WEB ADMINISTRATION AND MANAGEMENT. Internetworking: Concepts, Principles and Application

Size: px
Start display at page:

Download "WEB ADMINISTRATION AND MANAGEMENT. Internetworking: Concepts, Principles and Application"

Transcription

1 WEB ADMINISTRATION AND MANAGEMENT 3/17/2015 Internetworking: Concepts, Principles and Application 1 J. K. Mandal Professor & Ex-Dean FETM, Department of Computer Science & Engineering, University of Kalyani Kalyani, Nadia, West Bengal jkm.cse@gmail.com Mobile:

2

3 Figure 7.20 Omnidirectional antennas

4 TYPES OF TRANSMISSION Guided Transmission Unguided Transmission 3/17/2015

5 Figure 7.1 Transmission medium and physical layer

6 Fibre- and wire-based transmissions and their ranges (without using repeater), frequencies, and properties. 3/17/2015

7 3/17/2015

8 THE ELECTROMAGNETIC SPECTRUM The electromagnetic spectrum and its uses for communication.

9 COMMUNICATION SATELLITES Communication satellites and some of their properties, including altitude above the earth, round-trip delay time and number of satellites needed for global coverage.

10 COMMUNICATION SATELLITES The principal satellite bands.

11 GLOBALSTAR (a) Relaying in space. (b) Relaying on the ground.

12 IEEE 802 STANDARDS The 802 working groups. The important ones are marked with *. The ones marked with are hibernating. The one marked with gave up.

13

14 Figure 7.10 Bending of light ray

15 Figure 7.11 Optical fiber

16

17

18

19 BUS TOPOLOGY OF LAN

20

21

22 HUB/SWITCH BASED LAN

23

24 DISTRIBUTED APPLICATIONS IN E-COMMERCE

25 WEB SERVER CONFIGURATIONS

26 DETAILED LAYOUT OF CONNECTIVITY

27 INTERNET ACCESS Dial-up Connection Leased Line

28 DIAL UP CONNECTION An account with internet access provider A Telephone Connection Computer with serial port A modem(external/internal) A communication software

29 LEASED CONNECTION Dedicated line between system and provider Leased Line Modem Computer with serial port A communication software Router IP addresses

30 IP ADDRESS Identifier for a particular machine IP address are unique No two machines can have the same Ip addresses

31 DOMAIN NAME Way to identify and locate computers connected to internet. No two organisation can have same domain name. Top level domains are: Com commercial entities Edu educational institutions Net orgnizations directly connectyed to internet operation Org nonprofit group of organizations Gov government organization Mil united states military Country codes - two letters abbreviations for a country- in for India fr -France, np -Nepal, uk - United Kingdom

32 Allows information to be send between computers and people on the internet.basic structure of address is

33 </html> WEB PAGES & HTML A web page is a single unit of information called document which is available through www. HTML defines is a script language to built web pages HTML Tags are: <html>,<i>,<p> Example code is <html> <center><h1>this is a sample Page<h1></center> <img src = logo.jpg ><br>

34 APPLICATION IN MAILING AND WEB BASED APPLICATIONS MAIL IN AN INTRANET WEB MAIL WEB BASED INFORMATION SYSTEM

35 OVERALL REPRESENTATION OF THE LAN & INTERNET SYSTEM LIBRARY SERVER SWITCH MODEM MODEM ROUTER EXCHANGE END UNVERSITY END SERVER SWITCH

36 SILIGURI REGIONAL OFFICE SETUP Towards RO S LAN D-LINK SWITCH WIC-2T CARD ISDN CARD ROUTER B ROUTER A LEASED LINE H.O. ROUTER ISDN LINK LEASED LINE LEASED LINE VSAT LINK BETWEEN HO AND SLG. BR. SEVOKE ROAD BRANCH ROUTER SILIGURI BRANCH ROUTER

37

38 ADDRESSING 3/17/2015 Client Server 38

39 TCP/IP protocol suite TCP/IP Protocol Suite 39

40 Figure 2.2 Internet layers

41 Figure 2.3 Peer-to-peer processes

42 Figure 2.4 An exchange using the Internet model

43 43 3/17/2015

44 SENDING AND RECEIVING BUFFERS 3/17/2015 Stream of bytes 44

45 TCP SEGMENTS 3/17/2015 Segment N H Segment 1 H 45

46 WELL KNOWN PORTS USED BY TCP 3/17/

47 ENCAPSULATION TCP header Application-layer data 3/17/2015 Frame header IP header Data-link layer payload TCP payload IP payload 47

48 FTP/ TFTP 3/17/

49 FTP File Transfer Protocol (FTP) is the standard mechanism provided by TCP/IP for copying a file from one host to another. Although transferring files from one system to another seems simple and straightforward, some problems must be dealt with first. For example, two systems may use different file name conventions. Two systems may have different ways to represent text and data. Two systems may have different directory structures. All of these problems have been solved by FTP in a very simple and elegant approach. 3/17/2015 jkm.cse@gmail.com 49

