WEB ADMINISTRATION AND MANAGEMENT. Internetworking: Concepts, Principles and Application
|
|
- Maximillian Bryant
- 5 years ago
- Views:
Transcription
1 WEB ADMINISTRATION AND MANAGEMENT 3/17/2015 Internetworking: Concepts, Principles and Application 1 J. K. Mandal Professor & Ex-Dean FETM, Department of Computer Science & Engineering, University of Kalyani Kalyani, Nadia, West Bengal jkm.cse@gmail.com Mobile:
2
3 Figure 7.20 Omnidirectional antennas
4 TYPES OF TRANSMISSION Guided Transmission Unguided Transmission 3/17/2015
5 Figure 7.1 Transmission medium and physical layer
6 Fibre- and wire-based transmissions and their ranges (without using repeater), frequencies, and properties. 3/17/2015
7 3/17/2015
8 THE ELECTROMAGNETIC SPECTRUM The electromagnetic spectrum and its uses for communication.
9 COMMUNICATION SATELLITES Communication satellites and some of their properties, including altitude above the earth, round-trip delay time and number of satellites needed for global coverage.
10 COMMUNICATION SATELLITES The principal satellite bands.
11 GLOBALSTAR (a) Relaying in space. (b) Relaying on the ground.
12 IEEE 802 STANDARDS The 802 working groups. The important ones are marked with *. The ones marked with are hibernating. The one marked with gave up.
13
14 Figure 7.10 Bending of light ray
15 Figure 7.11 Optical fiber
16
17
18
19 BUS TOPOLOGY OF LAN
20
21
22 HUB/SWITCH BASED LAN
23
24 DISTRIBUTED APPLICATIONS IN E-COMMERCE
25 WEB SERVER CONFIGURATIONS
26 DETAILED LAYOUT OF CONNECTIVITY
27 INTERNET ACCESS Dial-up Connection Leased Line
28 DIAL UP CONNECTION An account with internet access provider A Telephone Connection Computer with serial port A modem(external/internal) A communication software
29 LEASED CONNECTION Dedicated line between system and provider Leased Line Modem Computer with serial port A communication software Router IP addresses
30 IP ADDRESS Identifier for a particular machine IP address are unique No two machines can have the same Ip addresses
31 DOMAIN NAME Way to identify and locate computers connected to internet. No two organisation can have same domain name. Top level domains are: Com commercial entities Edu educational institutions Net orgnizations directly connectyed to internet operation Org nonprofit group of organizations Gov government organization Mil united states military Country codes - two letters abbreviations for a country- in for India fr -France, np -Nepal, uk - United Kingdom
32 Allows information to be send between computers and people on the internet.basic structure of address is
33 </html> WEB PAGES & HTML A web page is a single unit of information called document which is available through www. HTML defines is a script language to built web pages HTML Tags are: <html>,<i>,<p> Example code is <html> <center><h1>this is a sample Page<h1></center> <img src = logo.jpg ><br>
34 APPLICATION IN MAILING AND WEB BASED APPLICATIONS MAIL IN AN INTRANET WEB MAIL WEB BASED INFORMATION SYSTEM
35 OVERALL REPRESENTATION OF THE LAN & INTERNET SYSTEM LIBRARY SERVER SWITCH MODEM MODEM ROUTER EXCHANGE END UNVERSITY END SERVER SWITCH
36 SILIGURI REGIONAL OFFICE SETUP Towards RO S LAN D-LINK SWITCH WIC-2T CARD ISDN CARD ROUTER B ROUTER A LEASED LINE H.O. ROUTER ISDN LINK LEASED LINE LEASED LINE VSAT LINK BETWEEN HO AND SLG. BR. SEVOKE ROAD BRANCH ROUTER SILIGURI BRANCH ROUTER
37
38 ADDRESSING 3/17/2015 Client Server 38
39 TCP/IP protocol suite TCP/IP Protocol Suite 39
40 Figure 2.2 Internet layers
41 Figure 2.3 Peer-to-peer processes
42 Figure 2.4 An exchange using the Internet model
43 43 3/17/2015
44 SENDING AND RECEIVING BUFFERS 3/17/2015 Stream of bytes 44
45 TCP SEGMENTS 3/17/2015 Segment N H Segment 1 H 45
46 WELL KNOWN PORTS USED BY TCP 3/17/
47 ENCAPSULATION TCP header Application-layer data 3/17/2015 Frame header IP header Data-link layer payload TCP payload IP payload 47
48 FTP/ TFTP 3/17/
49 FTP File Transfer Protocol (FTP) is the standard mechanism provided by TCP/IP for copying a file from one host to another. Although transferring files from one system to another seems simple and straightforward, some problems must be dealt with first. For example, two systems may use different file name conventions. Two systems may have different ways to represent text and data. Two systems may have different directory structures. All of these problems have been solved by FTP in a very simple and elegant approach. 3/17/2015 jkm.cse@gmail.com 49
50 FILE TRANSFER PROTOCOL FTP 3/17/
51 ACCESS COMMANDS 3/17/
52 FILE MANAGEMENT COMMANDS 3/17/
53 FILE TRANSFER COMMAND 3/17/
54 FILE TRANSFER 3/17/
55 USER INTERFACE % ftp challenger.atc.fhda.edu Connected to challenger.atc.fhda.edu 220 Server ready Name: jkmandal 3/17/2015 jkm.cse@gmail.com Password: xxxxxxx ftp > ls /usr/user/report 200 OK 55
