1 The Internet Ideas formulated in the early 1960’s. Fundamental work done around 1970. Some steps involved: –Creating the network idea. –Creating the.

Slides:



Advertisements
Similar presentations
Network Layer and Transport Layer.
Advertisements

1 Computer Files Stored on disks, CDs, tapes, in memory. Types of files: plain text, formatted (.doc.xls etc…), binary (executable). A disk has a directory.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
The Internet. Telnet Telnet means using your computer as a terminal. All commands you type are sent to the host computer you are connected to and executed.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
CS 497C – Introduction to UNIX Lecture 35: - TCP/IP Networking Tools Chin-Chih Chang
Inside of a computer… What happens when you turn your computer on? What loads? Where are applications stored? How are do they run? In what form is information.
Communication Network Protocols Jaya Kalidindi CSC 8320(fall 2008)
Process-to-Process Delivery:
Agenda What is Computer Programming? The Programming Process
TCP/IP protocols Communication over Internet is mostly TCP/IP (Transmission Control Protocol over Internet Protocol) TCP/IP "stack" is software which allows.
Rhys McBreen (How the internet works) X. Contents The Layers and what they do IP Addressing X.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
Networking Basics TCP/IP TRANSPORT and APPLICATION LAYER Version 3.0 Cisco Regional Networking Academy.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Presentation on Osi & TCP/IP MODEL
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
CPS Today’s topics Computer Applications Computer Communications Upcoming Computer Security ( Great Ideas, Chapter 11) Reading Great Ideas, Chapter.
Huda AL_Omairl - Network 71 Protocols and Network Software.
Mail merge I: Use mail merge for mass mailings Perform a complete mail merge Now you’ll walk through the process of performing a mail merge by using the.
Network Services Networking for Home & Small Business.
1 Version 3.0 Module 11 TCP Application and Transport.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
1 CSC111H Client-Server: An Introduction Dennis Burford
1 Unix and the Internet Pine System and Netscape.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
TCP/IP TCP/IP LAYERED PROTOCOL TCP/IP'S APPLICATION LAYER TRANSPORT LAYER NETWORK LAYER NETWORK ACCESS LAYER (DATA LINK LAYER)
TCP/IP Transport and Application (Topic 6)
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Internet Protocol B Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
CHAPTER 5 TCP/IP PROTOCOLS. P ROTOCOL STANDARDS Protocols are formal rules of behavior When computers communicate, it is necessary to define a set of.
Data Networking Fundamentals Chapter 7. Objectives In this chapter, you will learn to: Discuss basic networking concepts, including the elements common.
Unix and Samba By: IC Labs (Raj Kidambi). What is Unix?  Unix stands for UNiplexed Information and Computing System. (It was originally spelled "Unics.")
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Networking Material taken mainly from HowStuffWorks.com.
FTP COMMANDS OBJECTIVES. General overview. Introduction to FTP server. Types of FTP users. FTP commands examples. FTP commands in action (example of use).
ENGS 112 Lecture 3 Packet Switching Chapter 3, Walrand WWW links, eg.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
CS 120 Extra: The CS1 Server Tarik Booker CS 120.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Internet Basics. The Internet: Then and Now The Internet was created by the Advanced Research Projects Agency (ARPA) and the U.S. Department of Defense.
Basic Web Design UVICELL Week 4 Templates and site management Week 4 Templates and site management.
Computer Communications
Slides taken from: Computer Networking by Kurose and Ross
Unit 4: Transport protocols
The OSI Model and the TCP/IP Protocol Suite
Using MIS 2e Chapter 6 Appendix
Networking for Home and Small Businesses – Chapter 6
Lecture 6: TCP/IP Networking By: Adal Alashban
Data Networking Fundamentals
Inside of a computer… What happens when you turn your computer on? What loads? Where are applications stored? How are do they run? In what form is information.
Networking for Home and Small Businesses – Chapter 6
The OSI Model and the TCP/IP Protocol Suite
Topic 5: Communication and the Internet
Process-to-Process Delivery:
Lecture 4 Communication Network Protocols
Lecture 6: TCP/IP Networking 1nd semester By: Adal ALashban.
Inside of a computer… What happens when you turn your computer on? What loads? Where are applications stored? How are do they run? In what form is information.
Chapter 15 – Part 2 Networks The Internal Operating System
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
Networking for Home and Small Businesses – Chapter 6
Network Models.
The OSI Model and the TCP/IP Protocol Suite
Presentation transcript:

1 The Internet Ideas formulated in the early 1960’s. Fundamental work done around Some steps involved: –Creating the network idea. –Creating the machines to run the network. –Working with different kinds of computers. –Designing generic protocols and interfaces.

2 Internet Foundations Packet switching instead of dedicated circuits. Distributed network for reliability. Machines to route traffic (IMPs). First network called ARPANET. Generic Protocols despite different end hosts. Remote Logins – Telnet. Remote File Transfer – FTP. and messaging.

