We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byRodney Crockford
Modified about 1 year ago
Chapter 1 Panko and Panko Business Data Networks and Security, 9 th Edition © 2013 Pearson Panko and Panko Business Data Networks and Security, 9 th Edition © 2013 Pearson
Today, we are surrounded by networks. This book will help you learn the skills you will need to participate in this networking revolution. This chapter introduces basic network concepts and issues you will use throughout the book. 2 © 2013 Pearson
Difficult MaterialCentral Concept (CEPT) Take it slowly, step by step. This will require some extra work. This is a central concept (CEPT) you need to understand really well. 3 © 2013 Pearson
Into the Cloud Basic Network ConceptsPacket SwitchingInternetworkingLayersInternet StandardsA Small Home Network 4 © 2013 Pearson
Works at the First Bank of Paradise (FBP) in Hawai`i Develops new media marketing campaigns using Facebook, YouTube, e-mail lists, and the bank’s website 5 © 2013 Pearson
Current project is the AlohaSmart credit card smartcard ◦ Smartcards have chips as well as mag stripes 6 © 2013 Pearson
In the morning, opens his tablet to check e-mail containing remarks about his PowerPoint marketing plan Turns on his desktop computer and reworks the PowerPoint presentation Automatically uploaded “to the cloud” with BlueSynch Later available to his work notebook and to meeting participants 7 © 2013 Pearson
The cloud imagery indicates that the user does not have to understand how systems “inside the cloud” operate. 8 © 2013 Pearson
PowerPoint is installed on his desktop computer at home. For his work notebook computer and on his tablet, PowerPoint is stored in the cloud. ◦ He downloads it when he needs it. ◦ Pays for it by the month, as a service. ◦ It is called software as a service (SaaS). 9 © 2013 Pearson
10 © 2013 Pearson
On the FBP networking staff Manages the headquarters building wireless LANs Walks around doing readings with her sniffer program Learns information about access points, their signal power, and their security 11 © 2013 Pearson
12 © 2013 Pearson
SSIDFBP BSSID A1-B2-C3- D4-E5-F6 BB-D5-33-D4- 6B-DD 19-FF-AE-D4- EC-63 Signal-85 dBm-60 dBm Mode802.11g802.11n Channel114844 EncryptionAES-CCMP AuthenticationWPA2/PEAP VendorCisco 13 © 2013 Pearson
Currently, must walk around at least daily. ◦ Even then, cannot find intermittent problems. FBP is installing a centralized wireless management system. ◦ Will be able to manage all access points centrally. ◦ She can constantly monitor the network for problems. ◦ The network will alert her to problems. ◦ The system can even make adjustments automatically. 14 © 2013 Pearson
In charge of wireless security at FBP BYOD (Bring Your Own Device) Problem ◦ Number of smartphones and tablets is exploding ◦ Owned by the employees but used partially for business purposes ◦ Great diversity in smartphone and tablet operating systems ◦ Device security is improving but limited 15 © 2013 Pearsonl
Claire Lorek found a rogue access point in one of her walkarounds. She and John Lee visited Albert Gomes who installed the unauthorized access point. Albert thought that the access point was secure in stealth mode. However, Claire’s and hackers’ software could find it. 16 © 2013 Pearson
Rather than punish Albert Gomes, they worked to help him. His department did need more capacity. Claire would install another access point, one with strong security. John and Claire had developed an ally. 17 © 2013 Pearson
Into the Cloud Basic Network Concepts Packet SwitchingInternetworkingLayersInternet StandardsA Small Home Network 18 © 2013 Pearson
Working Definition 19 © 2013 Pearson
20 © 2013 Pearson
21 © 2013 Pearson
22 © 2013 Pearson
The client and the server share processing work. 23 © 2013 Pearson
P2P Processing can be done without a network (as shown) or with a network. No servers are needed. 24 © 2013 Pearson
Transmission Speed Measurements Bits per second (bps) Usually not bytes per second (Bps) Metric Suffixes Kilobits per second kbps (lowercase k)1,000 bits per second (not 1,024) Megabits per second Mbps1,000 kbps Gigabits per second Gbps1,000 Mbps Terabits per second Tbps1,000 Gbps 25 © 2013 Pearson
File Downloads 100 kbps 1 Mbps 5 Mbps 10 Mbps 100 Mbps 1 Gbps E-mail message (250 words).15 s0 s Photograph (5 MB) 8 m1 m10 s5 s1 s0.1 s 1 Hr HTDV Video (10 Mbps) 4 d10 h2 h1 h6 m36 s Backup Synch (10 GB) 12 d28 h6 h3 h17 m2 m 26 © 2013 Pearson
Live or Streaming Media 100 kbps 1 Mbps 5 Mbps 10 Mbps 100 Mbps 1 Gbps MP3 Song (10 kbps) OK Standard Quality TV (2 Mbps) OK HDTV (10 Mbps)OK Three HDTV Channels OK 27 © 2013 Pearson
Into the CloudBasic Network Concepts Packet Switching InternetworkingLayersInternet StandardsA Small Home Network 28 © 2013 Pearson
29 © 2013 Pearson
30 © 2013 Pearson
31 © 2013 Pearson
32 © 2013 Pearson
33 © 2013 Pearson
34 © 2013 Pearson
35 © 2013 Pearson
36 © 2013 Pearson
