Networking Material taken mainly from HowStuffWorks.com.

Slides:



Advertisements
Similar presentations
Chapter 2 Network Models.
Advertisements

Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Layer 7- Application Layer
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
Protocols and the TCP/IP Suite
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
網際網路協定基礎介紹 Data Communications and Computer Networks: A Business User’s Approach Fifth Edition (Chap 10)
Prepared By E.Musa Alyaman1 Networking Theory Chapter 1.
Chapter Overview TCP/IP Protocols IP Addressing.
CS 356 Systems Security Spring Dr. Indrajit Ray
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
Data Communications and Networks
Module 4 - Networking MIS5122: Enterprise Architecture for the IT Auditor.
Network Protocols.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Computer Networks. IP Addresses Before we communicate with a computer on the network we have to be able to identify it. Every computer on a network must.
DNS (Domain Name System) Protocol On the Internet, the DNS associates various sorts of information with domain names. A domain name is a meaningful and.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
How Web Servers and the Internet Work by by: Marshall Brainby: Marshall Brain
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
THE OSI MODEL AND THE TCP/IP PROTOCOL SUITE CS 1202 Lectur3 part2.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary
Okay, here’s a scenario… You’re sitting at a computer…. Type in www. yourcompany.com As soon as you click on search your browser will ask your Operation.
Linux+ Guide to Linux Certification Chapter Fifteen Linux Networking.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
TCP/IP TCP/IP LAYERED PROTOCOL TCP/IP'S APPLICATION LAYER TRANSPORT LAYER NETWORK LAYER NETWORK ACCESS LAYER (DATA LINK LAYER)
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
Chapter 6 Data Communications. Network Collection of computers Communicate with one another over transmission line Major types of network topologies What.
CSE 6590 Department of Computer Science & Engineering York University 111/9/ :26 AM.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
Data Communications and Networks
TCP/IP (Transmission Control Protocol / Internet Protocol)
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 3: TCP/IP Architecture.
1 OSI and TCP/IP Models. 2 TCP/IP Encapsulation (Packet) (Frame)
1 Bus topology network. 2 Data is sent to all computers, but only the destination computer accepts 02608c
1 Internet Protocols To support the Internet and all its services, many protocols are necessary Some of the protocols that we will look at: –Internet Protocol.
1. Layered Architecture of Communication Networks: TCP/IP Model
SWICHING & ROUTING.
Lecture # 02 Network Models Course Instructor: Engr. Sana Ziafat.
Transmission Control Protocol (TCP) Internet Protocol (IP)
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
ENGS 112 Lecture 3 Packet Switching Chapter 3, Walrand WWW links, eg.
How Information Flows via the Internet By: Lee Farrell.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Lecture # 02 Network Models Course Instructor: Engr. Sana Ziafat.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Chapter Objectives In this chapter, you will learn:
Level 2 Diploma Unit 10 Setting up an IT Network
THE OSI MODEL By: Omari Dasent.
Networking Devices.
The OSI Model and the TCP/IP Protocol Suite
Lecture 6: TCP/IP Networking By: Adal Alashban
Virtual LANs.
The OSI Model and the TCP/IP Protocol Suite
TCP/IP Protocol Suite: Review
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
The OSI Model and the TCP/IP Protocol Suite
Objectives: 1.Identify different internet protocol (IP) 2.Configure sample of IP address 3.Appreciate and relate protocol in our life.
Presentation transcript:

Networking Material taken mainly from HowStuffWorks.com

The Internet A network of networks Computers Servers and clients routers switches

Ethernet Network The original Ethernet described communication over a single cable shared by all devices on the network. Once a device attached to this cable, it had the ability to communicate with any other attached device. Each Ethernet devices has a unique address. The Ethernet protocol specifies a set of rules for communication.

Network Interface Cards (NIC) The computer gives the NIC a message for another networked device and the NIC formats that message for transport over the Ethernet. The reverse is also true, the NIC receives messages from the network and reformats them so that the computer can understand.

