Chapter 4 The Internet

Similar documents
Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Chapter 4: Networking and the Internet

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University

Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ.

Chapter 4: Networking and the Internet. Copyright 2015 Pearson Education, Inc.

컴퓨터의기초 7 th Lecture 김현철 (2009 년여름학기 ) 컴퓨터공학부서울대학교. Copyrights 2008 Eom, Hyeonsang All Rights Reserved

networks List various types of networks and their

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

Chapter 11: Wide-Area Networks and the Internet

Chapter 7. Telecommunications, the Internet, and Wireless Technology

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

INTRODUCTION TO ICT.

Computer Network??? Why Computer Networks? Network Classification. Introduction to Computer Networks. Classification of a Computer network by Scale

Introduction to Computer Networks. Budditha Hettige

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3

Networking By: Vince

and the World Wide Web

Dr./ Ahmed Mohamed Rabie Sayed

and Networks Data Communications Second Edition Tata McGraw Hill Education Private Limited Managing Director SoftExcel Services Limited, Mumbai

Internet Architecture

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

Objectives. Connecting with Computer Science 2

Local Area Networks; Ethernet

Introduction to Networking

MiPDF.COM. 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.

Selected Sections of Applied Informatics

Hands-On IP for TeleCom Technicians Internetworking, TCP/IP, VLANS, Wirelss and more...

Review: Networking Fall Final

Copyleft 2005, Binnur Kurt. Objectives

Özgür ZEYDAN (PhD.)

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

Networks and Communications MS216 - Course Outline -

Data Communication and Network. Introducing Networks

Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS

Lecture A4 Network / Internet. Computing and Art : Nature, Power, and Limits CC 3.12: Fall 2007

ITEC 3210 M - Applied Data Communications and Networks. Professor: Younes Benslimane, Ph.D.

Your computer, the internet, and the web. A brief overview

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

DoS Attacks Malicious Code Attacks Device Hardening Social Engineering The Network Security Wheel

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

Communicating over the Network. Network Fundamentals. ITE PC v4.0 Chapter Cisco Systems, Inc. All rights reserved.

Internet. Organization Addresses TCP/IP Protocol stack Forwarding. 1. Use of a globally unique address space based on Internet Addresses

ITEC 3800 Data Communication and Network. Introducing Networks

Communicating over the Network

Networking. Networking and Communication Trends Convergence (Accessibility) Speed Stability Simplicity* Embeddedness

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

Lecture 2. Computer Networks Models. Network Models 1-1

Hands-On Ethical Hacking and Network Defense

CPEG514 Advanced Computer Networks. Atef Abu Salim University of Nizwa Spring 2013/2014

LECTURE WK4 NETWORKING

TYPES OF COMPUTER NETWORKS

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

Acknowledgment and Disclaimer:

Typical Network Uses

Introduction to Networking

and the World Wide Web

Configure Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) Service Settings on a Switch

Internet. Class-In charge: S.Sasirekha

Networks: Communicating and Sharing Resources

Networking and the Internet

Session 2. Background. Lecture Objectives

Chapter 14: Introduction to Networking

Section 1.1: Networking Overview

Chapter Topics. The History of the Internet. Chapter 7: Computer Networks, the Internet, and the World Wide Web

Cisco 1: Networking Fundamentals

E-Commerce. Infrastructure I: Computer Networks

Web Systems. Lecture 1. An Overview of Web Systems

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)

Unit 5: Computer Networking CS 101, Fall 2018

CPS221 Lecture: Layered Network Architecture

Connecting with Computer Science Chapter 5 Review: Chapter Summary:

Lecture 12. Application Layer. Application Layer 1

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

Network Communications Standards. Applied Information Technology

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

Introduction to computer networking

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

Component Function Example

Unit 28 Website Production ASSIGNMENT 1

1. What is a network protocol and why are protocols needed when two machines communicate? 2 marks

Chapter 2 Network Models 2.1

Chapter 5 Local Area Networks. Computer Concepts 2013

A Simplified Example of TCP/IP Communication Chuck Cusack

(5) Affiliation (10) XML (15) Web Augmentation (20) Gateways. (4) Kernel (9) ES test (14) SSL. (1) Portal (6) EDI (11) Web Directories (16) W3C

Introduction to Computer Science (I1100) Networks. Chapter 6

Chapter 3: Network Protocols and Communications

Assignment - 1 Chap. 1 Wired LAN s

TCP/IP THE TCP/IP ARCHITECTURE

The Internet and the World Wide Web

Transcription:

Chapter 4 The Internet Dr. Farzana Rahman Assistant Professor Department of Computer Science James Madison University

Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols 4.5 Security

Big ideas What is network? How networks are constructed? What is Internet? What are the application of Internet? How messages are transferred through the internet?

