Chapter 4: Networking and the Internet

Similar documents
Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ.

Chapter 4: Networking and the Internet. Copyright 2015 Pearson Education, Inc.

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Chapter 4 The Internet

컴퓨터의기초 7 th Lecture 김현철 (2009 년여름학기 ) 컴퓨터공학부서울대학교. Copyrights 2008 Eom, Hyeonsang All Rights Reserved

Networking and the Internet

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

AQU Information Systems Fundamentals Spring 2012 Pg. 9.1

Connecting with Computer Science Chapter 5 Review: Chapter Summary:

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer

Contents 1 INTRODUCTION TO COMPUTER NETWORKS...

Review: Networking Fall Final

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

Assignment - 1 Chap. 1 Wired LAN s

University of Southern California EE450: Introduction to Computer Networks

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

Objectives. Connecting with Computer Science 2

Networking and the Internet

Copyleft 2005, Binnur Kurt. Objectives

Chapter 11: Wide-Area Networks and the Internet

BABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017

Special expressions, phrases, abbreviations and terms of Computer Networks

Chapter 16 Networking

Introduction to Networking

networks List various types of networks and their

Hands-On TCP/IP Networking

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT PRINCIPLES OF INTERNET TECHNOLOGIES. Specimen Answers

CompTIA Network+ Course

Technology in Action. Chapter 13 Behind the Scenes: The Internet: How It Works Prentice-Hall, Inc.

Selected Sections of Applied Informatics

Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England. and Associated Companies throughout the world

Debian/GNU Linux Networking

Computer Network??? Why Computer Networks? Network Classification. Introduction to Computer Networks. Classification of a Computer network by Scale

Introduction to Computer Networks. Budditha Hettige

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

and Networks Data Communications Second Edition Tata McGraw Hill Education Private Limited Managing Director SoftExcel Services Limited, Mumbai

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁

Data Communication and Network. Introducing Networks

Özgür ZEYDAN (PhD.)

4. The transport layer

Network Protocols - Revision

CompTIA Network+ Study Guide Table of Contents

Introduction to Computer Science Lesson 9

IT4405 Computer Networks (Compulsory)

Technology in Action. Chapter 13 Behind the Scenes: The Internet: How It Works. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall

Cisco 1: Networking Fundamentals

ก ก Information Technology II

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network

1. What is a network protocol and why are protocols needed when two machines communicate? 2 marks

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

Additional Material. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Information Network I/No.

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

Chapter 7. Telecommunications, the Internet, and Wireless Technology

ITEC 3800 Data Communication and Network. Introducing Networks

The Application Layer: & SMTP

CS WEB TECHNOLOGY

Web Systems. Lecture 1. An Overview of Web Systems

Motivation For Networking. Information access Interaction among cooperative application programs Resource sharing

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

Web Mechanisms. Draft: 2/23/13 6:54 PM 2013 Christopher Vickery

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

CCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols

Review for Internet Introduction

Internet. Class-In charge: S.Sasirekha

Typical Network Uses

Networks and Communications MS216 - Course Outline -

Entry Level Assessment Blueprint Computer Networking Fundamentals

Data Communication & Computer Networks MCQ S

EEC-682/782 Computer Networks I

Internet. Organization Addresses TCP/IP Protocol stack Forwarding. 1. Use of a globally unique address space based on Internet Addresses

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

Section 1.1: Networking Overview

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3

IT430- E-COMMERCE Solved MCQ(S) From Midterm Papers (1 TO 22 Lectures) BY Arslan Arshad

M3-R3: INTERNET AND WEB DESIGN

Internet protocols and network hardware

and the World Wide Web

Data Communications and Networks Spring Syllabus and Reading Assignments

Operating Systems CS 571

INTRODUCTION TO ICT.

COMPONENTS OF DATA COMMUNICATION

Defining Networks with the OSI Model. Module 2

Data & Computer Communication

Web Foundations Series Internet Business Associate

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide

Chapter 14: Introduction to Networking

Erasable Programmable Read-Only Memory (EPROM) Electrically Erasable Programmable Read-Only Memory (EEPROM) CMOS 2.2.

Computer Networking Fundamentals

Local Area Networks; Ethernet

Scale Yourself. Lesson 3: Introduction to Internet Technology. Computer Technology 3/13/2015

B. P. PODDAR INSTITUTE OF MANAGEMENT & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING ACADEMIC YEAR: ODD SEMESTER

Transcription:

Chapter 4: Networking and the Internet 2015 Pearson Education Limited 2015 Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols 4.5 Security 4-2 1

Network Classifications Scope Personal area network (PAN) Local area network (LAN) Metropolitan area (MAN) Wide area network (WAN) Ownership Closed versus open Topology (configuration) Bus (Ethernet) Star (Wireless networks with central Access Point) 4-3 Figure 4.1 Network topologies 4-4 2

Figure 4.1 Network topologies (continued) 4-5 Protocols CSMA/CD Used in Ethernet Silent bus provides right to introduce new message CSMA/CA Used in WiFi Hidden terminal problem 4-6 3

Figure 4.2 Communication over a bus network 4-7 Figure 4.3 The hidden terminal problem 4-8 4

