Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information:

Similar documents
INFS 214: Introduction to Computing

OSI Network Layer. Chapter 5

INFS 214: Introduction to Computing

INFS 214: Introduction to Computing

INFS 214: Introduction to Computing

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Internetwork Protocols

Introduction to Information Science and Technology 2017 Networking I. Sören Schwertfeger 师泽仁

INFS 214: Introduction to Computing

INFS 214: Introduction to Computing

Computer Networks. Lecture 9 Network and transport layers, IP, TCP, UDP protocols

Lecture (11) OSI layer 4 protocols TCP/UDP protocols

1: Review Of Semester Provide an overview of encapsulation.

McGraw-Hill The McGraw-Hill Companies, Inc., 2000

Transport Layer Overview

Connectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP)

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

Continuous Real Time Data Transfer with UDP/IP

The Internet The Internet

Data Encapsulation & OSI & TCP/IP Models Week 2. Lecturer: Lucy White Office : 324

Business Data Communications and Networking

INTE-C5O44 - Internet

Position of IP and other network-layer protocols in TCP/IP protocol suite

1. What is a network protocol and why are protocols needed when two machines communicate? 2 marks

AQU Information Systems Fundamentals Spring 2012 Pg. 9.1

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

INTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS. Faramarz Hendessi

Chapter 16 Networking

INFS 214: Introduction to Computing

Lesson 3. IPv4 and IPv6 Protocols. Chapter-4 L03: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education

TCP/IP protocol suite

Module 4 Business Value of Telecommunication Networks 4.1 Internet Revolution 4.2 Business value of Internet, Intranet and Extranet

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

EEC-484/584 Computer Networks

E-Commerce. Infrastructure I: Computer Networks

LECTURE WK4 NETWORKING

Introduction to internetworking, OSI, TCP/IP and Addressing.

EEC-684/584 Computer Networks

Chapter 19 Network Layer: Logical Addressing 19.1

CyberP3i Course Module Series

ACL Rule Configuration on the WAP371

EEC-484/584 Computer Networks

Lecture (03) Network Model

NETWORK LAYER: IP Addressing

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals:

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

Network Connectivity and Mobility

Figure 1-1a Data in context. Context helps users understand data

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

Networking midterm. 5. As a data unit moves up from one protocol layer to another, control headers are:

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

Subnet Design and IP Addressing

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

SARDAR RAJA COLLEGE OF ENGINEERING ALANGULAM

Lecture 8 Network Layer: Logical addressing

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

Computer Networks Lecture -5- IPv4 Addresses. Dr. Abbas Abdulazeez

programming exercises.

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015

Copyleft 2005, Binnur Kurt. Objectives

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1

Multimedia Networking

Internet Protocols (chapter 18)

Networking Models OSI Model Created by International Organization Standardization

Application. Transport. Network. Link. Physical

ECE 650 Systems Programming & Engineering. Spring 2018

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3

CEN445 Network Protocols & Algorithms. Network Layer. Prepared by Dr. Mohammed Amer Arafah Summer 2008

INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad INFORMATION TECHNOLOGY COURSE DESCRIPTION FORM

Network Models. Behrouz A. Forouzan Data communication and Networking Fourth edition

IP Basics Unix/IP Preparation Course June 29, 2010 Pago Pago, American Samoa

SEN366 (SEN374) (Introduction to) Computer Networks

ET4254 Communications and Networking 1

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Lecture (03) Networking Model (TCP/IP) Networking Standard (OSI) cont.,..

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

Introduction to Internetworking

SJTU 2018 Fall Computer Networking. Wireless Communication

Introduction COURSE BACKGROUND. Lecture Notes. Today s Lecture. Your Instructor. Syllabus and Calendar Are Online

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD

SYLLABUS. Departmental Syllabus. Applied Networking I. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

TSIN02 - Internetworking

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

416 Distributed Systems. Networks review; Day 1 of 2 Jan 5 + 8, 2018

Chapter 5 Network Layer

Outline : Computer Networking. Objectives. Who s Who? Administrivia. Layering. L-1 Intro to Computer Networks

Multicast Communications. Slide Set were original prepared by Dr. Tatsuya Susa

Chapter 1 Introduction

Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30

ECE 4450:427/527 - Computer Networks Spring 2017

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁

CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite

Transcription:

Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information: eankrah@ug.edu.gh College of Education School of Continuing and Distance Education 2014/2015 2016/2017 godsonug.wordpress.com/blog

Session Overview As the use of the World Wide Web (www) has escalated, the importance of databases to this growth has become ever more evident. The public internet and the private intranets can be thought of as vast client/server architectures with very thin clients and fat servers. The servers store information in databases to be sent to the browsers on request. DR. EBENEZER ANKRAH Slide 2

Session Overview Attaching a database to a web application may open up access to that database in unintended ways if the developer is not data security conscious. This session seeks to explain the importance of attaching a database to the web and also explaining basic internet database environment concepts. DR. EBENEZER ANKRAH Slide 3

Session Overview At the end of the session, the student will Understand the concept of Internet Database Environment Understand basic Internet Database Environment concepts and terminologies as well as internet related languages Understand the difference between Server Side Extensions and Client Side Extensions. Identify some website security issues and how security could be enhanced in an internet database environment. DR. EBENEZER ANKRAH Slide 4

Session Outline The key topics to be covered in the session are as follows: The Internet Environment Internet Architecture Component DR. EBENEZER ANKRAH Slide 5

Reading List Hoffer, J. A., Prescott, M. B., & Topi, H. (2009). Modern Database Management. Pearson Prentice Hall. (Chapter 10) DR. EBENEZER ANKRAH Slide 6