56 CONT 150 Opening ASCII mode transfer complete ftp > close 221 Goodbye 3/17/2015 ftp > quit 56
57 ANONYMOUS FTP % ftp internic.net Connected to internic.net 220 Server ready Name: anonymous 331 Guest login OK, send guest as password Password: guest ftp > pwd 257 / is current directory 57 3/17/2015 jkm.cse@gmail.com
58 CONT ftp > ls 200 OK 150 Opening ASCII mode bin ftp> close 221 Goodbye ftp> quit 58 3/17/2015
59 MAIL SERVICES 3/17/
60 MAIL SERVICES Three major mail services: Simple Mail Transfer Protocol SMTP Post Office Protocol POP3 Internet Mail Access Protocol IMAP or IMAP4 3/17/
61 WHICH ONE TO USE? Outbound Mail SMTP for outbound Port 25 or 2525 Inbound Mail POP3 for inbound Port 110 IMAP for inbound Port 143 3/17/
62 SMTP 3/17/2015 When the sender and the receiver of an are on the same mail server, we need only two user agents. 62
63 SMTP 3/17/ jkm.cse@gmail.com When the sender and the receiver of an are on different mail servers, we need two UAs and a pair of MTAs (client and server). 63
64 SMTP 1 2 3/17/ jkm.cse@gmail.com When the sender is connected to the mail server via a LAN or a WAN, we need two UAs and two pairs of MTAs (client and server). 64
65 SMTP (CONT ) When both sender and receiver are connected to the mail server via a LAN or a WAN, we need two UAs, two pairs of MTAs (client and server), and a pair of MAAs (client and server). This is the most common situation today. 3/17/2015 jkm.cse@gmail.com 65
66 SMTP /17/ jkm.cse@gmail.com
67 SMTP (CONT ) The actual mail transfer is done through message transfer agents (MTAs). To send mail, a system must have the client MTA, and to receive mail, a system must have a server MTA. The formal protocol that defines the MTA client and server in the Internet is called Simple Mail Transfer Protocol (SMTP). As we said before, two pairs of MTA client-server programs are used in the most common situation. 3/17/2015 jkm.cse@gmail.com 67
68 ADDRESS 3/17/
69 MESSAGE ACCESS AGENT The first and the second stages of mail delivery use SMTP. However, SMTP is not involved in the third stage because SMTP is a push protocol; it pushes the message from the client to the server. In other words, the direction of the bulk data (messages) is from the client to the server. On the other hand, the third stage needs a pull protocol; the client must pull messages from the server. The direction of the bulk data are from the server to the client. The third stage uses a message access agent. 3/17/2015 jkm.cse@gmail.com 69
70 PROXY SERVERS 3/17/
71 INTERNET CONNECTION ISP network ISP network 3/17/2015 Bandwidth-limited links ISP network Customer Networks Backbone networks Customers connect to an ISP ISPs connect to backbone 71
72 WHAT IS A WEB PROXY? A proxy is a host which relays web access requests from clients Used when clients do not access the web directly. Used for security, logging, accounting and performance. 3/17/2015 jkm.cse@gmail.com browser proxy web 72
73 WHAT IS WEB CACHING? Storing copies of recently accessed web pages Pages are delivered from the cache when requested again Browser caches, Proxy caches Shorter response time 3/17/2015 Reduced bandwidth requirement Reduced load on servers Access control and logging 73
74 POPULAR PROXY CACHES Apache proxy MS proxy server WinProxy Squid Squid is popular because it is powerful, configurable and free Many others 3/17/
75 PROXY SERVERS Scan and act on the data portion of an IP packet Act primarily on behalf of internal hosts receiving, rebuilding, and forwarding outbound requests Known by many names Proxy services Application-level gateways Application proxies 3/17/
76 HOW PROXY SERVERS WORK Function as a software go-between, forwarding data between internal and external hosts Focus on the port each service uses Screen all traffic into and out of each port Decide whether to block or allow traffic based on rules Add time to communications, but in return, they: Conceal clients Translate network addresses Filter content 76 3/17/2015 jkm.cse@gmail.com
77 STEPS INVOLVED IN A PROXY TRANSACTION 1. Internal host makes request to access a Web site 2. Request goes to proxy server, which examines header and data of the packet against rule base 3. Proxy server recreates packet in its entirety with a different source IP address 4. Proxy server sends packet to destination; packet appears to come from proxy server 5. Returned packet is sent to proxy server, which inspects it again and compares it against its rule base 6. Proxy server rebuilds returned packet and sends it to originating computer; packet appears to come from external host 77 3/17/2015 jkm.cse@gmail.com
78 3/17/
79 GOALS OF PROXY SERVERS Conceal internal clients Block URLs Block and filter content Protect proxy Improve performance Ensure security Provide user authentication Redirect URLs 3/17/