50 FILE TRANSFER PROTOCOL FTP 3/17/

51 ACCESS COMMANDS 3/17/

52 FILE MANAGEMENT COMMANDS 3/17/

53 FILE TRANSFER COMMAND 3/17/

54 FILE TRANSFER 3/17/

55 USER INTERFACE % ftp challenger.atc.fhda.edu Connected to challenger.atc.fhda.edu 220 Server ready Name: jkmandal 3/17/2015 jkm.cse@gmail.com Password: xxxxxxx ftp > ls /usr/user/report 200 OK 55

56 CONT 150 Opening ASCII mode transfer complete ftp > close 221 Goodbye 3/17/2015 ftp > quit 56

57 ANONYMOUS FTP % ftp internic.net Connected to internic.net 220 Server ready Name: anonymous 331 Guest login OK, send guest as password Password: guest ftp > pwd 257 / is current directory 57 3/17/2015 jkm.cse@gmail.com

58 CONT ftp > ls 200 OK 150 Opening ASCII mode bin ftp> close 221 Goodbye ftp> quit 58 3/17/2015

59 MAIL SERVICES 3/17/

60 MAIL SERVICES Three major mail services: Simple Mail Transfer Protocol SMTP Post Office Protocol POP3 Internet Mail Access Protocol IMAP or IMAP4 3/17/

61 WHICH ONE TO USE? Outbound Mail SMTP for outbound Port 25 or 2525 Inbound Mail POP3 for inbound Port 110 IMAP for inbound Port 143 3/17/

62 SMTP 3/17/2015 When the sender and the receiver of an are on the same mail server, we need only two user agents. 62

63 SMTP 3/17/ jkm.cse@gmail.com When the sender and the receiver of an are on different mail servers, we need two UAs and a pair of MTAs (client and server). 63

64 SMTP 1 2 3/17/ jkm.cse@gmail.com When the sender is connected to the mail server via a LAN or a WAN, we need two UAs and two pairs of MTAs (client and server). 64

65 SMTP (CONT ) When both sender and receiver are connected to the mail server via a LAN or a WAN, we need two UAs, two pairs of MTAs (client and server), and a pair of MAAs (client and server). This is the most common situation today. 3/17/2015 jkm.cse@gmail.com 65

66 SMTP /17/ jkm.cse@gmail.com

67 SMTP (CONT ) The actual mail transfer is done through message transfer agents (MTAs). To send mail, a system must have the client MTA, and to receive mail, a system must have a server MTA. The formal protocol that defines the MTA client and server in the Internet is called Simple Mail Transfer Protocol (SMTP). As we said before, two pairs of MTA client-server programs are used in the most common situation. 3/17/2015 jkm.cse@gmail.com 67

68 ADDRESS 3/17/

69 MESSAGE ACCESS AGENT The first and the second stages of mail delivery use SMTP. However, SMTP is not involved in the third stage because SMTP is a push protocol; it pushes the message from the client to the server. In other words, the direction of the bulk data (messages) is from the client to the server. On the other hand, the third stage needs a pull protocol; the client must pull messages from the server. The direction of the bulk data are from the server to the client. The third stage uses a message access agent. 3/17/2015 jkm.cse@gmail.com 69

70 PROXY SERVERS 3/17/

71 INTERNET CONNECTION ISP network ISP network 3/17/2015 Bandwidth-limited links ISP network Customer Networks Backbone networks Customers connect to an ISP ISPs connect to backbone 71

72 WHAT IS A WEB PROXY? A proxy is a host which relays web access requests from clients Used when clients do not access the web directly. Used for security, logging, accounting and performance. 3/17/2015 jkm.cse@gmail.com browser proxy web 72

73 WHAT IS WEB CACHING? Storing copies of recently accessed web pages Pages are delivered from the cache when requested again Browser caches, Proxy caches Shorter response time 3/17/2015 Reduced bandwidth requirement Reduced load on servers Access control and logging 73

74 POPULAR PROXY CACHES Apache proxy MS proxy server WinProxy Squid Squid is popular because it is powerful, configurable and free Many others 3/17/

75 PROXY SERVERS Scan and act on the data portion of an IP packet Act primarily on behalf of internal hosts receiving, rebuilding, and forwarding outbound requests Known by many names Proxy services Application-level gateways Application proxies 3/17/

76 HOW PROXY SERVERS WORK Function as a software go-between, forwarding data between internal and external hosts Focus on the port each service uses Screen all traffic into and out of each port Decide whether to block or allow traffic based on rules Add time to communications, but in return, they: Conceal clients Translate network addresses Filter content 76 3/17/2015 jkm.cse@gmail.com

77 STEPS INVOLVED IN A PROXY TRANSACTION 1. Internal host makes request to access a Web site 2. Request goes to proxy server, which examines header and data of the packet against rule base 3. Proxy server recreates packet in its entirety with a different source IP address 4. Proxy server sends packet to destination; packet appears to come from proxy server 5. Returned packet is sent to proxy server, which inspects it again and compares it against its rule base 6. Proxy server rebuilds returned packet and sends it to originating computer; packet appears to come from external host 77 3/17/2015 jkm.cse@gmail.com

