Networking and the Internet

Slides:



Advertisements
Similar presentations
(4.4) Internet Protocols Layered approach to Internet Software 1.
Advertisements

Computer Networks and the Internet CMPT 109 Montclair State University.
MODULE 11 DOCUMENTS ON WEB 11.1 The internet and the world wide web 11.2 Documents and the world wide web Systems Analysis And Design © Systems Analysis.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Shalini Bhavanam. Key words: Basic Definitions Classification of Networks Types of networks Network Topologies Network Models.
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
Internet…issues Managing the Internet
Copyright © 2015 Pearson Education, Inc. Chapter 4: Networking and the Internet Computer Science: An Overview Twelfth Edition by J. Glenn Brookshear Dennis.
Chapter 15 Networks.
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Tenth.
1 Networking A computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources. The.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
COMPUTER NETWORKS.
©Brooks/Cole, 2003 Chapter 6 Computer Networks. ©Brooks/Cole, 2003 Understand the rationale for the existence of networks. Distinguish between the three.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Tenth.
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Tenth.
Networks and Telecommunications
Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved.
The Internet, Intranets, & Extranets Chapter 7. IS for Management2 The Internet (1) A collection of networks that pass data around in packets, each of.
Connecting one computer to another computer creates a network.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Presentation on Osi & TCP/IP MODEL
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Chapter 4 Networking and the Internet Introduction to CS 1 st Semester, 2015 Sanghyun Park.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Tenth.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
Copyright © 2015 Pearson Education, Inc. Chapter 4: Networking and the Internet.
Chapter 4 Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved.
Lecture 10: 9/26/2002CS149D Fall CS149D Elements of Computer Science Ayman Abdel-Hamid Department of Computer Science Old Dominion University Lecture.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Chapter 4 Networking and the Internet. © 2005 Pearson Addison-Wesley. All rights reserved 4-2 Chapter 4: Networking and the Internet 4.1 Network Fundamentals.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
Overview of computer communication and Networking Communication VS transmission Computer Network Types of networks Network Needs Standards.
Chapter 4 Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved.
Copyright © 2012 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
CHAPTER 5 TCP/IP PROTOCOLS. P ROTOCOL STANDARDS Protocols are formal rules of behavior When computers communicate, it is necessary to define a set of.
Chapter 4 Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
CSE 6590 Department of Computer Science & Engineering York University 111/9/ :26 AM.
Data Networking Fundamentals Chapter 7. Objectives In this chapter, you will learn to: Discuss basic networking concepts, including the elements common.
The Internet Lecture 16 CSCI 1405, CSCI 1301 Introduction to Computer Science Fall 2009.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Connecting to the Network Introduction to Networking Concepts.
1 OSI and TCP/IP Models. 2 TCP/IP Encapsulation (Packet) (Frame)
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Net 221D:Computer Networks Fundamentals
COMPUTER NETWORKS Hwajung Lee. Image Source:
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Tenth.
Chapter Objectives In this chapter, you will learn:
Instructor Materials Chapter 5 Providing Network Services
Computer Networks.
NETWORK Unit 1 Module: 2 Objective: 7.
Lecture 6: TCP/IP Networking By: Adal Alashban
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Networking and the Internet
TCP/IP Protocol Suite: Review
NETWORK Unit 1 Module: 2 Objective: 7.
NETWORK Unit 1 Module: 2 Objective: 7.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Presentation transcript:

Networking and the Internet Chapter 4 Networking and the Internet

Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Network Protocols 4.5 Security

Network classifications Networks--Isolated computers can be connected to work together via networking. Classifications Local area network (LAN) --on a single building or a group of buildings. Such as university campus, a manufacture plant, or the like. Wide area network (WAN)—one LANs can be connected to other LANs over any distance through telephone lines or radio waves. Such as city.

Network classifications Closed, or proprietary--held by an individual corporation like Novell networks. Open--networks have the ownership in the public domain like the Internet

Network classifications Characteristics of Network Topology—The geometric arrangement. Protocols:The rules and encoding specifications for sending data. Media---Devices are connected by twisted-pair wire, coaxial cables, or fiber optics, or radio waves.