80 BLOCKING URL 3/17/
81 EACH CLIENT ON THE NETWORK MUST BE CONFIGURED TO ACCESS THE PROXY SERVER 3/17/
82 ENSURING SECURITY WITH LOG FILES Select only the most critical services and events to log 3/17/
83 REDIRECTING URLS Proxy can be configured to recognize two types of content and perform URL redirection to send them to other locations Files or directories requested by the client Host name with which the client wants to communicate (most popular) 3/17/
84 TYPES OF PROXY SERVERS Transparent Nontransparent SOCKS based 3/17/
85 TRANSPARENT PROXIES Can be configured to be totally invisible to end user Sit between two networks like a router Individual host does not know its traffic is being intercepted Client software does not have to be configured 3/17/2015 jkm.cse@gmail.com 85
86 NONTRANSPARENT PROXIES Require client software to be configured to use the proxy server All target traffic is forwarded to the proxy at a single target port (typically use SOCKS protocol) More complicated to configure, but provide greater security Also called explicit proxies 3/17/2015 jkm.cse@gmail.com Nontransparent proxies use a single port number and IP address 86
87 HTTP HYPERTEXT TRANSFER PROTOCOL 3/17/
88 HYPERTEXT TRANSFER PROTOCOL HTTP: hypertext transfer protocol Web s application layer protocol client/server model client: browser that requests, receives, displays Web objects server: Web server sends objects in response to requests PC running Explorer Mac running Navigator Server running Apache Web server 88 3/17/2015 jkm.cse@gmail.com
89 HTTP HTTP (Hyper Text Transfer Protocol) is used to transfer web pages from a Web Server to Web Client (Browser) Web Pages are arranged in a directory structure in the Web Server HTTP supports CGI (Common Gateway interface) HTTP supports Virtual Hosting (Hosting multiple sites on the same server) Popular Web Servers Apache Windows IIS IBM Websphere 89 3/17/2015 jkm.cse@gmail.com
90 CLIENT-SERVER ARCHITECTURE 3/17/
91 DHCP DYNAMIC HOST CONFIGURATION PROTOCOL 3/17/
92 MOTIVATION FOR DHCP Configuration parameters for network hosts IP address Router Subnet Mask Many more Before DHCP Manual assignment RARP BOOTP 92 3/17/2015
93 DHCP FEATURES Protocol for providing configuration parameters to hosts over network Dynamic allocation of IP addresses Minimal human intervention 3/17/
94 SAMPLE NETWORK DHCP Clients DHCP Server 3/17/2015 UDP Port 68 UDP Port 68 UDP Port 68 UDP Port 67 Router Internet 94
95 DHCP MESSAGE TYPES DHCP Message DHCPDISCOVER DHCPOFFER DHCPREQUEST DHCPDECLINE DHCPACK Use Client broadcast to locate available servers Server to client response offering configuration parameters Client broadcast requesting offered parameters Client to server notification that IP address is in use Server to client response confirming a request 3/17/2015 jkm.cse@gmail.com DHCPNAK DHCPRELEASE DHCPINFORM Server to client response denying a request Client to server request to relinquish IP address Client to server request for configuration parameters 95
96 DNS 3/17/
97 INTERNET NAMING HIERARCHY The silent dot at the end of all addresses 3/17/2015.com.net.org.in www 97
98 DNS OPERATION A DNS server maintains the name to IP address mapping of the domain for which it is the name server. The DNS server for a domain is registered with the domain registrar and the entry is maintained by the Internet Root-Servers (13) or Country Level Root- Servers. Whenever a server is queried, if doesn t have the answer, the root servers are contacted. The root servers refer to the DNS server for that domain (in case the domain is a top level domain) or the Country Root Server (in case the domain is country level domain). 98 3/17/2015 jkm.cse@gmail.com
99 WEB ADMINISTRATION 3/17/
100 WEBSITE PUBLISHING Customer service / problem solving Information restructuring and website planning Website design Website templateing and production Database design, programming and management Web application development Website maintenance Online maps creation E-news creation, distribution and list management Video editing, processing and distribution PDF creation, editing and distribution Data mining 100 3/17/2015 jkm.cse@gmail.com
101 HOW WE CAN DO IT? 1. Determine client needs, project scope and timeline 2. Gather and analyze client materials 3. Provide proposal and cost estimate 4. Build outline / planning document for new website or database 5. Hire writer, illustrator, photographer (as needed) 6. Hire designer based on project specifics 7. Begin database design process (as needed) 8. Build website templates, make revisions 9. Produce website with provided content 10. Import and integrate database-driven content 11. Client testing and revisions 12. Website launch, provide maintenance option 101 3/17/2015 jkm.cse@gmail.com
