Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.

Slides:



Advertisements
Similar presentations
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Advertisements

Network Services Networking for Home & Small Business.
Data Communication And Internet Technology
OSI Model.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Introduction To Networking
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
1 Review of Important Networking Concepts Introductory material. This module uses the example from the previous module to review important networking concepts:
Vocabulary URL = uniform resource locator: web address protocol –set of rules that networked computers follow in order to share data and coordinate communications.
網際網路協定基礎介紹 Data Communications and Computer Networks: A Business User’s Approach Fifth Edition (Chap 10)
©Brooks/Cole, 2003 Chapter 6 Computer Networks. ©Brooks/Cole, 2003 Understand the rationale for the existence of networks. Distinguish between the three.
Chapter Overview TCP/IP Protocols IP Addressing.
1 Review of Important Networking Concepts Introductory material. This slide uses the example from the previous module to review important networking concepts:
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
1.  A protocol is a set of rules that governs the communications between computers on a network.  Functions of protocols:  Addressing  Data Packet.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Chapter 9.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
INTERNET DATA FLOW Created by David Whitchurch for ISDS 4120 Louisiana State University.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Cisco 1 - Networking Basics Perrine. J Page 19/17/2015 Chapter 9 What transport layer protocol does TFTP use? 1.TCP 2.IP 3.UDP 4.CFTP.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Network Services Networking for Home & Small Business.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
COMT 6251 Network Layers COMT Overview IP and general Internet Operations Address Mapping ATM LANs Other network protocols.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
1 Figure 3-2: TCP/IP Standards (Study Figure) Origins  Defense Advanced Research Projects Agency (DARPA) created the ARPANET  An internet connects multiple.
CS1Q Computer Systems Lecture 17 Simon Gay. Lecture 17CS1Q Computer Systems - Simon Gay2 The Layered Model of Networks It is useful to think of networks.
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
Internet Protocol B Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
Chapter 6 Data Communications. Network Collection of computers Communicate with one another over transmission line Major types of network topologies What.
CSE 6590 Department of Computer Science & Engineering York University 111/9/ :26 AM.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
Networking Fundamentals Network Protocols. Protocol Rule for how networks communicate Each OSI layer handled by one or more protocols Protocol Suites.
TCP/IP (Transmission Control Protocol / Internet Protocol)
1 OSI and TCP/IP Models. 2 TCP/IP Encapsulation (Packet) (Frame)
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
Networking Material taken mainly from HowStuffWorks.com.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
1 Internet Protocols To support the Internet and all its services, many protocols are necessary Some of the protocols that we will look at: –Internet Protocol.
Transmission Control Protocol (TCP) Internet Protocol (IP)
Enterprise Network Systems TCP Mark Clements. 3 March 2008ENS 2 Last Week – Client/ Server Cost effective way of providing more computing power High specs.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
2.1 Chapter 2 Network Models – cont. Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Communication Network Models
- 1 - DPNM Review of Important Networking Concepts J. Won-Ki Hong Dept. of Computer Science and Engineering POSTECH Tel:
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Introduction to TCP/IP.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
How is all that data traffic controlled on the Internet?
Distributed Systems.
Part I. Overview of Data Communications and Networking
Lec 2: Protocols.
Using MIS 2e Chapter 6 Appendix
Networking for Home and Small Businesses – Chapter 6
Lecture 6: TCP/IP Networking By: Adal Alashban
Network Architecture Introductory material
Networking for Home and Small Businesses – Chapter 6
Packet Switching To improve the efficiency of transferring information over a shared communication line, messages are divided into fixed-sized, numbered.
Review of Important Networking Concepts
Lecture 6: TCP/IP Networking 1nd semester By: Adal ALashban.
Computer communications
TCP/IP Protocol Suite: Review
How Our Customers Communicate With Us
Networking for Home and Small Businesses – Chapter 6
Presentation transcript:

Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-2 Study Questions How does travel? What is a communications protocol? What are the functions of the five TCP/IP OSI layers? How does the Internet work? How does become ?

