy and Environmental Science – ICEES 2011), 729-737. doi: 10. 1016/j. egypro. 2011. 10. 307
Lie, H., & Bos, B. (1999). Cascading style sheets : designing for the Web / Håkon Wium Lie, Bert Bos. Harlow, England ; Reading, Mass. : Addison-Wesley, c1999.
Lutfi Al-Sharif, (. (2010). The effect of multiple entrances on the elevator round trip time under up-peak traffic. Mathematical And Computer Modelling, 52545-555. doi: 10. 1016/j. mcm. 2010. 03. 053

Miller, D. R. (2000). XML: Libraries’ Strategic Opportunity. Library Journal, 125(10), 18.

Mohamed Tekala, (., & Robert, S. (2008). Dynamic adjustment of Scalable TCP congestion control parameters. Computer Communications, 311890-1900. doi: 10. 1016/j. comcom. 2007. 12. 035
Nagypál, G., Deswarte, R., & Oosthoek, J. (2005). Applying the Semantic Web: The VICODI Experience in Creating Visual Contextualization for History. Literary & Linguistic Computing, 20(3), 327-349. doi: 10. 1093/llc/fqi037
Rethemeyer, R., & Hatmaker, D. M. (2008). Network Management Reconsidered: An Inquiry into Management of Network Structures in Public Sector Service Provision. Journal Of Public Administration And Research Theory, 18(4), 617-646.

Schloen, J. (2001). Archaeological Data Models and Web Publication Using XML. Computers & The Humanities, 35(2), 123-152.

Sood, S. K. (2011). Cookie-Based Virtual Password Authentication Protocol. Information Security Journal: A Global Perspective, 20(2), 100-111. doi: 10. 1080/19393555. 2011. 560924
Spyridoula Lakka, (., Christos, M., Dimitris, V., & Draculis, M. (n. d). Exploring the determinants of the OSS market potential: The case of the Apache web server. Telecommunications Policy, doi: 10. 1016/j. telpol. 2011. 11. 018

Tan, T. (2009). Champions of the XML Workflow. Publishers Weekly, 256(13), 1-13.

Tennant, R. (2002). What To Know About Web Services. Library Journal, 127(12), 32.
Tommi Mikkonen (a, ⁎., Mikko Terho, (., Mikko Kuusipalo, (., & Pekka Reijula, (. (2011). The 8th International Conference on Mobile Web Information Systems (MobiWIS): Scriptable web applications as first-class citizens. Procedia Computer Science, 5(The 2nd International Conference on Ambient Systems, Networks and Technologies (ANT-2011) / The 8th International Conference on Mobile Web Information Systems (MobiWIS 2011), 661-668. doi: 10. 1016/j. procs. 2011. 07. 086

User Datagram ProtocolUDP [article]. (2010).

WADLOW, T., & GORELIK, V. (2009). Security in the Browser. Communications Of The ACM, 52(5), 40-45.
Witt, A., Goecke, D., Sasaki, F., & Lüngen, H. (2005). Unification of XML Documents with Concurrent Markup. Literary & Linguistic Computing, 20(1), 103-116. doi: 10. 1093/llc/fqh046
Wojciech, F., Wojciech, M., & Krzysztof Szczypiorski, (. (n. d). Hiding information in a Stream Control Transmission Protocol. Computer Communications, doi: 10. 1016/j. comcom. 2011. 08. 009

Woychowsky, E. (2006). Ajax : creating web pages with asynchronous JavaScript and XML / Edmond Woychowsky. Upper Saddle River, N. J. : Prentice Hall, 2006.

Thank's for Your Vote!
Free critical thinking on technology reflection. Page 1
Free critical thinking on technology reflection. Page 2
Free critical thinking on technology reflection. Page 3
Free critical thinking on technology reflection. Page 4
Free critical thinking on technology reflection. Page 5
Free critical thinking on technology reflection. Page 6
Free critical thinking on technology reflection. Page 7
Free critical thinking on technology reflection. Page 8
Free critical thinking on technology reflection. Page 9

This work, titled "Free critical thinking on technology reflection" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2021) 'Free critical thinking on technology reflection'. 16 November.

Reference

AssignBuster. (2021, November 16). Free critical thinking on technology reflection. Retrieved from https://assignbuster.com/free-critical-thinking-on-technology-reflection/

References

AssignBuster. 2021. "Free critical thinking on technology reflection." November 16, 2021. https://assignbuster.com/free-critical-thinking-on-technology-reflection/.

1. AssignBuster. "Free critical thinking on technology reflection." November 16, 2021. https://assignbuster.com/free-critical-thinking-on-technology-reflection/.


Bibliography


AssignBuster. "Free critical thinking on technology reflection." November 16, 2021. https://assignbuster.com/free-critical-thinking-on-technology-reflection/.

Work Cited

"Free critical thinking on technology reflection." AssignBuster, 16 Nov. 2021, assignbuster.com/free-critical-thinking-on-technology-reflection/.

Get in Touch

Please, let us know if you have any ideas on improving Free critical thinking on technology reflection, or our service. We will be happy to hear what you think: [email protected]