Copyright © 2015 Pearson Education, Inc. Chapter 4: Networking and the Internet.

Slides:



Advertisements
Similar presentations
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin APPENDIX B NETWORKS AND TELECOMMUNI CATIONS APPENDIX B NETWORKS.
Advertisements

Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
(4.4) Internet Protocols Layered approach to Internet Software 1.
IS Network and Telecommunications Risks
Connecting with Computer Science, 2e Chapter 5 The Internet.
Networking and the Internet
The Internet Useful Definitions and Concepts About the Internet.
1. 2 Technology in Action Chapter 13 Behind the Scenes: How the Internet Works Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Internet…issues Managing the Internet
1 Chapter 2 Infrastructure for Electronic Commerce.
Copyright © 2015 Pearson Education, Inc. Chapter 4: Networking and the Internet Computer Science: An Overview Twelfth Edition by J. Glenn Brookshear Dennis.
WWW and Internet The Internet Creation of the Web Languages for document description Active web pages.
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Tenth.
1 Networking A computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources. The.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
©Brooks/Cole, 2003 Chapter 6 Computer Networks. ©Brooks/Cole, 2003 Understand the rationale for the existence of networks. Distinguish between the three.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Lesson 3: Introduction to Internet Technology
CS 299 – Web Programming and Design CS299: Web Programming and Design Instructor: Dr. Fang (Daisy) Tang.
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Tenth.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Tenth.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved.
The Internet, Intranets, & Extranets Chapter 7. IS for Management2 The Internet (1) A collection of networks that pass data around in packets, each of.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
2013Dr. Ali Rodan 1 Handout 1 Fundamentals of the Internet.
Chapter 4 Networking and the Internet Introduction to CS 1 st Semester, 2015 Sanghyun Park.
Chapter 3 Hardware, Software, and Networks Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 3-1.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Tenth.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
Chapter 4 Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved.
Chapter 4 Networking and the Internet. © 2005 Pearson Addison-Wesley. All rights reserved 4-2 Chapter 4: Networking and the Internet 4.1 Network Fundamentals.
Connecting with Computer Science, 2e Chapter 5 The Internet.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
The Internet Just the Facts. Protocols TCP/IP are the TRANSPORT protocols of the Internet Services use TCP/IP to connect to other computers on Internet.
MySQL and PHP Internet and WWW. Computer Basics A Single Computer.
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
Chapter 4 Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved.
Networking Network Classification, by there: 3 The Rules they use to exchange data: Protocols.
Copyright © 2012 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Network Basics. Network Classifications Scope Scope Local area network (LAN) Local area network (LAN) Metropolitan area (MAN) Metropolitan area (MAN)
Chapter 4 Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved.
Chapter 6 Data Communications. Network Collection of computers Communicate with one another over transmission line Major types of network topologies What.
The Internet Lecture 16 CSCI 1405, CSCI 1301 Introduction to Computer Science Fall 2009.
Internet Architecture and Governance
TCP/IP (Transmission Control Protocol / Internet Protocol)
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
© 2003 Prentice Hall, Inc.4-1 Chapter 4 Telecommunications and the Internet Information Systems Today Leonard Jessup & Joseph Valacich.
INTERNET AND PROTOCOLS For more notes and topics visit: eITnotes.com.
Chapter 11 Panko and Panko Business Data Networks and Security, 10 th Edition, Global Edition Copyright © 2015 Pearson Education, Ltd. Panko and Panko.
7.1 © 2010 by Prentice Hall 4 Chapter Telecommunications, the Internet, and Wireless Technology.
Win Phillips, Ph.D Win Phillips, Ph.D. Clinical Assistant Professor University of Missouri Columbia, MO.
Chapter 11 Panko and Panko Business Data Networks and Security, 11 th Edition Copyright © 2016 Pearson Finally, Layer 5!
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Tenth.
Web Development & Design Foundations with XHTML Chapter 1 Key Concepts 1.
1 Chapter 1 INTRODUCTION TO WEB. 2 Objectives In this chapter, you will: Become familiar with the architecture of the World Wide Web Learn about communication.
Chapter Objectives In this chapter, you will learn:
Chapter 4: Networking and the Internet
Instructor Materials Chapter 5 Providing Network Services
Computer Networks.
E-commerce Infrastructure
Chapter 4: Networking and the Internet
Presentation transcript:

Copyright © 2015 Pearson Education, Inc. Chapter 4: Networking and the Internet

Copyright © 2015 Pearson Education, Inc. 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols 4.5 Security Chapter 4: Networking and the Internet 4-2

Copyright © 2015 Pearson Education, Inc. Scope –Personal area network (PAN) –Local area network (LAN) –Metropolitan area (MAN) –Wide area network (WAN) Ownership –Closed versus open Topology (configuration) –Bus (Ethernet) –Star (Wireless networks with central Access Point) Network Classifications 4-3

Copyright © 2015 Pearson Education, Inc. Figure 4.1 Network topologies 4-4

Copyright © 2015 Pearson Education, Inc. Figure 4.1 Network topologies (continued) 4-5

Copyright © 2015 Pearson Education, Inc. CSMA/CD –Used in Ethernet –Silent bus provides right to introduce new message CSMA/CA –Used in WiFi –Hidden terminal problem Protocols 4-6

Copyright © 2015 Pearson Education, Inc. Figure 4.2 Communication over a bus network 4-7

Copyright © 2015 Pearson Education, Inc. Figure 4.3 The hidden terminal problem 4-8

Copyright © 2015 Pearson Education, Inc. Repeater: Extends a network Bridge: Connects two compatible networks Switch: Connects several compatible networks Router: Connects two incompatible networks resulting in a network of networks called an internet Connecting Networks 4-9

Copyright © 2015 Pearson Education, Inc. Figure 4.4 Building a large bus network from smaller ones 4-10

Copyright © 2015 Pearson Education, Inc. Figure 4.5 Routers connecting two WiFi networks and an Ethernet network to form an internet 4-11

Copyright © 2015 Pearson Education, Inc. Client-server –One server, many clients –Server must execute continuously –Client initiates communication Peer-to-peer (P2P) –Two processes communicating as equals –Peer processes can be short-lived Inter-process Communication 4-12

Copyright © 2015 Pearson Education, Inc. Figure 4.6 The client/server model compared to the peer-to-peer model 4-13

Copyright © 2015 Pearson Education, Inc. Systems with parts that run on different computers –Cluster computing –Grid computing –Cloud computing Amazon’s Elastic Compute Cloud Google Drive Distributed Systems 4-14

Copyright © 2015 Pearson Education, Inc. The Internet: An internet that spans the world –Original goal was to develop a means of connecting networks that would not be disrupted by local disasters –Today a commercial undertaking that links a worldwide combination of PANs, LANs, MANs, and WANs involving millions of computers The Internet 4-15

Copyright © 2015 Pearson Education, Inc. Internet Service Provider (ISP) –Tier-1 –Tier-2 Access or tier-3 ISP: Provides connectivity to the Internet –Hot spot (wireless) –Telephone lines –Cable/Satellite systems DSL –Fiber optics Internet Architecture 4-16

Copyright © 2015 Pearson Education, Inc. Figure 4.7 Internet Composition 4-17

Copyright © 2015 Pearson Education, Inc. IP address: pattern of 32 or 128 bits often represented in dotted decimal notation Mnemonic address: –Domain names –Top-Level Domains Domain name system (DNS) –Name servers –DNS lookup Internet Addressing 4-18

Copyright © 2015 Pearson Education, Inc. Allocates IP addresses to ISPs who then assign those addresses within their regions. Oversees the registration of domains and domain names. Internet Corporation for Assigned Names & Numbers (ICANN) 4-19

Copyright © 2015 Pearson Education, Inc. Network News Transfer Protocol (NNTP) File Transfer Protocol (FTP) Telnet and SSH Hypertext Transfer Protocol (HTTP) Electronic Mail ( ) –Domain mail server collects incoming mail and transmits outing mail –Mail server delivers collected incoming mail to clients via POP3 or IMAP Early Internet Applications 4-20