102 NORMAL REQUIREMENT BY CLIENT/ CUSTOMER 1. A website that is professionally designed 2. A website that is easy to use and makes sense 3. A website that is affordable 4. A website that they can maintain 5. A website that provides unique content 6. A website that is accessible, up to standards 7. A website that performs tasks online (forms, apps) 3/17/2015 jkm.cse@gmail.com 102
103
104
105
106 3/17/
107 3/17/
108 THANK YOU 108
109 THE END 3/17/
Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0
Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 CCNET v6 10 Chapter 10 - Sections & Objectives 10.1 Application Layer Protocols Explain the operation of the application
More informationSpecial expressions, phrases, abbreviations and terms of Computer Networks
access access point adapter Adderssing Realm ADSL (Asymmetrical Digital Subscriber Line) algorithm amplify amplitude analog antenna application architecture ARP (Address Resolution Protocol) AS (Autonomous
More informationGuide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols
Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP
More informationComputer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University
Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules
More informationIntroduction to Networking
Introduction to Networking The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Simplified Communications System Block
More informationApplication Layer: OSI and TCP/IP Models
Application Layer Application Layer: OSI and TCP/IP Models The communication process between two communicating nodes is actually a communication process between two applications on these devices. Service
More informationAPPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.
APPLICATION LAYER : DNS, HTTP, E-mail, SMTP, Telnet, FTP, Security-PGP-SSH. To identify an entity, the Internet used the IP address, which uniquely identifies the connection of a host to the Internet.
More informationChapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.
Chapter 4: Networking and the 4.1 Network Fundamentals 4.2 The 4.3 The World Wide Web 4.4 Protocols 4.5 Security Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area
More informationCCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols
CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services
More informationZENworks for Desktops Preboot Services
3.2 Novell ZENworks for Desktops Preboot Services DEPLOYMENT www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
More informationCCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols
CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means
More informationIP - The Internet Protocol
IP - The Internet Protocol 1 Orientation IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network Layer ARP Network Access Link Layer Media 2 IP:
More information6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning
6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories
More informationNetwork Model. Why a Layered Model? All People Seem To Need Data Processing
Network Model Why a Layered Model? All People Seem To Need Data Processing Layers with Functions Packet Propagation Each router provides its services to support upper-layer functions. Headers (Encapsulation
More informationM2-R4: INTERNET TECHNOLOGY AND WEB DESIGN
M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the
More informationINTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS. Faramarz Hendessi
INTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS Faramarz Hendessi INTRODUCTORY INFORMATION TECHNOLOGY Lecture 6 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi Overview
More informationNetworking Basics. EC512 Spring /15/2015 EC512 - Prof. Thomas Skinner 1
Networking Basics EC512 Spring 2015 2/15/2015 EC512 - Prof. Thomas Skinner 1 Protocols Protocols are required in order to allow information to be extracted from the stream of bits flowing from one point
More information2. Introduction to Internet Applications
2. Introduction to Internet Applications 1. Representation and Transfer 2. Web Protocols 3. Some Other Application Layer Protocols 4. Uniform Resource Identifiers (URIs) 5. Uniform Resource Locators (URLs)
More informationChapter 10: Application Layer
Chapter 10: Application Layer Application, Session and Presentation Presentation and Session Layers Session layer Functions, creates, and maintains dialogs between source and destination applications Handles
More informationCCNA 1 Chapter 10 v5.0 Exam Answers 2013
CCNA 1 Chapter 10 v5.0 Exam Answers 2013 1 Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.) physical
More informationA+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 8 Networking Essentials Objectives Learn about the protocols and standards Windows uses for networking Learn how to connect
