Network and the internet Part four Introduction to computer, 2nd semester, 2009/2010 Mr.Nael Aburas Faculty of Information.

Slides:



Advertisements
Similar presentations
Internet and WWW CS216. Open System Interconnection (OSI)
Advertisements

Internet – Part I. What is Internet? Internet is a global computer network of inter-connected networks.
Computer networks SATISH MISHRA,PGT CS,KV TRIMULGHERRY.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
The Internet Useful Definitions and Concepts About the Internet.
Layer 7- Application Layer
Chapter 29 Structure of Computer Names Domain Names Within an Organization The DNS Client-Server Model The DNS Server Hierarchy Resolving a Name Optimization.
Fundamentals of Electronic Mail From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Advantages.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
-I CS-3505 Wb_ -I.ppt. 4 The most useful feature of the internet 4 Lots of different programs, but most of them can talk to each.
Electronic Mail (SMTP, POP, IMAP, MIME)
1 What is Electronic Mail Exchanging information via computer networks Electronic mail addresses SMTP (Simple Mail Transfer Protocol) Client/Server based.
15-1 More Chapter 15 Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of.
Forensic and Investigative Accounting
Computer Concepts 2014 Chapter 7 The Web and .
Operating system Part two Introduction to computer, 2nd semester, 2010/2011 Mr.Nael Aburas Faculty of Information.
1 Chapter Internet Applications (DNS, )
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Electronic Mail Originally –Memo sent from one user to another Now –Memo sent to one or more mailboxes Mailbox –Destination point for messages.
Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Netwrok and the internet Part two Introduction to computer, 2nd semester, 2009/2010 Mr.Nael Aburas Faculty of Information.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
Chapter 9.
© 2006 Pearson Education 1  Obj: 1.2, to understand networks HW: Review sheet  Quiz next class Sections 1.0 – 1.2  Do Now: p.47 #1.4 and 1.5 C1 D3.
Chapter 4 Networking and the Internet Introduction to CS 1 st Semester, 2015 Sanghyun Park.
Internet Overview Part II Mrs. Wilson Internet Basics & WAY Beyond!
Computer Networks. IP Addresses Before we communicate with a computer on the network we have to be able to identify it. Every computer on a network must.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
Network Installation. Internet & Intranets Topics to be discussed Internet. Intranet. .
15 Semester 1 JEOPARDY IndirectnetworksupportDNSDNSNetworkApps.NetworkApps.MoreNetworkApps.Misc.Misc
Lecture#1 on Internet. Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation IP address: pattern of 32.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
1 Version 3.0 Module 11 TCP Application and Transport.
CIS 1310 – HTML & CSS 1 Introduction to the Internet.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Chapter 4 Networking and the Internet. © 2005 Pearson Addison-Wesley. All rights reserved 4-2 Chapter 4: Networking and the Internet 4.1 Network Fundamentals.
Electronic Mail. Client Software and Mail Hosts –Client PC has client software that communicates with user’s mail host –Mail hosts deliver.
1 Blackboard To Log In: Go To: Click On: Login Username: Firstname.Lastname Password: Last 4 digits of S.S. # View often for.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
An Overview of the Internet: The Internet: Then and Now How the Internet Works Major Features of the Internet.
Communication, Networks, The internet and the Worldwide Web.
Copyright © 2012 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
1 Client Software and Mail Hosts Client PC has client software that communicates with user’s mail host Mail hosts deliver outgoing mail to.
Chapter 4 Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved.
(Electronic Mail) Most popular use of Internet technology Advantages Disadvantages Setting up an account Your account –User id and password.
The Internet Lecture 16 CSCI 1405, CSCI 1301 Introduction to Computer Science Fall 2009.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Network and the internet Part eight Introduction to computer, 2nd semester, 2009/2010 Mr.Nael Aburas Faculty of Information.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
TCP =Transmission Control Protocol IP = Internet Protocol TCP/IP Protocol.
1 Internet Protocols To support the Internet and all its services, many protocols are necessary Some of the protocols that we will look at: –Internet Protocol.
4343 X2 – Outline The Domain Name System The Web.
Domain Name System INTRODUCTION to Eng. Yasser Al-eimad
The Internet Salihu Ibrahim Dasuki (PhD) CSC102 INTRODUCTION TO COMPUTER SCIENCE.
Introduction to the Internet
Application layer tcp/ip
Instructor Materials Chapter 5 Providing Network Services
Level 2 Diploma Unit 10 Setting up an IT Network
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
The Internet.
Topic 5: Communication and the Internet
Protocols 2 Key Revision Points.
Delivering the Data.
Network and the internet
Objectives: 1.Identify different internet protocol (IP) 2.Configure sample of IP address 3.Appreciate and relate protocol in our life.
Presentation transcript:

Network and the internet Part four Introduction to computer, 2nd semester, 2009/2010 Mr.Nael Aburas Faculty of Information Technology Islamic University of Gaza

Internet addressing As mentioned before that each machine in the network have an address. In the Internet, addresses are known as IP address “Internet protocol”. Originally, each IP address was a pattern of 32 bits. Currently it is 128-bits (IPv6).