Network Classifications Scope Local area network (LAN) Small size, campus, building Metropolitan area (MAN) Intermediate size, local community Wide area network (WAN) large geographic area, such as connections between cities Topology (configuration) Bus (Ethernet) Star (Wireless networks with central Access Point)

Network topologies

Network topologies (continued)

Connecting Networks Repeater: Extends a network Bridge: Connects two compatible networks Switch: Connects several compatible networks Router: Connects two incompatible networks

Building a large bus network from smaller ones

Routers connecting two WiFi networks and an Ethernet network to form an internet

How do processes communicate? Client-server One server, many clients Server must execute continuously Client initiates communication (request) Peer-to-peer (P2P) Request and receive service from each other Service providing load can be shared

The Internet The Internet: Worldwide network of networks interconnecting thousands of smaller networks to form large communication infrastructure

So, who owns the Internet? Well, nobody does. No single person or company owns the Internet or even controls it entirely. As a wide-area network, it is made up of many smaller networks. These smaller networks are often owned and managed by a person or organization. The Internet, then, is really defined by how connections can be made between these networks. 15-13

Internet Architecture Internet Service Provider (ISP) Tier-1 Tier-2 Access ISP: Provides connectivity to the Internet Traditional telephone (dial up connection) Cable connections DSL Wireless

Internet Composition

Host & Internet Addressing A host is a computer connected directly to the Internet IP address: pattern of 32 or 128 bits often represented in dotted decimal notation Mnemonic address: Domain names Top-Level Domains Domain name system (DNS) Name servers DNS lookup

Internet Corporation for Assigned Names & Numbers (ICANN) Allocates IP addresses to ISPs who then assign those addresses within their regions. Oversees the registration of domains and domain names.

How To Register A Domain Name? Come up a new name Get a server and an IP 1 administrative contact 1 technical contact Register the name to an Internet domain registrar www.godaddy.com Used to be done via email or fax, now all web-based!

What is Wireshark? Wireshark is a network packet/protocol analyzer. UNIX and Windows.

Internet Applications Electronic Mail (email) File Transfer Protocol (FTP) Telnet and SSH Facebook? Google?

World Wide Web The World Wide Web (The Web) is only a portion of what makes up the internet, but it is the fastest growing part of the internet. Browser gets documents from Web server Documents identified by URLs Unified resource locator A standard way of specifying the location of a Web page, containing the hostname, "/", and a file

A typical URL

Hypertext Document Format Hypertext Markup Language (HTML) The language used to create or build a Web page Markup language A language that uses tags to annotate the information in a document Tags The syntactic element in a markup language that indicates how information should be displayed

Hypertext Document Format Appearance <h1> to start a level one heading <p> to start a new paragraph Links to other documents and content <a href =... > Insert images <img src =... >

A simple Web page

Package-shipping example

Internet Software Layers Application: Constructs message with address Transport: Chops message into packets Network: Handles routing through the Internet Link: Handles actual transmission of packets

The Internet software layers

Following a message through the Internet

TCP/IP Protocol Suite A family of protocols that makes the Internet works Transport Layer TCP UDP Network Layer IP (IPv4 and IPv6)

Choosing between TCP and UDP

Encryption HTTPS, SSL, TLS are cryptographic protocols designed to provide communication security over the Internet. Public-key Encryption Public key: Used to encrypt messages Private key: Used to decrypt messages

Public-key encryption

Direct questions to rahma2fx

TCP/IP TCP stands for Transmission Control Protocol TCP software breaks messages into packets, hands them off to the IP software for delivery, and then orders and reassembles the packets at their destination IP stands for Internet Protocol IP software deals with the routing of packets through the maze of interconnected networks to their final destination 15-35

Virus, What is it? A computer program that is designed to replicate itself by copying itself into the other programs stored in a computer. It may be benign or have a negative effect, such as causing a program to operate incorrectly or corrupting a computer's memory.

Worms A malicious program that replicates itself until it fills all of the storage space on a drive or network

Trojan A Trojan horse is defined as a "malicious, securitybreaking program that is disguised as something benign". For example, you download what appears to be a movie or music file, but when you click on it, you unleash a dangerous program that erases your disk, sends your credit card numbers and passwords to a stranger, or lets that stranger hijack your computer to commit illegal denial of service attacks