Lecture 6 Networked Systems Network Operating Systems Introduction to Sockets HTTP – FTP – TCP - UDP Client-Server Model.

Slides:



Advertisements
Similar presentations
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Advertisements

CCNA – Network Fundamentals
(4.4) Internet Protocols Layered approach to Internet Software 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
CS 582 / CMPE 481 Distributed Systems Communications.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Networking Theory (part 2). Internet Architecture The Internet is a worldwide collection of smaller networks that share a common suite of communication.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Introduction To Networking
04/26/2004CSCI 315 Operating Systems Design1 Computer Networks.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Review on Networking Technologies Linda Wu (CMPT )
What Is TCP/IP? The large collection of networking protocols and services called TCP/IP denotes far more than the combination of the two key protocols.
COMPUTER NETWORKS.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
1.  A protocol is a set of rules that governs the communications between computers on a network.  Functions of protocols:  Addressing  Data Packet.
Process-to-Process Delivery:
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Chapter 5 Networks Communicating and Sharing Resources
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Review: – computer networks – topology: pair-wise connection, point-to-point networks and broadcast networks – switching techniques packet switching and.
Presentation on Osi & TCP/IP MODEL
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
CSI315 Web Development Technologies Continued. Communication Layer information needs to get from one place to another –Computer- Computer –Software- Software.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
Lecture 9 Networked Systems Network Operating Systems Introduction to Sockets TCP Client-Server Applications.
Local Area Network By Bhupendra Ratha, Lecturer
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Lect1..ppt - 01/06/05 CDA 6505 Network Architecture and Client/Server Computing Lecture 2 Protocols and the TCP/IP Suite by Zornitza Genova Prodanoff.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
UNDERSTANDING THE HOST-TO-HOST COMMUNICATIONS MODEL - OSI LAYER & TCP/IP MODEL 1.
NSH0503/01/11041 Overview Computer Network Technology By Diyurman Gea.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
CSE 6590 Department of Computer Science & Engineering York University 111/9/ :26 AM.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
Data Communications and Networks
1 Chapter Overview Network Communications The OSI Reference Model.
1 Chapter Overview Network Communications The OSI Reference Model.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 3: TCP/IP Architecture.
1 OSI and TCP/IP Models. 2 TCP/IP Encapsulation (Packet) (Frame)
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
BASIC NETWORK PROTOCOLS AND THEIR FUNCTIONS Created by: Ghadeer H. Abosaeed June 23,2012.
 2004 Deitel & Associates, Inc. All rights reserved. Chapter 16 – Networking Outline 16.1Introduction 16.2Network Topology 16.3Network Types 16.4TCP/IP.
نظام المحاضرات الالكترونينظام المحاضرات الالكتروني.
Reading TCP/IP Protocol. Training target: Read the following reading materials and use the reading skills mentioned in the passages above. You may also.
Renesas Electronics America Inc. © 2010 Renesas Electronics America Inc. All rights reserved. Overview of Ethernet Networking A Rev /31/2011.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Chapter 16 – Networking Outline 16.1 Introduction
Process-to-Process Delivery:
TCP/IP Protocol Suite: Review
Networking Theory (part 2)
Process-to-Process Delivery: UDP, TCP
Networking Theory (part 2)
Presentation transcript:

Lecture 6 Networked Systems Network Operating Systems Introduction to Sockets HTTP – FTP – TCP - UDP Client-Server Model

A Data Network

Internetworking

Intranets & Extranets

Virtual Private Network (VPN)

Extranet Security and Privacy Firewall - Network hardware and/or software that captures data passing through it and determines whether to pass or drop the data. Firewalls are configurable, and filters can be applied to provide the appropriate security for the LAN. Public key certificate - An electronic document that can verify and authorize an individual by public key cryptography. Public key cryptography uses two keys14 (one public key and one private key) to encrypt and then decrypt data to ensure that a message can be transported securely. Authentication encryption (AE) - A system that is able to protect both the secrecy and the integrity of data communication. Virtual private network (VPN) - A network that is created when one net- work connects to another by a secure tunnel.

LANs, WANs, & MANs

Network Relationships and Topologies Network relationships refer to the communication that takes place between two nodes over a network. Examples are peer-to-peer and client/server. The manner in which nodes in a network connect to a communication line in order to exchange data is an example of a physical topology. Another topology type is the logical topology, which defines the way data is passed from endpoint to endpoint throughout the network. The logical topology is not affected by the way the nodes are physically arranged.