Copyright © 2015 Pearson Education, Inc. SMTP Simple Mail Transfer Protocol mail.tardis.edu SMTP Sendmail Gallifrey-1.0; Fri, 23 Aug :34:10 HELO mail.skaro.gov 250 mail.tardis.edu Hello mail.skaro.gov, pleased to meet you MAIL From: Sender ok RCPT To: Recipient ok DATA 354 Enter mail, end with "." on a line by itself Subject: Extermination. EXTERMINATE! Regards, Dalek r7NJYAEl Message accepted for delivery QUIT mail.tardis.edu closing connection

Copyright © 2015 Pearson Education, Inc. Voice Over IP (VoIP) Internet Multimedia Streaming –N-unicast –Multicast –On-demand streaming –Content delivery networks (CDNs) More Recent Applications 4-22

Copyright © 2015 Pearson Education, Inc. Hypertext combines internet technology with concept of linked-documents –Embeds hyperlinks to other documents Browsers present materials to the user Webservers provide access to documents Documents are identified by URLs and transferred using HTTP World Wide Web 4-23

Copyright © 2015 Pearson Education, Inc. Figure 4.8 A typical URL 4-24

Copyright © 2015 Pearson Education, Inc. Encoded as text file Contains tags to communicate with browser –Appearance to start a level one heading to start a new paragraph –Links to other documents and content –Insert images Hypertext Markup Language (HTML) 4-25

Copyright © 2015 Pearson Education, Inc. Figure 4.9 A simple webpage 4-26

Copyright © 2015 Pearson Education, Inc. Figure 4.9 A simple webpage (continued) 4-27

Copyright © 2015 Pearson Education, Inc. Figure 4.10 An enhanced simple webpage 4-28

Copyright © 2015 Pearson Education, Inc. Figure 4.10 An enhanced simple Web page (continued) 4-29

Copyright © 2015 Pearson Education, Inc. XML: A language for constructing markup languages similar to HTML –A descendant of SGML –Opens door to a World Wide Semantic Web Extensible Markup Language (XML) 4-30

Copyright © 2015 Pearson Education, Inc. C minor 2/4 egth egth G, egth G, egth G hlf E Using XML 4-31

Copyright © 2015 Pearson Education, Inc. Figure 4.11 The first two bars of Beethoven’s Fifth Symphony 4-32

Copyright © 2015 Pearson Education, Inc. Client-side activities –Javascript –Macromedia Flash Server-side activities –Common Gateway Interface (CGI) –Servlets –JavaServer Pages (JSP) / Active Server Pages (ASP) –PHP Client Side Versus Server Side 4-33

Copyright © 2015 Pearson Education, Inc. Figure 4.12 Package-shipping example 4-34

Copyright © 2015 Pearson Education, Inc. Application: Constructs message with address Transport: Chops message into packets Network: Handles routing through the Internet Link: Handles actual transmission of packets Internet Software Layers 4-35

Copyright © 2015 Pearson Education, Inc. Figure 4.13 The Internet software layers 4-36

Copyright © 2015 Pearson Education, Inc. Figure 4.14 Following a message through the Internet 4-37

Copyright © 2015 Pearson Education, Inc. Transport Layer –Transmission Control Protocol (TCP) –User Datagram Protocol (UDP) Network Layer –Internet Protocol (IP) IPv4 IPv6 TCP/IP Protocol Suite 4-38

Copyright © 2015 Pearson Education, Inc. Figure 4.15 Choosing between TCP and UDP 4-39

Copyright © 2015 Pearson Education, Inc. Attacks –Malware (viruses, worms, Trojan horses, spyware, phishing software) –Denial of service (DoS) –Spam Protection –Firewalls –Spam filters –Proxy Servers –Antivirus software Security 4-40

Copyright © 2015 Pearson Education, Inc. HTTPS and SSL Public-key Encryption –Public key: Used to encrypt messages –Private key: Used to decrypt messages Certificates and Digital Signatures –Certificate authorities Encryption 4-41

Copyright © 2015 Pearson Education, Inc. Figure 4.16 Public-key encryption 4-42

Copyright © 2015 Pearson Education, Inc. EndofChapter