Network topologies Ring Bus Star Irregular

Figure 4.1 Network topologies

Figure 4.1 Network topologies (cont’d)

Connecting networks Networked computers can be connected in a hierarchical fashion as an internet. DARPA (Defense Advanced Research Projects Agency) initiated the Internet in 1973. Interconnection of networks are achieved through routers or proprietary gateways(earlier terms for routers). Bridge: connects two compatible networks Router: connects two incompatible networks Resulting “network” is called an internet

Figure 4.2 The distinction between a bridge and a router

Inter-process communication Clients: a client makes requests to servers.􀂄 Servers: a server performs the service and sends replies back to the client (s). Ex:A machine with high-capacity disk drive contains all the records of other machine (servers, the others—clients)

Figure 4.3 The client/ server model

Inter-process communication Inside the same machine, or among the machines over the networks. Client-server One server, many clients Server must execute continuously Client initiates communication Peer-to-peer Two processes communicating as equals Peer processes can be short-lived

Figure 4.4 The client/server model compared to the peer-to-peer-model

Distributed systems Systems with parts that run on different computers Multiple independent computers communicating over a network to accomplish a common task Infrastructure usually provided by standardized toolkits Example: Enterprise Java Beans from Sun Microsystems Example: .NET framework from Microsoft

1. Which of the following is not a way of classifying networks?   A. WAN versus LAN B. Closed versus open C. Router versus bridge D. Star versus bus ANSWER: 2 Which of the following is not a means of performing interprocess communication over a network? A. Client/server B. ICANN C. Peer-to-peer

The Internet The Internet: one internet spanning the world Started by DARPA in 1973 Today involves millions of machines

Internet Architecture Domain = network or internet controlled by one organization Gateway = router connecting a domain to the cloud cloud = the rest of the internet Domains must be registered by their owners Internet Corporation for Assigned Names & Numbers (ICANN) serves as registrar

Figure 4.5 A typical approach to connecting to the Internet

Strategies for connecting to the Internet Large organization: buy a direct connection Small organization or individual: link domain to the domain of an ISP ISP = Internet Service Provider Individual: temporarily link computer into ISP’s domain

Internet Addressing: IP Addresses IP address = 32 bit identifier for a machine Network identifier = part assigned by ICANN Host address = part assigned by domain owner Dotted decimal notation = standard for displaying IP addresses Example: 192.207.177.133

Internet addressing: host names Host name = mnemonic name Example: mymachine.aw.com Domain name = part assigned by a registrar Example: aw.com Top level domain = classification of domain owner By usage – Example: .com = commercial By country – Example: .au = Australia Subdomains and individual machine names Assigned by domain owner Domain owner must run a name server .

Connecting networks InterNIC(Internet Network Information Center) regulates the 32-bit address of domains and thus each machine= network identifier (x-bit) + host address (32–x -bit).􀂄 The network identifier of the mnemonic domain name“nthu.edu.tw” is “140.114” determined globally, while “nyx.cc”is “63.1”assigned locally by the Computer Center of NTHU.⇒ The host machine “nyx.cc.nthu.edu.tw”has an address “140.114.63.1”.

Internet applications Electronic main (e-mail) File Transfer Protocol (FTP) Remote login: telnet, etc. World Wide Web

Electronic mail Mail server: set up by domain owner Mail sent from domain members goes through mail server Mail sent to domain members is collected by mail server

If the network identifier of a domain in the Internet is 115 If the network identifier of a domain in the Internet is 115.48, how many unique IP addresses are available for identifying machines within the domain?   A. 4096 B. 16,384 C. 32,768 D. 65,536 . Which of the following is not an application of the Internet? A. FTP B. Email C. Telnet D. RING

World Wide Web Atop the Internet, the WWW allows the propagation of multimedia documents. --The hypermedia documents consists of hypertexts: texts, audiovisual contents, links. Server disseminates hypertext (or hypermedia) documents Web site = all hypertext documents controlled by one organization or individual Usually all at same internet address HTML = language of hypertext documents Other content can also be disseminated Example: images

World Wide Web implementation Web server: provides access to documents on its machine as requested Browser: allows user to access web pages Hypertext Transfer Protocol (HTTP): communication protocol used by browsers and web servers Uniform Resource Locator (URL): unique address of a document on the web

Figure 4.6 A typical URL

Hypertext document format Entire document is printable characters Contains tags to control display Display appearance Links to other documents and content Dynamic functions

Figure 4.7 A simple Web page

Figure 4.7 A simple Web page (cont’d)

Figure 4.8 An enhanced simple Web page

Figure 4.8 An enhanced simple Web page (cont’d)

Extensible Markup Language (XML) XML: a language for constructing markup languages similar to HTML A descendant of SGML(Standard Generalized Markup Language) For math, multimedia, music and Web pages