Connecting Networks Repeater: Extends a network Bridge: Connects two compatible networks Switch: Connects several compatible networks Router: Connects two incompatible networks resulting in a network of networks called an internet 4-9 Figure 4.4 Building a large bus network from smaller ones 4-10 5

Figure 4.5 Routers connecting two WiFi networks and an Ethernet network to form an internet 4-11 Inter-process Communication Client-server One server, many clients Server must execute continuously Client initiates communication Peer-to-peer (P2P) Two processes communicating as equals Peer processes can be short-lived 4-12 6

Figure 4.6 The client/server model compared to the peer-to-peer model 4-13 Distributed Systems Systems with parts that run on different computers Cluster computing Grid computing Cloud computing Amazon s Elastic Compute Cloud Google Drive 4-14 7

The Internet The Internet: An internet that spans the world Original goal was to develop a means of connecting networks that would not be disrupted by local disasters Today a commercial undertaking that links a worldwide combination of PANs, LANs, MANs, and WANs involving millions of computers 4-15 Internet Architecture Internet Service Provider (ISP) Tier-1 Tier-2 Access or tier-3 ISP: Provides connectivity to the Internet Hot spot (wireless) Telephone lines Cable/Satellite systems DSL Fiber optics 4-16 8

Figure 4.7 Internet Composition 4-17 Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation Mnemonic address: Domain names Top-Level Domains Domain name system (DNS) Name servers DNS lookup 4-18 9

Internet Corporation for Assigned Names & Numbers (ICANN) Allocates IP addresses to ISPs who then assign those addresses within their regions. Oversees the registration of domains and domain names. 4-19 Early Internet Applications Network News Transfer Protocol (NNTP) File Transfer Protocol (FTP) Telnet and SSH Hypertext Transfer Protocol (HTTP) Electronic Mail (email) Domain mail server collects incoming mail and transmits outing mail Mail server delivers collected incoming mail to clients via POP3 or IMAP 4-20 10

SMTP Simple Mail Transfer Protocol 220 mail.tardis.edu SMTP Sendmail Gallifrey-1.0; Fri, 23 Aug 2413 14:34:10 HELO mail.skaro.gov 250 mail.tardis.edu Hello mail.skaro.gov, pleased to meet you MAIL From: dalek@skaro.gov 250 2.1.0 dalek@skaro.gov... Sender ok RCPT To: doctor@tardis.edu 250 2.1.5 doctor@tardis.edu... Recipient ok DATA 354 Enter mail, end with "." on a line by itself Subject: Extermination. EXTERMINATE! Regards, Dalek. 250 2.0.0 r7njyael028071 Message accepted for delivery QUIT 221 2.0.0 mail.tardis.edu closing connection 4-21 More Recent Applications Voice Over IP (VoIP) Internet Multimedia Streaming N-unicast Multicast On-demand streaming Content delivery networks (CDNs) 4-22 11

World Wide Web Hypertext combines internet technology with concept of linked-documents Embeds hyperlinks to other documents Browsers present materials to the user Webservers provide access to documents Documents are identified by URLs and transferred using HTTP 4-23 Figure 4.8 A typical URL 4-24 12

Hypertext Markup Language (HTML) Encoded as text file Contains tags to communicate with browser Appearance <h1> to start a level one heading <p> to start a new paragraph Links to other documents and content <a href =... > Insert images <img src =... > 4-25 Figure 4.9 A simple webpage 4-26 13

Figure 4.9 A simple webpage (continued) 4-27 Figure 4.10 An enhanced simple webpage 4-28 14

Figure 4.10 An enhanced simple Web page (continued) 4-29 Extensible Markup Language (XML) XML: A language for constructing markup languages similar to HTML A descendant of SGML Opens door to a World Wide Semantic Web 4-30 15

Using XML <staff clef = treble > <key>c minor</key> <time> 2/4 </time> <measure> < rest> egth </rest> <notes> egth G, egth G, egth G </notes></measure> <measure> <notes> hlf E </notes></measure> </staff> 4-31 Figure 4.11 The first two bars of Beethoven s Fifth Symphony 4-32 16

Client Side Versus Server Side Client-side activities Javascript Macromedia Flash Server-side activities Common Gateway Interface (CGI) Servlets JavaServer Pages (JSP) / Active Server Pages (ASP) PHP 4-33 Figure 4.12 Package-shipping example 4-34 17

Internet Software Layers Application: Constructs message with address Transport: Chops message into packets Network: Handles routing through the Internet Link: Handles actual transmission of packets 4-35 Figure 4.13 The Internet software layers 4-36 18

Figure 4.14 Following a message through the Internet 4-37 TCP/IP Protocol Suite Transport Layer Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Network Layer Internet Protocol (IP) IPv4 IPv6 4-38 19

Figure 4.15 and UDP Choosing between TCP 4-39 Security Attacks Malware (viruses, worms, Trojan horses, spyware, phishing software) Denial of service (DoS) Spam Protection Firewalls Spam filters Proxy Servers Antivirus software 4-40 20

Encryption HTTPS and SSL Public-key Encryption Public key: Used to encrypt messages Private key: Used to decrypt messages Certificates and Digital Signatures Certificate authorities 4-41 Figure 4.16 Public-key encryption 4-42 21

End of Chapter 2015 Pearson Education Limited 2015 22