78 3/17/

79 GOALS OF PROXY SERVERS Conceal internal clients Block URLs Block and filter content Protect proxy Improve performance Ensure security Provide user authentication Redirect URLs 3/17/

80 BLOCKING URL 3/17/

81 EACH CLIENT ON THE NETWORK MUST BE CONFIGURED TO ACCESS THE PROXY SERVER 3/17/

82 ENSURING SECURITY WITH LOG FILES Select only the most critical services and events to log 3/17/

83 REDIRECTING URLS Proxy can be configured to recognize two types of content and perform URL redirection to send them to other locations Files or directories requested by the client Host name with which the client wants to communicate (most popular) 3/17/

84 TYPES OF PROXY SERVERS Transparent Nontransparent SOCKS based 3/17/

85 TRANSPARENT PROXIES Can be configured to be totally invisible to end user Sit between two networks like a router Individual host does not know its traffic is being intercepted Client software does not have to be configured 3/17/2015 jkm.cse@gmail.com 85

86 NONTRANSPARENT PROXIES Require client software to be configured to use the proxy server All target traffic is forwarded to the proxy at a single target port (typically use SOCKS protocol) More complicated to configure, but provide greater security Also called explicit proxies 3/17/2015 jkm.cse@gmail.com Nontransparent proxies use a single port number and IP address 86

87 HTTP HYPERTEXT TRANSFER PROTOCOL 3/17/

88 HYPERTEXT TRANSFER PROTOCOL HTTP: hypertext transfer protocol Web s application layer protocol client/server model client: browser that requests, receives, displays Web objects server: Web server sends objects in response to requests PC running Explorer Mac running Navigator Server running Apache Web server 88 3/17/2015 jkm.cse@gmail.com

89 HTTP HTTP (Hyper Text Transfer Protocol) is used to transfer web pages from a Web Server to Web Client (Browser) Web Pages are arranged in a directory structure in the Web Server HTTP supports CGI (Common Gateway interface) HTTP supports Virtual Hosting (Hosting multiple sites on the same server) Popular Web Servers Apache Windows IIS IBM Websphere 89 3/17/2015 jkm.cse@gmail.com

90 CLIENT-SERVER ARCHITECTURE 3/17/

91 DHCP DYNAMIC HOST CONFIGURATION PROTOCOL 3/17/

92 MOTIVATION FOR DHCP Configuration parameters for network hosts IP address Router Subnet Mask Many more Before DHCP Manual assignment RARP BOOTP 92 3/17/2015

93 DHCP FEATURES Protocol for providing configuration parameters to hosts over network Dynamic allocation of IP addresses Minimal human intervention 3/17/

94 SAMPLE NETWORK DHCP Clients DHCP Server 3/17/2015 UDP Port 68 UDP Port 68 UDP Port 68 UDP Port 67 Router Internet 94

95 DHCP MESSAGE TYPES DHCP Message DHCPDISCOVER DHCPOFFER DHCPREQUEST DHCPDECLINE DHCPACK Use Client broadcast to locate available servers Server to client response offering configuration parameters Client broadcast requesting offered parameters Client to server notification that IP address is in use Server to client response confirming a request 3/17/2015 jkm.cse@gmail.com DHCPNAK DHCPRELEASE DHCPINFORM Server to client response denying a request Client to server request to relinquish IP address Client to server request for configuration parameters 95

96 DNS 3/17/

97 INTERNET NAMING HIERARCHY The silent dot at the end of all addresses 3/17/2015.com.net.org.in www 97

98 DNS OPERATION A DNS server maintains the name to IP address mapping of the domain for which it is the name server. The DNS server for a domain is registered with the domain registrar and the entry is maintained by the Internet Root-Servers (13) or Country Level Root- Servers. Whenever a server is queried, if doesn t have the answer, the root servers are contacted. The root servers refer to the DNS server for that domain (in case the domain is a top level domain) or the Country Root Server (in case the domain is country level domain). 98 3/17/2015 jkm.cse@gmail.com

99 WEB ADMINISTRATION 3/17/

100 WEBSITE PUBLISHING Customer service / problem solving Information restructuring and website planning Website design Website templateing and production Database design, programming and management Web application development Website maintenance Online maps creation E-news creation, distribution and list management Video editing, processing and distribution PDF creation, editing and distribution Data mining 100 3/17/2015 jkm.cse@gmail.com

101 HOW WE CAN DO IT? 1. Determine client needs, project scope and timeline 2. Gather and analyze client materials 3. Provide proposal and cost estimate 4. Build outline / planning document for new website or database 5. Hire writer, illustrator, photographer (as needed) 6. Hire designer based on project specifics 7. Begin database design process (as needed) 8. Build website templates, make revisions 9. Produce website with provided content 10. Import and integrate database-driven content 11. Client testing and revisions 12. Website launch, provide maintenance option 101 3/17/2015 jkm.cse@gmail.com