More information06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322
1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet
More informationChapter 26 Remote Logging, Electronic Mail, and File Transfer 26.1
Chapter 26 Remote Logging, Electronic Mail, and File Transfer 26.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 26-1 REMOTE LOGGING It would be impossible
More informationCCNA R&S: Introduction to Networks. Chapter 10: The Application Layer
CCNA R&S: Introduction to Networks Chapter 10: The Application Layer Frank Schneemann 10.0.1.1 Introduction 10.0.1.2 Activity - Application Investigation 10.1.1.1 OSI and TCP/IP Models Revisited The application
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 13, 2011 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2011-75 minutes This examination
More informationHow does the Internet Work? The Basics: Getting a Web Page. The Basics: Getting a Web Page. Client-Server model. The Internet: Basics
How does the Internet Work? When you type a URL (Uniform Resource Locator) into a Web Browser and press Return, what do you think happens? That is, what steps do you think are required to obtain a web
More informationCOMPUTER NETWORK. PREPARED BY: DHAVAL R. PATEL Page 1. Q.1 Explain IP address. IP address is unique number of network device in network.
Q.1 Explain IP address. IP address is unique number of network device in network. Two IP address could not be same. Using this network we can connect the devices with each other. It is separated by dot(.).
More informationProtocol Classification
DNS and DHCP TCP/IP Suite Suite of protocols (not just TCP and IP) Main protocols TCP and UDP at the Transport Layer, and IP at the Network Layer Other protocols ICMP, ARP, Telnet, Ftp, HTTP, SMTP, SNMP
More informationIntroduction to Networking
Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI
More informationObjectives. Connecting with Computer Science 2
Objectives Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar with Internet-related protocols Understand how the TCP/IP protocols relate to the Internet
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationDNS is the mechanism by which Internet software translates names to attributes such as addresses.
Full form: 1 PSTN : Public Switching Telephone Networks 2 ISDN : Integrated Services Digital Network. 3 DSL: Digital Subscribe Line. 4 CATV: Community Antenna Television. 5 DHCP: Dynamic Host Configuration
More informationChapter 2 Communicating Over the Network
Chapter 2 Communicating Over the Network Elements of Communication Communicating the Messages Continuous stream of bits 00101010100101010101010101010101010 I have to wait Single communications (e.g. video,
More informationHigher layer protocols
ETSF05/ETSF10 Internet Protocols Higher layer protocols DHCP DNS Real time applications RTP The hen or the egg? DHCP IP addr. IP DNS TCP UDP ETSF05/ETSF10 - Internet Protocols 2 What to configure IP address
More informationE-Commerce. Infrastructure I: Computer Networks
E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.
More informationCS 356: Computer Network Architectures. Lecture 15: DHCP, NAT, and IPv6. [PD] chapter 3.2.7, 3.2.9, 4.1.3, 4.3.3
CS 356: Computer Network Architectures Lecture 15: DHCP, NAT, and IPv6 [PD] chapter 3.2.7, 3.2.9, 4.1.3, 4.3.3 Xiaowei Yang xwy@cs.duke.edu Dynamic Host Configuration Protocol (DHCP) Dynamic Assignment
More information6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning
6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories
More informationScale Yourself. Lesson 3: Introduction to Internet Technology. Computer Technology 3/13/2015
Computer Technology Lesson 3: Introduction to Internet Technology Learning Goal: Students will be able to understand the elements of a network. Scale Yourself 4 I do understand the elements of a network.
More informationOutline. Internet and World Wide Web. History of the Internet. What is the Internet? How Does Data Travel Through the Internet?
Outline Internet and World Wide Web Internet World Wide Web Creating Web Pages CS 1410 Intro to Computer Tecnology Internet and World Wide Web 2 What is the Internet? The internet is a network of networks
More informationINTERNET ARCHITECTURE & PROTOCOLS
INTERNET ARCHITECTURE & PROTOCOLS Set # 01 Delivered By: Engr Tahir Niazi What is Internet? Basically it is called Network of networks Nuts and Bolts (Pieces of internet) Services description (applications)
More informationDESCRIPTION OF TYPICAL NETWORK SERVICES ON SERVERS
DESCRIPTION OF TYPICAL NETWORK SERVICES ON SERVERS Before you start Objectives: Familiarize yourself with the services such as File and Print, WWW, FTP, E- mail, Faxing, Remote Access, DHCP, DNS and WINS.
