Week 2 LBSC 690 Information Technology

Slides:



Advertisements
Similar presentations
Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”
Advertisements

1 LBSC 690: Week 2 HTML, The Internet Jen Golbeck College of Information Studies University of Maryland.
Networks Week 2 LBSC 690 Information Technology. Computer Systems Hardware –Types of hardware –Storage hierarchy –Moore’s law Software –Types of software.
Networks Week 2 LBSC 690 Information Technology. Computer Systems Hardware –Types of hardware –Storage hierarchy –Moore’s law Software –Types of software.
LBSC 690: Session 2 FTP, “Hello World!” HTML Jimmy Lin College of Information Studies University of Maryland Monday, September 17, 2007.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
1 Networking A computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources. The.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Presentation on Osi & TCP/IP MODEL
How the Internet Works. The Internet and the Web The Web is actually just one of many computer applications that run on the Internet Among others are.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
CPS Today’s topics Computer Applications Computer Communications Upcoming Computer Security ( Great Ideas, Chapter 11) Reading Great Ideas, Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
1 Version 3.0 Module 11 TCP Application and Transport.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Data Networking Fundamentals Chapter 7. Objectives In this chapter, you will learn to: Discuss basic networking concepts, including the elements common.
William Stallings Data and Computer Communications
TCP/IP (Transmission Control Protocol / Internet Protocol)
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
The Internet Session 3 INST 301 Introduction to Information Science.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
1 ** THE INTERNET ** Large, worldwide collection of networks that use a common protocol to communicate with each other A network of networks.
Ad Hoc – Wireless connection between two devices Backbone – The hardware used in networking Bandwidth – The speed at which the network is capable of sending.
Unit Communication Hardware
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Chapter Objectives In this chapter, you will learn:
Web fundamentals: Clients, Servers, and Communication
Computer Communications
LESSON Networking Fundamentals Understand TCP/IP.
The Transport Layer Implementation Services Functions Protocols
Chapter 16 – Networking Outline 16.1 Introduction
Instructor Materials Chapter 5 Providing Network Services
Computer Networks.
NETWORK Unit 1 Module: 2 Objective: 7.
Slides taken from: Computer Networking by Kurose and Ross
Chapter 1 Communication Networks and Services
Lec 2: Protocols.
06- Transport Layer Transport Layer.
Understand the OSI Model Part 2
Networking for Home and Small Businesses – Chapter 6
Data Networking Fundamentals
Wednesday, September 19, 2018 What Is the Internet?
Networking for Home and Small Businesses – Chapter 6
Chapter 16: Distributed System Structures
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Topic 5: Communication and the Internet
I. Basic Network Concepts
POWERPOINT PRESENTATION ON NETWORKING Presented by Ms
Multimedia and Networks
Process-to-Process Delivery:
Lecture 1 Overview of Communication Networks and Services
Chapter Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of various network.
Information Technology Ms. Abeer Helwa
TCP/IP Protocol Suite: Review
Networking Theory (part 2)
NETWORK Unit 1 Module: 2 Objective: 7.
NETWORK Unit 1 Module: 2 Objective: 7.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Networking for Home and Small Businesses – Chapter 6
Chapter 7 Network Applications
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Computer Networks Protocols
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Network programming Lecture 1 Prepared by: Dr. Osama Mokhtar.
COMPUTER NETWORKING Presented by Pushpanjali Associate professor
Networking Theory (part 2)
Presentation transcript:

Week 2 LBSC 690 Information Technology Networks Week 2 LBSC 690 Information Technology

Computer Systems Hardware Software Types of hardware Storage hierarchy Moore’s law Software Types of software Types of interfaces

Types of Software Application programs (e.g., Internet Explorer) What you normally think of as a “program” Compilers and interpreters (e.g., JavaScript) Allow programmers to create new behavior Operating system (e.g., Windows XP) Moves data between disk and RAM (+lots more!) Embedded program (e.g., BIOS) Permanent software inside some device

Installing Applications Copy to a permanent place on your hard drive From a CD, the Internet, … Installs any other required programs “DLL” files can be shared by several applications Register the program’s location Associates icons/start menu items with it Configures the uninstaller for later removal Configure it for your system Where to find data files and other programs

Discussion Point: What’s a Virus? Characteristics Initiation Behavior Propagation Spyware Detection

Graphical User Interfaces Easy way to perform simple tasks Used to start programs, manage files, … Relies on a physical metaphor (e.g., a desktop) Built into most modern operating systems Windows XP, Mac System 10, Unix X-windows Application programs include similar ideas Point-and-click, drag and drop, …

Cursor-based Interfaces Useful for specifying complex operations Available in most operating systems SSH connection to WAM Command window in Windows XP Used when graphical display is difficult Dial-in access from older computers

Network Computers and devices connected via Communication devices Transmission media

Why Network? Sharing data Sharing information Sharing hardware Sharing software Increasing robustness Facilitating communications Facilitating commerce

Packet vs. Circuit Networks Telephone system (“circuit-switched”) Fixed connection between caller and called High network load results in busy signals Internet (“packet-switched”) Each transmission is routed separately High network load results in long delays

Packet Switching Break long messages into short “packets” Keeps one user from hogging a line Route each packet separately Number them for easy reconstruction Request retransmission for lost packets Unless the first packet is lost!