Topic One THE INTERNET ENVIRONMENT DR. EBENEZER ANKRAH Slide 7

The Internet Environment The Internet, World Wide Web (WWW) and information super highway have penetrated into lives of millions of people all over the world. The Internet is a network made up of thousands of networks worldwide. Obviously, these networks are composed of computing and other intelligent and active devices. In fact, Internet is an example of self-regulating mechanism and there is no one in-charge of the Internet. DR. EBENEZER ANKRAH Slide 8

The Internet Environment A wide variety of services, namely, electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, and many more are available on the Internet. To provide all these services, the Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available by the protocol. DR. EBENEZER ANKRAH Slide 9

The Internet Environment There are any number of businesses continuing to trade successfully without any thought of the Internet and this will be true no matter how wired up the rest of the world becomes. Admittedly some of these are part of larger organizations that in all probability will have a website, but only as a small part of their overall business strategy not as a means of survival. The idea that a major oil company or brewery would collapse for lack of a website is laughable. DR. EBENEZER ANKRAH Slide 10

The Internet Environment On the plus side, of course, there are companies which thrive on the Internet. To be more accurate they thrive because of the Internet. These are the small companies who, for the first time ever, are able to compete on level terms with their much bigger rivals. No longer does the business go to the company with the biggest marketing budget. Now the possession of a website means any company has a global presence. DR. EBENEZER ANKRAH Slide 11

The Internet Environment In fact it is this that makes some people claim a website is necessary for survival. If small companies can take business away from big companies, which they can, then it follows that big companies must also have a website or else forever lose business. In other words everybody needs a website. DR. EBENEZER ANKRAH Slide 12

Sample Question Individual Assignment: Identify any three (3) security threats that may affect an Internet Database Environment Forum Question: Analyse the relationship between server side extensions and client side extension in an Internet Database Environment DR. EBENEZER ANKRAH Slide 13

Topic Two INTERNET ARCHITECTURE DR. EBENEZER ANKRAH Slide 14

Internet Architecture The Internet architecture is based on a simple idea: ask all networks want to be part of carrying a single packet type, a specific format the IP protocol. In addition, this IP packet must carry an address defined with sufficient generality in order to identify each computer and terminals scattered throughout the world. This architecture is illustrated in Figure. DR. EBENEZER ANKRAH Slide 15

Internet Architecture DR. EBENEZER ANKRAH Slide 16

Internet Architecture The user who wishes to make on this internetwork must store its data in IP packets that are delivered to the first network to cross. This first network encapsulates the IP packet in its own packet structure, the package A, which circulates in this form until an exit door, where it is decapsulated so as to retrieve the IP packet. DR. EBENEZER ANKRAH Slide 17

Internet Architecture To complete the IP, the US Defense added the TCP protocol; specify the nature of the interface with the user. This protocol further determines how to transform a stream of bytes in an IP packet, while ensuring quality of transport this IP packet. Both protocols, assembled under the TCP / IP abbreviation, are in the form of a layered architecture. They correspond to the packet level and message-level reference model. DR. EBENEZER ANKRAH Slide 18

Internet Architecture The Internet model is completed with a third layer, called the application level, which includes different protocols on which to build Internet services. Email (SMTP), the file transfer (FTP), the transfer of hypermedia pages, transfer of distributed databases (World Wide Web), etc., are some of these services. Figure shows the three layers of the Internet architecture. DR. EBENEZER ANKRAH Slide 19

Internet Architecture DR. EBENEZER ANKRAH Slide 20

Internet Architecture IP packets are independent of each other and are individually routed in the network by interconnecting devices subnets, routers. The quality of service offered by IP is very small and offers no detection of lost or possibility of error recovery packages. TCP combines the functionality of message-level reference model. This is a fairly complex protocol, which has many options for solving all packet loss problems in the lower levels. In particular, a lost fragment can be recovered by retransmission on the stream of bytes. TCP uses a connection-oriented mode. DR. EBENEZER ANKRAH Slide 21

Internet Architecture The flexibility of the Internet architecture can sometimes be a default, to the extent that global optimization of the network is carried out by sub-network subnet, by a succession of local optimizations. This does not allow a homogeneous function in different subnets traversed. Another important feature of this architecture is to place the entire control system, that is to say, intelligence and control of the network, in the terminal machine leaving virtually nothing in the network, at least in the current version, IPv4, the IP protocol. DR. EBENEZER ANKRAH Slide 22

Internet Architecture The new generation of IP, IPv6, introduces new features that make the nodes of the network smarter. The new generation of routers comes with QoS management algorithms, which allow them to provide transportation that can meet time constraints or packet loss. We expect the arrival of IPv6 for ten years, but it's still IPv4 IP that governs the world. The reason for this is that every new need achievable with IPv6, IPv4 has been able to find the algorithms needed to do as well. DR. EBENEZER ANKRAH Slide 23

Internet Architecture In IPv4, each new customer is treated the same way as those already connected with resources being distributed equitably among all users. The resource allocation policies of telecom operator s networks are totally different, since, on these networks, a customer who already has a certain quality of service does not suffer any penalty because of the arrival of a new customer. The IP world growth comes from the simplicity of its protocol, with very few options, and it s free. DR. EBENEZER ANKRAH Slide 24

References Helman, P. (2000). The Science of Database Management. IRWIN. Boston, Massachusetts. R. R. Donnelly and Sons Company. Hoffer, J. A., Prescott, M. B., & Topi, H. (2009). Modern Database Management. Pearson Prentice Hall. Silberschatz, A., Korth, H. F., & Sudarshan, S. (2010). Database System Concepts. Boston, Massachusetts. WCB: McGraw-Hill. DR. EBENEZER ANKRAH Slide 25