Figure 4.9 The first two bars of Beethoven’s Fifth Symphony

Dynamic web pages(i.e. search) Client-side(specifies topic of interest) Examples: java applets, java script, Macromedia Flash Server-side(identifying documents) Common Gateway Interface (CGI) Servlets—allow clients to execute programs units in servers PHP(personal home page)

Network protocols: transmission control Token ring: one-way communication around ring network Ethernet: Uses carrier sense, multiple access with collision detection (CSMA/CD) Popular for bus networks Like a conversation in small group

Figure 4.10 Communication over a ring network

Figure 4.11 Communication over a bus network

Figure 4.12 Package-shipping example

Figure 4.13 The Internet software layers

Figure 4.14 Following a message through the Internet

Internet software layers Application layer: Example: browser Transport layer: TCP/IP, UDP Network layer: handles routing through the internet Link layer: handles actual transmission of packets Token ring or Ethernet

Delivery of messages The transport layer takes the message from the application layer, packages them with additional tags (50+bytes including sequence #, …) into packets of a size compatible with the beneath network layer, and hands over to the network layer.􀂄 The network layer will properly forward these packets to the very network specified by the application layer.􀂄 The same prefix of both addresses ⇔on the same network.􀂄 Different ⇒the network layer appending the address of a router in the current network sends the packets to that router. (maybe, intermediate routers) 􀂄 The link layer does the actual transmission between machines and routers by local addressing system with additional wrapping. ⇒striped off at the message destination.

TCP/IP Protocol Suite It is the network layer to determine the destination of the next hop (network).􀂄 The routing table in the network layer contains the final destination addresses and intermediate addresses. [NAT: IP address vs. Link address]􀂄 The information in this table routinely exchanges and propagate through the Internet.􀂄 Packets of the same message may travel along different paths.􀂄 Once all packets of the message are received (using sequence #), the target transport layer hands it over to its application layer. [complete delivery]􀂄 The response time of the Internet is rather instant in milliseconds.􀂄

TCP/IP Protocol Suite �The TCP/IP protocol suite defines a collection of protocols beside TCP and IP.􀂄 IP(Internet Protocol) defines the network layer service.􀂄 --Hop count, TTL (time to live, 64): decrement per hop forwarding, avoiding circling.􀂄 TCP(Transmission Control Protocol) defines a reliable transport service.􀂄 --Two ends first build an acknowledged connection and confirms each subsequent packet delivery in sequence.􀂄 UDP(User Datagram Protocol) defines a more efficient but less reliable transport service.􀂄 One end sends the data merely to the destination address regardless of its reception.􀂄 ISO (International Organization for Standardization) develops the OSI (Open System Interconnection) reference model using 7 layers –Application, Presentation, Session, Transport, Network, Data Link, & Physical.

Figure 4.15 Choosing between TCP and UDP

A. Application B. Transport C. Network D. Link Which layer of the TCP/IP hierarchy actually transmits a message? A. Application B. Transport C. Network D. Link Which layer of the TCP/IP hierarchy chops messages into units whose size is compatible with the Internet? Which layer of the TCP/IP hierarchy decides the direction in which message segments are transferred across the Internet?   Which layer of the TCP/IP hierarchy presents incoming messages to the computer user?

Network security Connecting to the networks, a machine becomes accessible to the general public.􀂄 Unauthorized access: attack on confidentiality.􀂄 Protection on personal information Vandalism: malicious acts from hackers, computer viruses, or network worms. Computer Virus—a program segment that attaches itself to other programs in computer systems. Worms—an autonomous program that transfers itself through a network, taking up residence in machines and forwarding copies of itself through network. 􀂄

Network security Privacy of communication Public-key encryption Public key and private key: (asymmetric)􀂄 A and B each have pairs of public key and private key: PA, pA, and PB, pB.􀂄 --Private keys are held by individuals, while public keys are known to the party.􀂄 Authenticated receiver: (only B has pB to decrypt the received data)􀂄� Authenticated sender: (only A has pA to send that encrypted data)􀂄

Integrity of machine exposed to internet Network security Integrity of machine exposed to internet Attacks: viruses and worms Defense: firewall Firewall software that filters the traffic entering or passing through a machine(network layer to reject traffics from an entire domain or a specific IP)

A. ICANN B. Firewall C. Encryption D. Public key The primary purpose of which of the following is not the enhancement of security?   A. ICANN B. Firewall C. Encryption D. Public key    Which of the following is not a means of referencing entities on the Internet? A. URL B. IP address C. Anonymous FTP D. Host address