3 Gateways Connect different kinds of networks. Data passed between networks is translated from one network type to another. Different Networks: –Cell Phones –Wireless Computer Networks –LANs

4 OSI Model Open System Interconnection Model Layer 7: Applications – What you see. Layer 6: Presentation – Encryption, data ordering. Layer 5: Session – Connects applications. Layer 4: Transport – Error correction. Layer 3: Network – Routing/Switching. Layer 2: Data Link – Convert data to bits. Layer 1: Physical – Move the bits using energy.

5 Addresses Networked computers need names. On the Internet, domain names and IP numbers are used. IP is the Internet Protocol, the base protocol in use on the Internet. rac3.wam.umd.edu is a host name. rac3.wam.umd.edu also has an IP address:

6 Domain Names Consider rac3.wam.umd.edu. –The top-level domain is.edu –The domain name is umd.edu –The subdomain is wam. –The machine is rac3. Top-level domains include.com,.net,.org, etc… Names can be assigned depending on access and permissions. Most domains represent many computers.

7 Domain lookup nslookup whois wam.umd.edu whois –h whois.networksolutions.com wam.umd.edu Whois without the middle –h whois.net… argument will tell which domain server has the domain information.

8 IP Addresses Numbers that identify computers on the Internet. Many times assigned in blocks. They have 4 numbers. Each number is between 0 and 255 inclusive is an IP address.

9 Internet Protocol (IP) Breaks information into packets. IP is the “network protocol”. IP is “unreliable”, no guarantee of delivery. IP is connectionless – packets can take different paths. Packets may arrive out of order.

10 TCP (Transmission Control Protocol) Controls the organization of the information. Provides reliability by ordering packets. It resends “lost” packets. Duplicates are ignored. Checks for transmission errors using a checksum.

11 Other Protocols Mail, telnet, ftp, newsgroups, and webpages all work with different protocols. They are protocols on top of TCP/IP. –Their messages are reliable. –They add extra data and rules. –They send specific types of information.

12 Ports A single machine can listen for many different types of connections. Like different apartment numbers in a building. Telnet is on port 23, ftp on port 21, www on port 80. You can use other ports above 1023 for special programs.

13 Class Cluster Accounts Unix Accounts. On machines called the “detective cluster”. WAM is at wam.umd.edu Detective machines are at dc.umd.edu Names – holmes marlowe marple tracy wolfe

14 Login Names My account name on WAM is johna My account name on cs is jra My account name on dc is ja102001

15 Multiple Accounts Each account has similar features like , but the addresses are different. Logging into different accounts means logging into different machines. Each client uses one of a few common protocols.

16 Logging in It’s like using your WAM account for mail. The command to use to login is called telnet. On Windows click on the start button, then click on run, then type telnet. On a WAM lab UNIX machine type telnet on any command line. If you are on a MAC use NCSA telnet.

17 Class Cluster Accounts The name of your class account host – the computer where the class accounts are stored is dc.umd.edu Type o dc.umd.edu o can be replaced with open. Type your login and password.

18 First steps Newsgroups will show up. You don’t have to read this right now. Keep typing q and space until you exit the news program. Your prompt will look like: % Directories are like folders – lists of files. Type ls -- lists the files in a directory. Try ls –l Try ls –la Try ls -F

19 Directories and files Directories organize files into a hierarchy. Files contain data and programs. Path – where something is in the hierarchy. cd – change directory –cd name -- go to directory named name –cd.. -- move up a directory –cd -- change to home directory –cd ~ja102001

20 Help and Logging out man -- gives help on commands. –There is no “help” command, use man. logout -- lets you log off the machine. man –k keyword -- gives you a list of commands that have information about the keyword, such as man –k password.

21 Initial commands Type cd ~ja Type ls -l Type more Syllabus Type cp Syllabus ~ Type mail –Read new mail by hitting enter. –Quit mail by typing quit.

22 Get project 1 Type cd ~ja Type cd project1 Type cp project1.description ~ To print out project 1 for pickup at the AVW pickup window: –Type qpr –q prl project1.description –If you want to use your own printer or the WAM printers (10cents a page) you may. –Use lpr project1.description for local printers.

23 Setting Up Type ~ja102001/setup Copy down the project code. If you forget your project code –Type echo $uid Type cd or type cd ~ –This will send you back to your home directory.

24 Using pico 1 Simple text editor. Type pico syllabus –The file is not there, so the file is blank. Type pico Syllabus –The file IS there. UNIX is case sensitive. You can use arrow keys to move around.

25 Using pico 2 The letter ^ will represent “control”, as in ^x means hold down control and type x. Some important commands: –^c (cancel) stops whatever you are doing and returns you to regular editing. –^x quit and save. –^o write out (save) the current file. It asks for a new name.

26 Using pico 3 If you don’t want to use the arrow keys to move around the screen, you can also use the following keys: –^p move to previous line –^n move to next line –^b move left one space –^f move right one space

27 Using pico 4 ^a move to the start of a line. ^e move to the end of a line. ^y move up a page. ^v move down a page.

28 Using pico 5 Other Commands –^d delete current character. –Backspace delete previous character. –^k delete current line. –^u pastes last deleted line to current position. –^k and ^u can be combined to copy text.

29 Using pico 6 Some more commands –^w lets you search for text. –^m inserts a blank line above the current one. –^r read in (insert) an external file. –^t invoke the spell checker.