Networks of Networks Local Area Networks (LAN) Connections within a room, or perhaps a building Wide Area Networks (WAN) Provide connections between LANs Internet Collection of WANs across multiple organizations

Local Area Networks Within a campus or an office complex Short-distance lines are fast and cheap Fast communications makes routing simple Ethernet is a common LAN technology All computers are connected to the same cable Ordinary phone lines can carry 10 Mb/sec Every host broadcasts everything to all others Collisions limit throughput to about 50% utilization

Shared Network All attach to the same cable Transmit anytime Ethernet and “cable modems” Transmit anytime Collision detection Automatic retransmission Inexpensive and flexible Easy to add new machines Robust to computer failure Practical for short distances Half the bandwidth is wasted

Switched (“Star”) Network All attach directly to a hub Switched Ethernet Digital Subscriber Lines (DSL) Higher cost Line from hub to each machine Hub must handle every packet Hub requires backup power Much higher bandwidth No sharing, no collisions Allows disks to be centralized

Local Area Networks CSS www rac2 rac3 rac4 ttclass PLS sam kim raven ann dove joe HBK

Wireless Networks Radio-based Ethernet Effective for a few rooms within buildings “Access Point” gateways to wired networks Available throughout most of the Maryland campus Commercial providers offer “hot spots” in airports, etc. Available in two speeds IEEE 802.11b: 10Mbps (most common) IEEE 802.11g: 54Mbps (now becoming available)

http://www.tss.northwestern.edu/wireless/faq_wir.html

Wide Area Networks Campus, regional, national, or global scale Expensive communications must be used well Limiting to two hosts allows 100% utilization Routing is complex with point-to-point circuits Which path is shortest? Which is least busy? … Internet routers exchange “routing tables” Which routes seem fast, which seem slow?

An example of WAN

Ring Network Unidirectional transmission Very high bandwidth Used mostly for WANs Very high bandwidth No collisions Simple routing policies Complex management Changes must be coordinated

Maryland’s Campus Network CSS www rac2 rac3 rac4 ttclass PLS sam kim raven ann dove joe HBK

The Internet Global collection of public “IP” networks Independent Private networks are often called “intranets” Independent Each organization maintains its own network Cooperating Internet Protocol (IP) address blocks Domain names World-Wide Web Consortium (W3C) Computer Emergency Response Team (CERT)

A Short History of the Internet 1969: Origins in government research Advanced Research Projects Agency (ARPAnet) Key standards: UDP, TCP, DNS 1983: Design adopted by other agencies Created a need for inter-network connections Key standards: IP 1991: World-Wide Web added point-and-click Now 150 million Internet “hosts” Key standards: HTTP, URL, HTML, XML Moore’s law make shift from large time sharing computer facilities to individual, small but powerful computer systems, and

Overview

http://www.geog.ucl.ac.uk/casa/martin/atlas/isp_maps.html

Types of Internet “Nodes” Hosts Computers that use the network to do something Routers Specialized computers that route packets Gateway Routers that connect two networks Firewall Gateways that pass packets selectively

An Internet Protocol (IP) Address Identifies a LAN IP address: 216.183.103.150 Identifies a specific computer

Routing Tables IP Prefix Next Router Estimated Delay 216.141.xxx.xxx 120.0.0.0 18 ms 216.xxx.xxx.xxx 121.0.0.0 34 ms 101.42.224.xxx 21 ms xxx.xxx.xxx.xxx 250 ms 120.0.0.0 45.0.2.10 121.0.0.0

Domain Name Service (DNS) “Domain names” improve usability Easier to remember than numeric IP addresses DNS coverts between names and numbers Written like a postal address: general-to-specific Each name server knows one level of names “Top level” name server knows .edu, .com, .mil, … .edu name server knows umd, umbc, stanford, … .umd.edu name server knows wam, glue, ttclass, … .wam.umd.edu name server knows rac1, rac2, …

IP Addresses and Domain Names Domain Name: www.howstuffworks.com

Hands-on: Learn About Your IP Address Start a command window Select “start” on the taskbar, then “Run” Type in “cmd” and click “OK” Find your IP address Type “ipconfig /all” (and press enter) See who “owns” that address Use http://www.checkdomain.com See how packets get to your computer Use http://www.traceroute.org

The TCP/IP “Protocol Stack” Link layer moves bits Ethernet, cable modem, DSL Network layer moves packets IP Transport layer provides services to applications UDP, TCP Application layer uses those services DNS, FTP, SSH, …