Client/Server Network

Peer-to-Peer Network

Network Topology

Bus Topology

Mesh Topology

Star Network

Advantages & Disadvantages of a Star Network

Ring Topology

Advantages & Disadvantages of a Ring Network

Hierarchical (Tree) Topology

Data Communication Protocols

Protocols Continued

History of the Internet

All People Seem To Need Data Processing The OSI Reference Model

The Four Layer + 1 TCP/IP Model Physical Layer

Encapsulation of Data through the TCP/IP Layers

Networking Diagnostic Utilities

Client-Side Blocking Socket A socket is like a handle to a file, similar to a StreamReader /StreamWriter in System.IO. You can use sockets programming to have two applications communicate with each other. The applications are typically on the different computers but they can be on same computer. For the two applications to talk to each other on the same or different computers using sockets, one application is generally a server that keeps listening to the incoming requests and the other application acts as a client and makes the connection to the server application.

User Datagram Protocol (UDP) Connectionless User Datagram Protocol (UDP) –Provides minimum overhead necessary for the transport layer –No guarantee that UDP datagrams will reach their destination in their original order, or at all Deitel & Associates, Inc.

TCP/IP Protocol Stack TCP/IP protocol stack –Composed of four logical levels called layers Application layer –Highest level –Provides protocols for applications to communicate Transport layer –End-to-end communication –Relies on network layer to determine proper path from one end of communication to the other Network layer –Moving data between computers Link layer –Provides an interface between the network layer and the underlying physical medium of the connection Deitel & Associates, Inc.

Hypertext Transfer Protocol (HTTP) The Hypertext Transfer Protocol (HTTP) –An application layer protocol that allows the transfer of a variety of data formats –HTTP defines a request for a resource and a response –Remote host processes the request and replies with a response Deitel & Associates, Inc.

File Transfer Protocol (FTP) FTP –Application layer protocol that allows file-sharing between remote hosts –Specifies connections between two pairs of ports One pair sends control information that governs the session The other sends actual data –After a connection is established, the client specifies actions for the FTP server to perform by issuing various requests to server –Server attempts to satisfy each request, then issues a response specifying the result Deitel & Associates, Inc.

Transmission Control Protocol (TCP) TCP is a connection-oriented transmission protocol –Guarantees that segments sent from a sender will arrive at the intended receiver undamaged and in correct sequence –Handles error control, congestion control, and retransmission –Allow protocols like HTTP and FTP to send information into network as simply and reliably as writing to a file on the local computer Deitel & Associates, Inc.

Internet Protocol (IP) Internet Protocol version 4 (IPv4) is the dominant protocol for directing information over a network –Destinations on the Internet are specified by IP address IP addresses are 32-bit numbers in IPv4 One of more names can be mapped to an IP address through the Domain Name System (DNS) Deitel & Associates, Inc.

Internet Protocol version 6 (IPv6) In the near future, there will be more addressable nodes on the Internet than available addresses using IPv4 –To combat this problem, Internet Engineering Task Force (IETF) introduced Internet Protocol version 6 (IPv6) IPv6 specifies three types of addresses –Unicast »Unicast address describes a particular host on the Internet –Anycast »Anycast addresses are designed to be sent to the nearest host in a group of hosts –Multicast »Multicast addresses are designed to send packets to all hosts in a group Deitel & Associates, Inc.

Ethernet Ethernet uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol –802.3-style CSMA/CD A transceiver tests a shared medium to determine if it is available before transmitting data Due to delays in medium, it is possible that multiple transceivers may decide that the medium is clear and begin transmitting simultaneously If transceivers detect a collision caused by simultaneous transmissions, they continue to transmit bytes for a specific period of time to ensure that all transceivers become aware of the collision Each transceiver, after learning of a collision, waits for a random interval before attempting to transmit again Deitel & Associates, Inc.

Fiber Distributed Data Interface (FDDI) Operates over fiber-optic cable –Support more transfers at greater speeds over larger distance Built on two Token Rings –The second usually being reserved for backup Deitel & Associates, Inc.

IEEE (Wireless) employs a method similar to Ethernet: –Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) –Require each sender broadcast a Request to Send (RTS) to entire network –Upon receiving an RTS Receiver broadcasts a Clear to Send (CTS) message to the entire network if the medium is available Deitel & Associates, Inc.

Client/Server Model In a two-tier system –User interface resides on client –Data resides on server –Application logic lies on one or both of these components Three-tier system –Offers a clearer separation of application logic from user interface and data Ideally, logic resides in its own layer –Possibly on a separate machine –Independent of client and data –Increased flexibility and extensibility Trade-off in multitier system –Increased network latency and more areas where the network could fail Deitel & Associates, Inc.

Summary Network Operating Systems (NOS) Network Sockets Blocking vs non-Blocking Sockets Network Topology Network Types TCP/IP Protocol Stack (1) Application (2) Transport (3) Network (4) Link Hypertext Transfer Protocol (HTTP) File Transfer Protocol (FTP) Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Ethernet Token Ring Fiber Distributed Data Interface (FDDI) IEE (Wireless) Client/Server Model