Ethernet Frame

Switched Ethernet A switch creates a series of instant networks that contain only the two devices communicating with each other at that particular moment. Switches maintain their own Medium Access Control (MAC) look-up tables. These table indicate which network device is at which port on the switch. The look-up tables are constantly updated. When a switch is newly installed, it will construct its table via an Address Resolution Protocol (ARP) broadcast.

Local Area Network (LAN)

Virtual LANs Advantages: Scalability Security UNCA VLANs: Dorms Student, faculty, and labs CSCI ENGR and ATMS

Routers Routers are devices that let messages flow between networks A router uses a configuration table to determine where packets go. A configuration table is a collection of information, including: Information on which connections lead to particular groups of addresses Priorities for connections to be used Rules for handling both routine and special cases of traffic

Network Addresses Most switches operate at the Data layer (Layer 2) of the OSI Reference Model, while routers operate at the Network layer (Layer 3) When a router receives a packet, it looks at the Layer 3 source and destination addresses to determine the path the packet should take. A standard switch relies on the MAC addresses to determine the source and destination of a packet, which is Layer 2 (Data) networking.

Open Systems Interconnection (OSI) standard Application Set Layer 7: Application - Layer that interacts with the operating system or application whenever the user chooses to transfer files, read messages or perform other network-related activities. Layer 6: Presentation - Takes the data provided by the Application layer and converts it into a standard format that the other layers can understand. Layer 5: Session - Establishes, maintains and ends communication with the receiving device. Transport Set Layer 4: Transport - Maintains flow control of data and provides for error checking and recovery of data between the devices. Layer 3: Network - Logical routing and addressing are handled here. Layer 2: Data – Assigns the appropriate physical address. Layer 1: Physical - This is the level of the actual hardware.

Why Protocol Hierarchies The philosopher-translator-secretary architecture.

Protocol Layering and Data Each layer takes data from above adds header information to create new data unit passes new data unit to layer below

IP Address Each machine on the Internet is assigned a unique address called an IP address. IP stands for Internet protocol, and these addresses are 32-bit numbers, normally expressed as four "octets" in a "dotted decimal number." Example: Every machine on the Internet has a unique IP address.

Names People have trouble remembering the strings of numbers that make up IP addresses, and because IP addresses sometimes need to change, all servers on the Internet also have human-readable names, called domain names. A set of servers called Domain Name Servers (DNS) maps the human- readable names to the IP addresses. These servers are simple databases that map names to IP addresses, and they are distributed all over the Internet. Example: for

Clients and Servers Any server machine makes its services available to the Internet using numbered ports, one for each service that is available on the server. Here are some common port numbers: echo 7 daytime 13 qotd 17 (Quote of the Day) ftp 21 telnet 23 smtp 25 (Simple Mail Transfer, i.e., ) time 37 nameserver 42 nicname 43 (Who Is) gopher 70 finger 79 WWW 80 Logical port numbers correspond to application layer programs. These port numbers are included in the address information of a packet.

Things to try Type “IPCONFIG” at the MSDOS prompt Type “tracert at the MSDOS prompt. Type “arp –a” at the MSDOS prompt. Type "telnet web67.ntx.net 13" at the MSDOS prompt.

WinSCP Secure FTP File Transfer Protocol – used to transfer files from one machine to another Select start -> CSCI programs -> WinSCP Features –It’s free! (h ttp://winscp.sourceforge.net/eng/) –Provides a dual panel display –Copy and move files and folders (to and from a remote computer). –Rename files and folders –Create new folders –Change properties of files and folders –Edit files

WinSCP Assignment Logon: –User Name: first 6 letters of last name followed by first initial and middle initial –Password: CSCI followed by last 4 digits of student id

WinSCP Assignment (continued) Transfer your webpage to your public_html directory on candler and give it the name, “index.html” Set the file and folder properties to allow the world to view your file –Select the folder or file and right- click, then select Properties –Set the properties as shown on the right View your page in your browser using the following address Put your user name here