© 2008 Prentice Hall, Experiencing MIS, David Kroenke CE 7-3 How Does Travel? Messages and attachments sent from first computer – Broken down into pieces – Pieces called packets Routers determine the best way to move messages through Internet System employed to ensure all pieces are received – Packets resent if necessary Messages and attachments reassembled at recipient’s computer

© 2008 Prentice Hall, Experiencing MIS, David Kroenke CE 7-4 What Is a Communications Protocol? Protocol – Standardized means – Used for coordinating activities – Sequence of ordered steps Communications protocol – Means for coordinating activities between communicating computers Computers agree on protocol to use – Broken down into layers

© 2008 Prentice Hall, Experiencing MIS, David Kroenke CE 7-5 Layered Protocol Schemes Protocol architectures – Reference Model for Open Systems Interconnection (OSI) Developed by International Organization for Standardization (ISO) – Transmission Control Program/Internet Protocol (TCP/IP) Developed by the Internet Engineering Task Force (IETF) – TCP/IP-OSI architecture is blend

© 2008 Prentice Hall, Experiencing MIS, David Kroenke CE 7-6 TCP/IP-OSI Architecture Figure CE7-3

© 2008 Prentice Hall, Experiencing MIS, David Kroenke CE 7-7 Terminology Architecture – Arrangement of protocol layers Each layer performs specific tasks Protocol – Exist at each layer of architecture – Set of rules that accomplish tasks at that layer Program – Specific computer product – Implements a protocol

© 2008 Prentice Hall, Experiencing MIS, David Kroenke CE 7-8 Layer 5 Protocols – Simple Mail Transfer Protocol (SMTP) Standard protocol – Hypertext Transfer Protocol (HTTP) Processes Web pages – File Transfer Protocol (FTP) Used to copy files from one computer to another

© 2008 Prentice Hall, Experiencing MIS, David Kroenke CE 7-9 Layer 4 Transmission Control program (TCP) – Converts from one data representation to another – Breaks into segments Adds identifying segments to beginning of pieces – Provides reliability Checks to see if all packets are received

© 2008 Prentice Hall, Experiencing MIS, David Kroenke CE 7-10 Layer 3 Internet Protocol – Interacts with TCP in Layer 4 – Routers send messages across Internet Works through IP Special purpose computers – Packages messages into packets Places IP data in front of TCP data

© 2008 Prentice Hall, Experiencing MIS, David Kroenke CE 7-11 Layers 1 and 2 Switches facilitate data communications Layer 2 protocols – Program packages packets into frames Basic computer connectivity accomplished at layers 1 and 2

© 2008 Prentice Hall, Experiencing MIS, David Kroenke CE 7-12 Network Addresses: MAC and IP MAC addresses – Physical addresses – Implemented by programs that use Layer 2 protocols – Each NIC card given an address by manufacturer – Address only shared within network or segment IP addresses – Logical addresses – Written as series of dotted decimals – Not permanently associated with hardware device Can be reassigned as necessary

© 2008 Prentice Hall, Experiencing MIS, David Kroenke CE 7-13 IP Addresses Two kinds of IP addresses: – Public Used on Internet Assigned by ICANN Each address is unique – Private Used within private networks Controlled by company operating network

© 2008 Prentice Hall, Experiencing MIS, David Kroenke CE 7-14 Dynamic Host Configuration Protocol DHCP Distributes temporary IP address to computers – Address loaned while computer connected to LAN – When computer disconnected, IP address made available to others

© 2008 Prentice Hall, Experiencing MIS, David Kroenke CE 7-15 Private IP addresses Assigned manually by network administrator Usually given to: – Web servers – Shared devices Most users are given addresses by DHCP

© 2008 Prentice Hall, Experiencing MIS, David Kroenke CE 7-16 Networks Figure CE7-1