102 NORMAL REQUIREMENT BY CLIENT/ CUSTOMER 1. A website that is professionally designed 2. A website that is easy to use and makes sense 3. A website that is affordable 4. A website that they can maintain 5. A website that provides unique content 6. A website that is accessible, up to standards 7. A website that performs tasks online (forms, apps) 3/17/2015 jkm.cse@gmail.com 102

103

104

105

106 3/17/

107 3/17/

108 THANK YOU 108

109 THE END 3/17/

Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0

Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 CCNET v6 10 Chapter 10 - Sections & Objectives 10.1 Application Layer Protocols Explain the operation of the application

More information

Special expressions, phrases, abbreviations and terms of Computer Networks

Special expressions, phrases, abbreviations and terms of Computer Networks access access point adapter Adderssing Realm ADSL (Asymmetrical Digital Subscriber Line) algorithm amplify amplitude analog antenna application architecture ARP (Address Resolution Protocol) AS (Autonomous

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules

More information

Introduction to Networking

Introduction to Networking Introduction to Networking The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Simplified Communications System Block

More information

Application Layer: OSI and TCP/IP Models

Application Layer: OSI and TCP/IP Models Application Layer Application Layer: OSI and TCP/IP Models The communication process between two communicating nodes is actually a communication process between two applications on these devices. Service

More information

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP,  , SMTP, Telnet, FTP, Security-PGP-SSH. APPLICATION LAYER : DNS, HTTP, E-mail, SMTP, Telnet, FTP, Security-PGP-SSH. To identify an entity, the Internet used the IP address, which uniquely identifies the connection of a host to the Internet.

More information

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks. Chapter 4: Networking and the 4.1 Network Fundamentals 4.2 The 4.3 The World Wide Web 4.4 Protocols 4.5 Security Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area

More information

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services

More information

ZENworks for Desktops Preboot Services

ZENworks for Desktops Preboot Services 3.2 Novell ZENworks for Desktops Preboot Services DEPLOYMENT www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means

More information

IP - The Internet Protocol

IP - The Internet Protocol IP - The Internet Protocol 1 Orientation IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network Layer ARP Network Access Link Layer Media 2 IP:

More information

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning 6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories

More information

Network Model. Why a Layered Model? All People Seem To Need Data Processing

Network Model. Why a Layered Model? All People Seem To Need Data Processing Network Model Why a Layered Model? All People Seem To Need Data Processing Layers with Functions Packet Propagation Each router provides its services to support upper-layer functions. Headers (Encapsulation

More information

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the

More information

INTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS. Faramarz Hendessi

INTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS. Faramarz Hendessi INTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS Faramarz Hendessi INTRODUCTORY INFORMATION TECHNOLOGY Lecture 6 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi Overview

More information

Networking Basics. EC512 Spring /15/2015 EC512 - Prof. Thomas Skinner 1

Networking Basics. EC512 Spring /15/2015 EC512 - Prof. Thomas Skinner 1 Networking Basics EC512 Spring 2015 2/15/2015 EC512 - Prof. Thomas Skinner 1 Protocols Protocols are required in order to allow information to be extracted from the stream of bits flowing from one point

More information

2. Introduction to Internet Applications

2. Introduction to Internet Applications 2. Introduction to Internet Applications 1. Representation and Transfer 2. Web Protocols 3. Some Other Application Layer Protocols 4. Uniform Resource Identifiers (URIs) 5. Uniform Resource Locators (URLs)

More information

Chapter 10: Application Layer

Chapter 10: Application Layer Chapter 10: Application Layer Application, Session and Presentation Presentation and Session Layers Session layer Functions, creates, and maintains dialogs between source and destination applications Handles

More information

CCNA 1 Chapter 10 v5.0 Exam Answers 2013

CCNA 1 Chapter 10 v5.0 Exam Answers 2013 CCNA 1 Chapter 10 v5.0 Exam Answers 2013 1 Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.) physical

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 8 Networking Essentials Objectives Learn about the protocols and standards Windows uses for networking Learn how to connect

More information

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322 1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet

More information

Chapter 26 Remote Logging, Electronic Mail, and File Transfer 26.1

Chapter 26 Remote Logging, Electronic Mail, and File Transfer 26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer 26.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 26-1 REMOTE LOGGING It would be impossible

More information

CCNA R&S: Introduction to Networks. Chapter 10: The Application Layer

CCNA R&S: Introduction to Networks. Chapter 10: The Application Layer CCNA R&S: Introduction to Networks Chapter 10: The Application Layer Frank Schneemann 10.0.1.1 Introduction 10.0.1.2 Activity - Application Investigation 10.1.1.1 OSI and TCP/IP Models Revisited The application

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 13, 2011 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2011-75 minutes This examination

More information

How does the Internet Work? The Basics: Getting a Web Page. The Basics: Getting a Web Page. Client-Server model. The Internet: Basics

How does the Internet Work? The Basics: Getting a Web Page. The Basics: Getting a Web Page. Client-Server model. The Internet: Basics How does the Internet Work? When you type a URL (Uniform Resource Locator) into a Web Browser and press Return, what do you think happens? That is, what steps do you think are required to obtain a web

More information

COMPUTER NETWORK. PREPARED BY: DHAVAL R. PATEL Page 1. Q.1 Explain IP address. IP address is unique number of network device in network.