User Datagram Protocol (UDP) The Internet’s basic transport service Sends every packet immediately Passes received packets to the application No delivery guarantee Collisions can result in packet loss Example: sending clicks on web browser No connection establishment. As we shall discuss in Section 3.5, TCP uses a three-way handshake before it starts to transfer data. UDP just blasts away without any formal preliminaries. Thus UDP does not introduce any delay to establish a connection. This is probably the principle reason why DNS runs over UDP rather than TCP -- DNS would be much slower if it ran over TCP. HTTP uses TCP rather than UDP, since reliability is critical for Web pages with text. But, as we briefly discussed in Section 2.2, the TCP connection establishment delay in HTTP is an important contributor to the "world wide wait". No connection state. TCP maintains connection state in the end systems. This connection state includes receive and send buffers, congestion control parameters, and sequence and acknowledgment number parameters. We will see in Section 3.5 that this state information is needed to implement TCP's reliable data transfer service and to provide congestion control. UDP, on the other hand, does not maintain connection state and does not track any of these parameters. For this reason, a server devoted to a particular application can typically support many more active clients when the application runs over UDP rather than TCP. Small segment header overhead. The TCP segment has 20 bytes of header overhead in every segment, whereas UDP only has 8 bytes of overhead. Unregulated send rate. TCP has a congestion control mechanism that throttles the sender when one or more links between sender and receiver becomes excessively congested. This throttling can have a severe impact on real-time applications, which can tolerate some packet loss but require a minimum send rate. On the other hand, the speed at which UDP sends data is only constrained by the rate at which the application generates data, the capabilities of the source (CPU, clock rate, etc.) and the access bandwidth to the Internet. We should keep in mind, however, that the receiving host does not necessarily receive all the data - when the network is congested,  a significant fraction of the UDP-transmitted data could be lost due to router buffer overflow. Thus, the receive rate is limited by network congestion even if the sending rate is not constrained.

Transmission Control Protocol (TCP) Built on the network-layer version of UDP Guarantees delivery all data Retransmits missing data Guarantees data will be delivered in order “Buffers” subsequent packets if necessary No guarantee of delivery time Long delays may occur without warning

Telnet Simulates a dial-up connection VT-100 protocol allows only text Read data from another machine VT-100 protocol allows only text The pine email program is designed for VT-100 X Windows extension adds graphics

File Transfer Program (FTP) Used to move files between machines Upload (put) moves from client to server Download (get) moves files from server to client Available using command line and GUI interfaces Normally requires an account on the server Userid “anonymous” provides public access Web browsers incorporate anonymous FTP Automatically converts end-of-line conventions Unless you select “binary”

Hands On: FTP Start a cmd window Type “ftp ftp.umiacs.umd.edu” Login in anonymously with User: anonymous Password: your email address Go to directory lbsc690 Type “cd pub/gina/lbsc690/” Get file “hwOne.ppt” Type “get hwOne.ppt” Exit Type “quit”

HyperText Transfer Protocol (HTTP) Send request GET /path/file.html HTTP/1.0 From: someuser@jmarshall.com User-Agent: HTTPTool/1.0 Server response HTTP/1.0 200 OK Date: Fri, 31 Dec 1999 23:59:59 GMT Content-Type: text/html Content-Length: 1354 <html><body> <h1>Happy New Millennium!</h1> … </body> </html> The Difference Between FTP and HTTP File Transfer Protocol, or FTP, is a protocol used to upload files from a workstation to a FTP server or download files from a FTP server to a workstation. It is the way that files get transferred from one device to another in order for the files to be available on the Internet. When ftp appears in a URL it means that the user is connecting to a file server and not a Web server and that some form of file transfer is going to take place. Most FTP servers require the user to log on to the server in order to transfer files. In contrast, Hyper Text Transfer Protocol, or HTTP, is a protocol used to transfer files from a Web server onto a browser in order to view a Web page that is on the Internet. Unlike FTP, where entire files are transferred from one device to another and copied into memory, HTTP only transfers the contents of a web page into a browser for viewing. FTP is a two-way system as files are transferred back and forth between server and workstation. HTTP is a one-way system as files are transported only from the server onto the workstation's browser. When http appears in a URL it means that the user is connecting to a Web server and not a file server. The files are transferred but not downloaded, therefore not copied into the memory of the receiving device.

Network Abuse Flooding Worms Sniffing Excessive activity, intended to prevent valid activity Worms Like a virus, but self-propagating Sniffing Monitoring network traffic (e.g., for passwords)

Encryption Secret-key systems (e.g., DES) Use the same key to encrypt and decrypt Public-key systems (e.g., PGP) Public key: open, for encryption Private key: secret, for decryption Digital signatures Encrypt with private key, decrypt with public key

Encrypted Standards Secure Shell (SSH) Replaces Telnet Secure FTP (SFTP)/Secure Copy (SCP) Replaces FTP Secure HTTP (HTTPS) Used for financial and other private data Wired Equivalent Protocol (WEP) Used on wireless networks

Before You Go On a sheet of paper, answer the following (ungraded) question (no names, please): What was the muddiest point in today’s class?