© 2008 Prentice Hall, Experiencing MIS, David Kroenke CE 7-17 Using TCP/IP-OSI Protocols Within the Hotel Hotel has private Web server – IP address of server assigned by network administrator Guest computer signs into Web server – Guest browser constructs request for server – Uses HTTP TCP breaks request into segments, adds additional data TCP program hands segments to program that implements IP

© 2008 Prentice Hall, Experiencing MIS, David Kroenke CE 7-18 Using TCP/IP-OSI Protocols Within the Hotel (continued) IP program adds header into packet Passes on to program that implements Ethernet Ethernet program translates IP address into MAC address Ethernet wraps packet into frame – Sends packet through switch

© 2008 Prentice Hall, Experiencing MIS, David Kroenke CE 7-19 Switches and Routers Switches – Switch table Table of data – Entries for every device on network – Work with frames in Layer 2 – Use MAC addresses Routers – Routing tables Directs packet traffic on Internet Work with packets in Layer 3 Use IP addresses

© 2008 Prentice Hall, Experiencing MIS, David Kroenke CE 7-20 Accessing Hotel Web Server Figure CE7-6

© 2008 Prentice Hall, Experiencing MIS, David Kroenke CE 7-21 Using TCP/IP-OSI Protocols Within the Hotel (continued) Switch consults switch table Directs frame to router Ethernet unpacks frame, send packet to IP Router consults routing table, sends packet one hop down Internet Ethernet determines MAC address needed – Ethernet packages packet into frame addressed to appropriate MAC address – Sends frame to switch

© 2008 Prentice Hall, Experiencing MIS, David Kroenke CE 7-22 Using TCP/IP-OSI Protocols Within the Hotel (continued) Switch sends frame to destination Ethernet unpacks frame, send packet to IP program IP program strips off header Sends segment to program that implements TCP TCP sends acknowledgement back to guest computer indicating receipt When both segments received, sent to Web server program – Processes HTTP request

© 2008 Prentice Hall, Experiencing MIS, David Kroenke CE 7-23 Network Address Translation Internet traffic uses public IP addresses – Assigned in blocks Routers may have two IP addresses – Private one assigned by organization for local traffic – Public one assigned by ISP for Internet traffic Network Address Translation – Process of changing public IP addresses into private addresses and reverse – Routers receive packets on Internet and redirects them to individual computers on local network

© 2008 Prentice Hall, Experiencing MIS, David Kroenke CE 7-24 Your You enter address of recipient – program works at application layer Implements SMTP to send Uses domain name system to get public IP address message sent to router – Sends message to TCP Breaks into segments, placed in packets Sent to router Packets sent to Ethernet program – Placed in frame – Sent to switch, sent to router

© 2008 Prentice Hall, Experiencing MIS, David Kroenke CE 7-25 Your (continued) Packets arrive at router – Implements NAT – Replaces private IP address with public IP address Router consults table, sends to gateway router of recipient Segments unpacked from packets, sent to TCP program Program waits for all segments, then sends to program that implements SMTP Program operates at Layer 5, puts message in mailbox

© 2008 Prentice Hall, Experiencing MIS, David Kroenke CE System Figure CE7-7

© 2008 Prentice Hall, Experiencing MIS, David Kroenke CE 7-27 Domain Name System DNS – Converts user-friendly names into public IP address – Resolves domain name ICANN manages resolution system Domain name – Registered name Uniform Resource Locator (URL) – Document’s Web address

© 2008 Prentice Hall, Experiencing MIS, David Kroenke CE 7-28 Domain Name Resolution ICANN manages root servers – 13 computers across the world – Maintain lists of IP addresses of servers Domain name resolvers – Cache name and IP address on local file – Used instead of going through entire resolution process

© 2008 Prentice Hall, Experiencing MIS, David Kroenke CE 7-29 Active Review How does travel? What is a communications protocol? What are the functions of the five TCP/IP OSI layers? How does the Internet work? How does become ?