COMPUTER NETWORK. PREPARED BY: DHAVAL R. PATEL Page 1. Q.1 Explain IP address. IP address is unique number of network device in network. Q.1 Explain IP address. IP address is unique number of network device in network. Two IP address could not be same. Using this network we can connect the devices with each other. It is separated by dot(.).

More information

Protocol Classification

Protocol Classification DNS and DHCP TCP/IP Suite Suite of protocols (not just TCP and IP) Main protocols TCP and UDP at the Transport Layer, and IP at the Network Layer Other protocols ICMP, ARP, Telnet, Ftp, HTTP, SMTP, SNMP

More information

Introduction to Networking

Introduction to Networking Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI

More information

Objectives. Connecting with Computer Science 2

Objectives. Connecting with Computer Science 2 Objectives Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar with Internet-related protocols Understand how the TCP/IP protocols relate to the Internet

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

DNS is the mechanism by which Internet software translates names to attributes such as addresses.

DNS is the mechanism by which Internet software translates names to attributes such as addresses. Full form: 1 PSTN : Public Switching Telephone Networks 2 ISDN : Integrated Services Digital Network. 3 DSL: Digital Subscribe Line. 4 CATV: Community Antenna Television. 5 DHCP: Dynamic Host Configuration

More information

Chapter 2 Communicating Over the Network

Chapter 2 Communicating Over the Network Chapter 2 Communicating Over the Network Elements of Communication Communicating the Messages Continuous stream of bits 00101010100101010101010101010101010 I have to wait Single communications (e.g. video,

More information

Higher layer protocols

Higher layer protocols ETSF05/ETSF10 Internet Protocols Higher layer protocols DHCP DNS Real time applications RTP The hen or the egg? DHCP IP addr. IP DNS TCP UDP ETSF05/ETSF10 - Internet Protocols 2 What to configure IP address

More information

E-Commerce. Infrastructure I: Computer Networks

E-Commerce. Infrastructure I: Computer Networks E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.

More information

CS 356: Computer Network Architectures. Lecture 15: DHCP, NAT, and IPv6. [PD] chapter 3.2.7, 3.2.9, 4.1.3, 4.3.3

CS 356: Computer Network Architectures. Lecture 15: DHCP, NAT, and IPv6. [PD] chapter 3.2.7, 3.2.9, 4.1.3, 4.3.3 CS 356: Computer Network Architectures Lecture 15: DHCP, NAT, and IPv6 [PD] chapter 3.2.7, 3.2.9, 4.1.3, 4.3.3 Xiaowei Yang xwy@cs.duke.edu Dynamic Host Configuration Protocol (DHCP) Dynamic Assignment

More information

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning 6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories

More information

Scale Yourself. Lesson 3: Introduction to Internet Technology. Computer Technology 3/13/2015

Scale Yourself. Lesson 3: Introduction to Internet Technology. Computer Technology 3/13/2015 Computer Technology Lesson 3: Introduction to Internet Technology Learning Goal: Students will be able to understand the elements of a network. Scale Yourself 4 I do understand the elements of a network.

More information

Outline. Internet and World Wide Web. History of the Internet. What is the Internet? How Does Data Travel Through the Internet?

Outline. Internet and World Wide Web. History of the Internet. What is the Internet? How Does Data Travel Through the Internet? Outline Internet and World Wide Web Internet World Wide Web Creating Web Pages CS 1410 Intro to Computer Tecnology Internet and World Wide Web 2 What is the Internet? The internet is a network of networks

More information

INTERNET ARCHITECTURE & PROTOCOLS

INTERNET ARCHITECTURE & PROTOCOLS INTERNET ARCHITECTURE & PROTOCOLS Set # 01 Delivered By: Engr Tahir Niazi What is Internet? Basically it is called Network of networks Nuts and Bolts (Pieces of internet) Services description (applications)

More information

DESCRIPTION OF TYPICAL NETWORK SERVICES ON SERVERS

DESCRIPTION OF TYPICAL NETWORK SERVICES ON SERVERS DESCRIPTION OF TYPICAL NETWORK SERVICES ON SERVERS Before you start Objectives: Familiarize yourself with the services such as File and Print, WWW, FTP, E- mail, Faxing, Remote Access, DHCP, DNS and WINS.

More information

EITF25 Internet- - Techniques and Applica8ons Stefan Höst. L9 Applica8on layer

EITF25 Internet- - Techniques and Applica8ons Stefan Höst. L9 Applica8on layer EITF25 Internet- - Techniques and Applica8ons Stefan Höst L9 Applica8on layer Client- server paradigm E.g. www, IPTV, OTT, Online games, etc 2 Peer- to- peer paradigm E.g. BitTorrent, Voddler, Skype, etc

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided. 113 Chapter 9 TCP/IP Transport and Application Layer Services that are located in the transport layer enable users to segment several upper-layer applications onto the same transport layer data stream.