More informationEITF25 Internet- - Techniques and Applica8ons Stefan Höst. L9 Applica8on layer
EITF25 Internet- - Techniques and Applica8ons Stefan Höst L9 Applica8on layer Client- server paradigm E.g. www, IPTV, OTT, Online games, etc 2 Peer- to- peer paradigm E.g. BitTorrent, Voddler, Skype, etc
More informationConcept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.
113 Chapter 9 TCP/IP Transport and Application Layer Services that are located in the transport layer enable users to segment several upper-layer applications onto the same transport layer data stream.
More informationReview: Networking Fall Final
Review: Networking Fall Final Question 1 of 43 You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have? Peer to peer
More informationReview for Internet Introduction
Review for Internet Introduction What s the Internet: Two Views View 1: Nuts and Bolts View billions of connected hosts routers and switches protocols control sending, receiving of messages network of
More informationChapter 3. The Basics of Networking
Chapter 3 The Basics of Networking Learning Objectives Tell whether a communication technology (Internet, radio, LAN, etc.) is synchronous or asynchronous; broadcast or point-to-point Explain the roles
More informationTCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12
TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group
More informationLecture-4. TCP/IP-Overview:
Lecture-4 TCP/IP-Overview: The history goes back to ARPANET a research network sponsored by DoD US Govt. It eventually connected hundreds of universities and govt installations, using leased telephone
More informationCS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2.
CS 356: Computer Network Architectures Lecture 14: Switching hardware, IP auxiliary functions, and midterm review [PD] chapter 3.4.1, 3.2.7 Xiaowei Yang xwy@cs.duke.edu Switching hardware Software switch
More informationOperating Systems CS 571
Computer Networks: Overview Operating Systems CS 571 Network types Range Bandwidth (Mbps) Latency (ms) LAN 1-2 kms 10-1000 1-10 WAN worldwide 0.010-600 100-500 MAN 2-50 kms 1-150 10 Wireless LAN 0.15-1.5
More informationTCP/IP Protocol Suite and IP Addressing
TCP/IP Protocol Suite and IP Addressing CCNA 1 v3 Module 9 10/11/2005 NESCOT CATC 1 Introduction to TCP/IP U.S. DoD created the TCP/IP model. Provides reliable data transmission to any destination under
More information0 TCP/IP overview. 0.1 The Internet
0521841445 - / Essentials: A Lab-Based Approach 0 / overview From these assumptions comes the fundamental structure of the Internet: a packet switched communications facility in which a number of distinguishable
More informationDHCP Overview. Information About DHCP. DHCP Overview
The Dynamic Host Configuration Protocol (DHCP) is based on the Bootstrap Protocol (BOOTP), which provides the framework for passing configuration information to hosts on a TCP/IP network. DHCP adds the
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 16, 2013 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2013-75 minutes This examination
More informationTypical Network Uses
Computer Networks Introduction The next Great Revolution - Computer Networks- computers connected together for exchanging information Our information-oriented society - applications in education, commerce,
More informationComputer Networking. Chapter #1. Dr. Abdulrhaman Alameer
Computer Networking Chapter #1 Dr. Abdulrhaman Alameer What is Computer Network? It is a collection of computers and devices interconnected by communications channels that facilitate communications among
More informationNetworking and the Web Reminder: Next Quiz on 4/15
Networking and the Web Reminder: Next Quiz on 4/15 World-Wide Web Wide use of computers by the general public is directly attributable to the creation of the World Wide Web Key components of the web Computer
More informationCSC Network Security
CSC 474 -- Security Topic 9. Firewalls CSC 474 Dr. Peng Ning 1 Outline Overview of Firewalls Filtering Firewalls Proxy Servers CSC 474 Dr. Peng Ning 2 Overview of Firewalls CSC 474 Dr. Peng Ning 3 1 Internet
More informationIntroduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁
II Sören Schwertfeger 师泽仁 Outline Review Network Layer Routing Transport Layer Applications HTTP Demos Internet: Huge network of networks Billions of hosts (computers) Internet Structure Network Edge:
More informationMore Internet Support Protocols
More Internet Support Protocols Domain Name System (DNS) Ch 2.5 Problem statement: Average brain can easily remember 7 digits On average, IP addresses have 10.28 digits We need an easier way to remember
More informationHands-On IP for TeleCom Technicians Internetworking, TCP/IP, VLANS, Wirelss and more...