Internet addressing Blocks of numbered of IP address are awarded to ISPs by the internet corporation for assigned Names and Numbers (ICANN), which a corporation established to coordinate the internet’s operation. ICANN: Allocates IP addresses to ISPs who then assign those addresses within their regions. IP address are traditionally written in dotted decimal notation in which the bytes of the address are separated by periods and each byte is expressed as an integer represented in traditional base ten notation

Internet addressing For example, using dotted decimal notation, the pattern 5.2 would represent the two-byte bit pattern The bit pattern would be represent the three-byte bit pattern. In summary, a 32 bit IP address might appear as

Internet addressing Address in bit-pattern form are rarely conducive to human consumption, so that the internet has an alternative addressing system in which machines are identified by mnemonic names. This addressing system is based on the concept of a domain (region of the internet). The domain is assigned a mnemonic domain name, which is unique among all the domain names throughout the Internet.

Internet addressing As an example of domain is aw.com Note that the suffix following the period used to reflect the domain’s classification, which in this case is “commercial” These suffixes are called top-level domain (TLD). edu for educational organization. org for non-profit organization. In addition to TLDs, there are also two-letter TLDs for specific countries (called country-code TLDs) such as au for Australia and ca for Canada.

Internet addressing Each domain must be registered with ICANN- the process handled by companies called registrars. Then the organization that registered the domain is free to extend it (sub-domain. Example: enterprise.aw.com The sub-domain often represent different networks within the domain. Sub-domaindomain

Internet addressing For example: if nowhere university was assigned the domain nowhere.edu, then an individual computer might have a name such as r2.comp.nowhere.edu, meaning that the computer r2 is in the sub-domain comp within the domain nowhere.com

Internet addressing As mentioned before, messages always transferred over the internet by means of IP address. If the human send a message to a machine using a mnemonic address, the software being used must be able to convert it into an IP address before transmitting the message. This conversion is performed with the aid of servers called (name server).

Internet addressing The server used as an Internet-wide directory system known as the domain name system (DNS). The process of using the DNS to perform a translation is called a DNS lookup So the domain name must be represented within DNS

Internet applications Electronic Mail: one of the most popular uses of Internet is , a system by which messages are transferred among Internet users. For the purpose of providing service, there must be a particular machine within a domain to play the role of a mail server. Mail server are established within domain operated by access ISPs for providing mail services to users within its realm.

Electronic Mail When a user sends , it is first transferred to the user’s mail server, then nit is forwarded to the destination mail server. The protocol used to transfer mails is SMTP (simple mail transfer protocol). Because SMTP was designed for transferring text messages encoded with ACII, additional protocols such as MIME (multi purpose Internet Mail Extension) have been developed to convert non-ASCII data to SMTP compatible format

Electronic Mail Two popular protocols used for accessing that has arrived and accumulated at a user’s mail server:  POP3 (post office protocol version3)  IMAP (Internet Mail Access Protocol) POP3: user transfer (download) message to his/her computer where they can be read. IMAP: allows a user to store and manipulate message.

Electronic Mail With the role of mail server, it is easy to understand the structure of address. Username, Account name domain

File transfer protocol (FTP) One means of transferring files is to attach them to messages. FTP protocol for transferring files across the Internet. To transfer a file using FTP, a user at one computer uses a software package that implements FTP to establish contact with another computer.

File transfer protocol (FTP) FTP has become a popular way of providing limited access to data via the Internet. Example: you want to allow certain people to retrieve a file while prevent access by anyone else, you need to place the file in a machine with FTP server facilities and guard access via a password. A machine in the Internet used in this manner is sometimes called an FTP site

File transfer protocol (FTP) A commonly misunderstood feature of FTP is the distinction it makes between “text files” and “binary files”. The source of the problem is that when printing a text document with early teletype devices, a new line of text required both vertical movement (line feed) and horizontal movement (carriage return), each is encoded individually in ASCII. Vertical : Horizontal:

File transfer protocol (FTP) Some systems such as UNIX OS assumes that a line break in a text file is indicated by only a line feed. Apple use only a carriage return Microsoft requires both. The result is that when these files are transferred from one system to another, conversions must be made. If a file is transferred as a “ text file: using FTP, the required conversion will be made as apart of the transfer process. If as binary, no conversion will be made.

Telnet and secure shell One of the early uses of the Internet was to allow computer users to access computers from great distance. telnet is a protocol system that was established for this purpose. Using telnet, a user can contact the telnet server at a distance computer and then follow login procedure to gain access to the distance machine. telnet has some shortcoming, communication via telnet is not encrypted, because the use’s password is part of the communication during the login process

Telnet and secure shell Secure shell (SSH) is an alternative to telnet that offers a solution to this problem by provides encryption of data being transferred.