More information

Review: Networking Fall Final

Review: Networking Fall Final Review: Networking Fall Final Question 1 of 43 You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have? Peer to peer

More information

Review for Internet Introduction

Review for Internet Introduction Review for Internet Introduction What s the Internet: Two Views View 1: Nuts and Bolts View billions of connected hosts routers and switches protocols control sending, receiving of messages network of

More information

Chapter 3. The Basics of Networking

Chapter 3. The Basics of Networking Chapter 3 The Basics of Networking Learning Objectives Tell whether a communication technology (Internet, radio, LAN, etc.) is synchronous or asynchronous; broadcast or point-to-point Explain the roles

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

Lecture-4. TCP/IP-Overview:

Lecture-4. TCP/IP-Overview: Lecture-4 TCP/IP-Overview: The history goes back to ARPANET a research network sponsored by DoD US Govt. It eventually connected hundreds of universities and govt installations, using leased telephone

More information

CS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2.

CS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2. CS 356: Computer Network Architectures Lecture 14: Switching hardware, IP auxiliary functions, and midterm review [PD] chapter 3.4.1, 3.2.7 Xiaowei Yang xwy@cs.duke.edu Switching hardware Software switch

More information

Operating Systems CS 571

Operating Systems CS 571 Computer Networks: Overview Operating Systems CS 571 Network types Range Bandwidth (Mbps) Latency (ms) LAN 1-2 kms 10-1000 1-10 WAN worldwide 0.010-600 100-500 MAN 2-50 kms 1-150 10 Wireless LAN 0.15-1.5

More information

TCP/IP Protocol Suite and IP Addressing

TCP/IP Protocol Suite and IP Addressing TCP/IP Protocol Suite and IP Addressing CCNA 1 v3 Module 9 10/11/2005 NESCOT CATC 1 Introduction to TCP/IP U.S. DoD created the TCP/IP model. Provides reliable data transmission to any destination under

More information

0 TCP/IP overview. 0.1 The Internet

0 TCP/IP overview. 0.1 The Internet 0521841445 - / Essentials: A Lab-Based Approach 0 / overview From these assumptions comes the fundamental structure of the Internet: a packet switched communications facility in which a number of distinguishable

More information

DHCP Overview. Information About DHCP. DHCP Overview

DHCP Overview. Information About DHCP. DHCP Overview The Dynamic Host Configuration Protocol (DHCP) is based on the Bootstrap Protocol (BOOTP), which provides the framework for passing configuration information to hosts on a TCP/IP network. DHCP adds the

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 16, 2013 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2013-75 minutes This examination

More information

Typical Network Uses

Typical Network Uses Computer Networks Introduction The next Great Revolution - Computer Networks- computers connected together for exchanging information Our information-oriented society - applications in education, commerce,

More information

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer Computer Networking Chapter #1 Dr. Abdulrhaman Alameer What is Computer Network? It is a collection of computers and devices interconnected by communications channels that facilitate communications among

More information

Networking and the Web Reminder: Next Quiz on 4/15

Networking and the Web Reminder: Next Quiz on 4/15 Networking and the Web Reminder: Next Quiz on 4/15 World-Wide Web Wide use of computers by the general public is directly attributable to the creation of the World Wide Web Key components of the web Computer

More information

CSC Network Security

CSC Network Security CSC 474 -- Security Topic 9. Firewalls CSC 474 Dr. Peng Ning 1 Outline Overview of Firewalls Filtering Firewalls Proxy Servers CSC 474 Dr. Peng Ning 2 Overview of Firewalls CSC 474 Dr. Peng Ning 3 1 Internet

More information

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁 II Sören Schwertfeger 师泽仁 Outline Review Network Layer Routing Transport Layer Applications HTTP Demos Internet: Huge network of networks Billions of hosts (computers) Internet Structure Network Edge:

More information

More Internet Support Protocols

More Internet Support Protocols More Internet Support Protocols Domain Name System (DNS) Ch 2.5 Problem statement: Average brain can easily remember 7 digits On average, IP addresses have 10.28 digits We need an easier way to remember

More information

Hands-On IP for TeleCom Technicians Internetworking, TCP/IP, VLANS, Wirelss and more...