Hands-On Internetworking, TCP/IP, VLANS, Wirelss 802.11 and more... Course Description The Internet Protocol Suite, commonly known as TCP/IP, forms the basis for the Internet and the next generation of
More informationUnit 28 Website Production ASSIGNMENT 1
Unit 28 Website Production ASSIGNMENT 1 Last week Learning outcomes History HTML skeleton Annotated diagram of a WAN Servers, routers, client PC, browser, Server OS Switch, packet Architecture ISP Web
More informationIntroduction to computer networking
edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing
More informationThe Internet Advanced Research Projects Agency Network (ARPANET) How the Internet Works Transport Control Protocol (TCP)
The Internet, Intranets, and Extranets 1 The Internet The Internet is a collection of interconnected network of computers, all freely exchanging information. These computers use specialized software to
More informationChapter 11: Wide-Area Networks and the Internet
Chapter 11: Wide-Area Networks and the Internet MULTIPLE CHOICE 1. MAN stands for: a. Manchester Access Network c. Metropolitan-Area Network b. Multiple-Area Network d. Multiple Access Network 2. Packet
More informationCCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers
CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers 2007, Jae-sul Lee. All rights reserved. 1 Agenda 11.1 TCP/IP Transport Layer 11.2 The Application Layer What does the TCP/IP transport layer
More informationDeployment Scenarios for Standalone Content Engines
CHAPTER 3 Deployment Scenarios for Standalone Content Engines This chapter introduces some sample scenarios for deploying standalone Content Engines in enterprise and service provider environments. This
More informationNetwork Applications Principles of Network Applications
Network Applications Principles of Network Applications A Network application is an application running on one host and provides communication to another application running on a different host. At the
More informationPIC 40A. Lecture 1: The Internet. Copyright 2011 Jukka Virtanen UCLA 1 03/31/14
PIC 40A Lecture 1: The Internet 03/31/14 Copyright 2011 Jukka Virtanen UCLA 1 What is the Internet? For this class we use the following definition: The Internet is a network of networks. Ok. What is a
More informationSession 2. Background. Lecture Objectives
Session 2 Background 1 Lecture Objectives Understand how an Internet resource is accessed Understand the high level structure of the Internet cloud Understand the high level structure of the TCP/IP protocols
More informationCopyleft 2005, Binnur Kurt. Objectives
1 ing Fundamentals Copyleft 2005, Binnur Kurt Objectives Define basic networking terms Describe some commonly used network applications Describe the main purposes and functions of computer networking Describe
More informationThe Internet and the World Wide Web
Technology Briefing The Internet and the World Wide Web TB5-1 Learning Objectives TB5-2 Learning Objectives TB5-3 How Did the Internet Get Started? Internet derived from internetworking 1960s U.S. Defense
More informationIdentify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)
Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install
More informationConnecting with Computer Science Chapter 5 Review: Chapter Summary:
Chapter Summary: The Internet has revolutionized the world. The internet is just a giant collection of: WANs and LANs. The internet is not owned by any single person or entity. You connect to the Internet
More informationElectronic Mail. Three Components: SMTP SMTP. SMTP mail server. 1. User Agents. 2. Mail Servers. 3. SMTP protocol
SMTP Electronic Mail Three Components: 1. User Agents a.k.a. mail reader e.g., gmail, Outlook, yahoo 2. Mail Servers mailbox contains incoming messages for user message queue of outgoing (to be sent) mail
More informationChapter 2. Communicating Over The Network. CCNA1-1 Chapter 2
Chapter 2 Communicating Over The Network CCNA1-1 Chapter 2 Communicating Over the Network The Platform for Communications CCNA1-2 Chapter 2 Elements of Communication People communicate in many different
More informationInternet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects
Internet 1) Internet basic technology (overview) 2) Mobility aspects 3) Quality of Service (QoS) aspects Relevant information: these slides (overview) course textbook (Part H) www.ietf.org (details) IP
More informationChapter 12 Network Protocols
Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)
More informationDHCP Client. Finding Feature Information. Restrictions for the DHCP Client
The Cisco Dynamic Host Configuration Protocol (DHCP) Client feature allows a Cisco device to act as a host requesting configuration parameters, such as an IP address, from a DHCP server. Finding Feature
More informationChapter 4: Networking and the Internet
Chapter 4: Networking and the Internet 2015 Pearson Education Limited 2015 Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols
More informationConfiguring the DHCP Relay
CHAPTER 6 This chapter describes how Dynamic Host Configuration Protocol (DHCP) servers provide configuration parameters to DHCP clients. DHCP supplies network settings, including the host IP address,
More informationDHCP Basics (Dynamic Host Configuration Protocol) BUPT/QMUL
DHCP Basics (Dynamic Host Configuration Protocol) BUPT/QMUL 2017-04-01 Topics In This Course Background Introduction of Internet TCP/IP and OSI/RM Socket programmingtypical Internet Applications DHCP (Dynamic
More informationCommunicating over the Network
Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need
More informationSC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers
SC/CSE 3213 Winter 2013 L8: TCP/IP Overview Sebastian Magierowski York University 1 Outline TCP/IP Reference Model A set of protocols for internetworking The basis of the modern IP Datagram Exchange Examples
More informationCompTIA Network+ Course
CompTIA Network+ Course Duration: 5 Days Course Delivery: Classroom Language: English Target Audience Comprehensive approach to both preparing a student for CompTIA's Network+ exam and developing proficiency
More informationObjective. Application Layer Functionality and Protocols. CCNA Exploration 4.0 Network Fundamentals Chapter 03. Universitas Dian Nuswantoro
CCNA Exploration 4.0 Network Fundamentals Chapter 03 Application Layer Functionality and Protocols Universitas Dian Nuswantoro 1 Objective In this chapter, you will learn to: Describe how the functions
More informationAQU Information Systems Fundamentals Spring 2012 Pg. 9.1
AQU Information Systems Fundamentals Spring 2012 Pg. 9.1 c h a p t e r 9 THE INTERNET & THE NEW INFORMATION TECHNOLOGY INFRASTRUCTURE 9.1 LEARNING OBJECTIVES Describe features of infrastructure & connectivity
More informationIBM. Networking Dynamic Host Configuration Protocol. IBM i 7.1
IBM IBM i Networking Dynamic Host Configuration Protocol 7.1 IBM IBM i Networking Dynamic Host Configuration Protocol 7.1 Note Before using this information and the product it supports, read the information
More informationTechnology in Action. Chapter 13 Behind the Scenes: The Internet: How It Works Prentice-Hall, Inc.
Technology in Action Chapter 13 Behind the Scenes: The Internet: How It Works 1 Chapter Topics Managing the Internet Interaction between Internet components Internet data transmission and protocols IP
More informationComputer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic
Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition Chapter 2 Investigating Network Traffic Objectives After completing this chapter, you should be able to: Understand network
More informationNetworks, WWW, HTTP. Web Technologies I. Zsolt Tóth. University of Miskolc. Zsolt Tóth (University of Miskolc) Networks, WWW, HTTP / 35
Networks, WWW, HTTP Web Technologies I. Zsolt Tóth University of Miskolc 2018 Zsolt Tóth (University of Miskolc) Networks, WWW, HTTP 2018 1 / 35 Table of Contents Networks Internet 1 Networks Internet
More informationManual Configuration Stateful Address Configuration (i.e. from servers) Stateless Autoconfiguration : IPv6
Manual Configuration Stateful Address Configuration (i.e. from servers) BOOTP DHCPv4, DHCPv6 Stateless Auto : IPv6 최양희서울대학교컴퓨터공학부 2005 Yanghee Choi 2 RARP Hardware address ---> IP address requires direct
More informationFTP,HTTP. By Nidhi Jindal
APPLICATION LAYER: SMTP, POP, IMAP, FTP,HTTP By Nidhi Jindal. MESSAGE TRANSFER AGENT: SMTP The actual mail transfer requires message transfer agents (MTAs). The protocol that defines the MTA client and
More informationSolved MCQ of Computer networking. Set-1
Solved MCQ of Computer networking Set-1 1. The computer network is A) Network computer with cable B) Network computer without cable C) Both of the above D) None of the above 2. FDDI used which type of
More informationModule 2 Overview of Computer Networks
Module 2 Overview of Computer Networks Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link:
More informationModule 2 Overview of. Computer Networks
Module Overview of Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link: CS454/654 - Issues How
More informationChapter 09 Network Protocols
Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems
More informationInternet. Class-In charge: S.Sasirekha
Internet Class-In charge: S.Sasirekha COMPUTER NETWORK A computer network is a collection of two or more computers, which are connected together to share information and resources. Network Operating Systems
More informationChapter 3 The Basics of Networking
Fluency with Information Technology 7 th Edition Chapter 3 The Basics of Networking HTML Hypertext Markup Language Layout of document (Margin, font, text, image, ) Jump from point to point (non-linear)
More information