Hands-On IP for TeleCom Technicians Internetworking, TCP/IP, VLANS, Wirelss and more... Hands-On Internetworking, TCP/IP, VLANS, Wirelss 802.11 and more... Course Description The Internet Protocol Suite, commonly known as TCP/IP, forms the basis for the Internet and the next generation of

More information

Unit 28 Website Production ASSIGNMENT 1

Unit 28 Website Production ASSIGNMENT 1 Unit 28 Website Production ASSIGNMENT 1 Last week Learning outcomes History HTML skeleton Annotated diagram of a WAN Servers, routers, client PC, browser, Server OS Switch, packet Architecture ISP Web

More information

Introduction to computer networking

Introduction to computer networking edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing

More information

The Internet Advanced Research Projects Agency Network (ARPANET) How the Internet Works Transport Control Protocol (TCP)

The Internet Advanced Research Projects Agency Network (ARPANET) How the Internet Works Transport Control Protocol (TCP) The Internet, Intranets, and Extranets 1 The Internet The Internet is a collection of interconnected network of computers, all freely exchanging information. These computers use specialized software to

More information

Chapter 11: Wide-Area Networks and the Internet

Chapter 11: Wide-Area Networks and the Internet Chapter 11: Wide-Area Networks and the Internet MULTIPLE CHOICE 1. MAN stands for: a. Manchester Access Network c. Metropolitan-Area Network b. Multiple-Area Network d. Multiple Access Network 2. Packet

More information

CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers

CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers 2007, Jae-sul Lee. All rights reserved. 1 Agenda 11.1 TCP/IP Transport Layer 11.2 The Application Layer What does the TCP/IP transport layer

More information

Deployment Scenarios for Standalone Content Engines

Deployment Scenarios for Standalone Content Engines CHAPTER 3 Deployment Scenarios for Standalone Content Engines This chapter introduces some sample scenarios for deploying standalone Content Engines in enterprise and service provider environments. This

More information

Network Applications Principles of Network Applications

Network Applications Principles of Network Applications Network Applications Principles of Network Applications A Network application is an application running on one host and provides communication to another application running on a different host. At the

More information

PIC 40A. Lecture 1: The Internet. Copyright 2011 Jukka Virtanen UCLA 1 03/31/14

PIC 40A. Lecture 1: The Internet. Copyright 2011 Jukka Virtanen UCLA 1 03/31/14 PIC 40A Lecture 1: The Internet 03/31/14 Copyright 2011 Jukka Virtanen UCLA 1 What is the Internet? For this class we use the following definition: The Internet is a network of networks. Ok. What is a

More information

Session 2. Background. Lecture Objectives

Session 2. Background. Lecture Objectives Session 2 Background 1 Lecture Objectives Understand how an Internet resource is accessed Understand the high level structure of the Internet cloud Understand the high level structure of the TCP/IP protocols

More information

Copyleft 2005, Binnur Kurt. Objectives

Copyleft 2005, Binnur Kurt. Objectives 1 ing Fundamentals Copyleft 2005, Binnur Kurt Objectives Define basic networking terms Describe some commonly used network applications Describe the main purposes and functions of computer networking Describe

More information

The Internet and the World Wide Web

The Internet and the World Wide Web Technology Briefing The Internet and the World Wide Web TB5-1 Learning Objectives TB5-2 Learning Objectives TB5-3 How Did the Internet Get Started? Internet derived from internetworking 1960s U.S. Defense

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

Connecting with Computer Science Chapter 5 Review: Chapter Summary:

Connecting with Computer Science Chapter 5 Review: Chapter Summary: Chapter Summary: The Internet has revolutionized the world. The internet is just a giant collection of: WANs and LANs. The internet is not owned by any single person or entity. You connect to the Internet

More information

Electronic Mail. Three Components: SMTP SMTP. SMTP mail server. 1. User Agents. 2. Mail Servers. 3. SMTP protocol

Electronic Mail. Three Components: SMTP SMTP. SMTP mail server. 1. User Agents. 2. Mail Servers. 3. SMTP protocol SMTP Electronic Mail Three Components: 1. User Agents a.k.a. mail reader e.g., gmail, Outlook, yahoo 2. Mail Servers mailbox contains incoming messages for user message queue of outgoing (to be sent) mail

More information

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2 Chapter 2 Communicating Over The Network CCNA1-1 Chapter 2 Communicating Over the Network The Platform for Communications CCNA1-2 Chapter 2 Elements of Communication People communicate in many different

More information

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects Internet 1) Internet basic technology (overview) 2) Mobility aspects 3) Quality of Service (QoS) aspects Relevant information: these slides (overview) course textbook (Part H) www.ietf.org (details) IP

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

DHCP Client. Finding Feature Information. Restrictions for the DHCP Client

DHCP Client. Finding Feature Information. Restrictions for the DHCP Client The Cisco Dynamic Host Configuration Protocol (DHCP) Client feature allows a Cisco device to act as a host requesting configuration parameters, such as an IP address, from a DHCP server. Finding Feature

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet 2015 Pearson Education Limited 2015 Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols

More information

Configuring the DHCP Relay

Configuring the DHCP Relay CHAPTER 6 This chapter describes how Dynamic Host Configuration Protocol (DHCP) servers provide configuration parameters to DHCP clients. DHCP supplies network settings, including the host IP address,

More information

DHCP Basics (Dynamic Host Configuration Protocol) BUPT/QMUL

DHCP Basics (Dynamic Host Configuration Protocol) BUPT/QMUL DHCP Basics (Dynamic Host Configuration Protocol) BUPT/QMUL 2017-04-01 Topics In This Course Background Introduction of Internet TCP/IP and OSI/RM Socket programmingtypical Internet Applications DHCP (Dynamic

More information

Communicating over the Network

Communicating over the Network Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need

More information

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers SC/CSE 3213 Winter 2013 L8: TCP/IP Overview Sebastian Magierowski York University 1 Outline TCP/IP Reference Model A set of protocols for internetworking The basis of the modern IP Datagram Exchange Examples

More information

CompTIA Network+ Course

CompTIA Network+ Course CompTIA Network+ Course Duration: 5 Days Course Delivery: Classroom Language: English Target Audience Comprehensive approach to both preparing a student for CompTIA's Network+ exam and developing proficiency

More information

Objective. Application Layer Functionality and Protocols. CCNA Exploration 4.0 Network Fundamentals Chapter 03. Universitas Dian Nuswantoro

Objective. Application Layer Functionality and Protocols. CCNA Exploration 4.0 Network Fundamentals Chapter 03. Universitas Dian Nuswantoro CCNA Exploration 4.0 Network Fundamentals Chapter 03 Application Layer Functionality and Protocols Universitas Dian Nuswantoro 1 Objective In this chapter, you will learn to: Describe how the functions

More information

AQU Information Systems Fundamentals Spring 2012 Pg. 9.1

AQU Information Systems Fundamentals Spring 2012 Pg. 9.1 AQU Information Systems Fundamentals Spring 2012 Pg. 9.1 c h a p t e r 9 THE INTERNET & THE NEW INFORMATION TECHNOLOGY INFRASTRUCTURE 9.1 LEARNING OBJECTIVES Describe features of infrastructure & connectivity

More information

IBM. Networking Dynamic Host Configuration Protocol. IBM i 7.1

IBM. Networking Dynamic Host Configuration Protocol. IBM i 7.1 IBM IBM i Networking Dynamic Host Configuration Protocol 7.1 IBM IBM i Networking Dynamic Host Configuration Protocol 7.1 Note Before using this information and the product it supports, read the information

More information

Technology in Action. Chapter 13 Behind the Scenes: The Internet: How It Works Prentice-Hall, Inc.

Technology in Action. Chapter 13 Behind the Scenes: The Internet: How It Works Prentice-Hall, Inc. Technology in Action Chapter 13 Behind the Scenes: The Internet: How It Works 1 Chapter Topics Managing the Internet Interaction between Internet components Internet data transmission and protocols IP

More information

Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic

Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition Chapter 2 Investigating Network Traffic Objectives After completing this chapter, you should be able to: Understand network

More information

Networks, WWW, HTTP. Web Technologies I. Zsolt Tóth. University of Miskolc. Zsolt Tóth (University of Miskolc) Networks, WWW, HTTP / 35

Networks, WWW, HTTP. Web Technologies I. Zsolt Tóth. University of Miskolc. Zsolt Tóth (University of Miskolc) Networks, WWW, HTTP / 35 Networks, WWW, HTTP Web Technologies I. Zsolt Tóth University of Miskolc 2018 Zsolt Tóth (University of Miskolc) Networks, WWW, HTTP 2018 1 / 35 Table of Contents Networks Internet 1 Networks Internet

More information

Manual Configuration Stateful Address Configuration (i.e. from servers) Stateless Autoconfiguration : IPv6

Manual Configuration Stateful Address Configuration (i.e. from servers) Stateless Autoconfiguration : IPv6 Manual Configuration Stateful Address Configuration (i.e. from servers) BOOTP DHCPv4, DHCPv6 Stateless Auto : IPv6 최양희서울대학교컴퓨터공학부 2005 Yanghee Choi 2 RARP Hardware address ---> IP address requires direct

More information

FTP,HTTP. By Nidhi Jindal

FTP,HTTP. By Nidhi Jindal APPLICATION LAYER: SMTP, POP, IMAP, FTP,HTTP By Nidhi Jindal. MESSAGE TRANSFER AGENT: SMTP The actual mail transfer requires message transfer agents (MTAs). The protocol that defines the MTA client and

More information

Solved MCQ of Computer networking. Set-1

Solved MCQ of Computer networking. Set-1 Solved MCQ of Computer networking Set-1 1. The computer network is A) Network computer with cable B) Network computer without cable C) Both of the above D) None of the above 2. FDDI used which type of

More information

Module 2 Overview of Computer Networks

Module 2 Overview of Computer Networks Module 2 Overview of Computer Networks Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link:

More information

Module 2 Overview of. Computer Networks

Module 2 Overview of. Computer Networks Module Overview of Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link: CS454/654 - Issues How

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

Internet. Class-In charge: S.Sasirekha

Internet. Class-In charge: S.Sasirekha Internet Class-In charge: S.Sasirekha COMPUTER NETWORK A computer network is a collection of two or more computers, which are connected together to share information and resources. Network Operating Systems

More information

Chapter 3 The Basics of Networking

Chapter 3 The Basics of Networking Fluency with Information Technology 7 th Edition Chapter 3 The Basics of Networking HTML Hypertext Markup Language Layout of document (Margin, font, text, image, ) Jump from point to point (non-linear)

More information