Each switch along the way forwards the packet out a port to another switch (or to the destination host). Individual packet switches have no knowledge of the entire path taken by the packet. We will see how this works in detail in later chapters. 37 © 2013 Pearson
38 © 2013 Pearson
39 © 2013 Pearson
Forerunner of the Internet Funded by Larry Roberts at the Advanced Research Projects Agency (ARPA) ◦ Now the Defense Advanced Research Projects Agency (DARPA) To explore packet switching To give researchers access to ARPA-funded software on host computers in distant cities First four nodes began operation in 1969 40 © 2013 Pearson
41 © 2013 Pearson
42 © 2013 Pearson
Into the CloudBasic Network ConceptsPacket Switching Internetworking LayersInternet StandardsA Small Home Network 43 © 2013 Pearson
Bob Kahn at DARPA needed a way for researchers on one network to use resources on another network. Packets would have to travel across multiple networks. Kahn and Vint Cerf came up with the idea of connecting multiple networks by devices called routers. ◦ The original name was gateways. Generically, networks of networks are internets. Kahn created the global Internet (Capital I). 44 © 2013 Pearson
45 © 2013 Pearson
Capitalization of “internet” ◦ With an uppercase “I,” Internet means the global Internet we use every day. ◦ With a lowercase “i”, internet means any internet or the internet layer. 46 © 2013 Pearson
Basically, Kahn and Cerf created a second layer of networking on top of single networks. This required the creation of a parallel set of concepts for single networks and internets. Single networks and internets use similar concepts but give these concepts different names. It is important for you to get this clear in your head. 47 © 2013 Pearson
Component Generic Terminology Single Networks Internets Addresses Vary by network technology 32-bit IPv4 Addresses and 128-bit IPv6 Addresses Packets are calledPacketsFramesPackets Packet switches are called Switches Routers End-to-end routes are called Data linksRoutes 48 © 2013 Pearson
Component Generic Terminology Single Networks Internets Addresses Vary by network technology 32-bit IPv4 Addresses and 128-bit IPv6 Addresses Packets are calledPacketsFramesPackets Packet switches are called Switches Routers End-to-end routes are called Data linksRoutes 49 © 2013 Pearson
50 © 2013 Pearson
51 © 2013 Pearson
52 © 2013 Pearson
Into the CloudBasic Network ConceptsPacket SwitchingInternetworking Layers Internet StandardsA Small Home Network 53 © 2013 Pearson
Networks can be described at several layers of detail. Each layer provides services to the layer above it. ◦ The road provides service to the car tires. ◦ The car tires provide service to the car. ◦ The car provides service to the driver. ◦ A commercial driver provides service to the goods being delivered. 54 © 2013 Pearson
1. Physical links are connections between adjacent pairs of devices 1. Physical links are connections between adjacent pairs of devices 2. The data link is the packet’s path through the network In this case: X-A-B-D-F-Y 2. The data link is the packet’s path through the network In this case: X-A-B-D-F-Y 55 © 2013 Pearson
How many data links does the packet pass through? How many physical links does the packet pass through? Name them. How many data links does the packet pass through? How many physical links does the packet pass through? Name them. 56 © 2013 Pearson
Formed by graduate students to create standards for the ARPANET. Called their standards Requests for Comment (RFCs). ◦ Did not feel that they had the authority to create standards, so they used the weaker term RFC. The NWG evolved into today’s standards body for the Internet, the Internet Engineering Task Force (IETF). Internet standards today are still called RFCs. 57 © 2013 Pearson
Basically, Kahn and Cerf created a second layer of networking on top of single networks. This required the creation of a parallel set of concepts for single networks and internets. Single networks and internets use similar concepts but give these concepts different names. It is important for you to get this clear in your head. 58 © 2013 Pearson
59 Dashed line shows the path of a packet Dashed line shows the path of a packet © 2013 Pearson
60 How many physical links are there between the two hosts? How many physical links are there between the two hosts? Physical links connect adjacent devices, as noted earlier. Physical links connect adjacent devices, as noted earlier. © 2013 Pearson
61 A data link is the path of a frame through a single network, as noted earlier. There is one data link per network. How many data links are in the figure? There is one data link per network. How many data links are in the figure? © 2013 Pearson
62 A route is a packet’s path through an internet. Added for internets. A route is a packet’s path through an internet. Added for internets. How many routes are there in the figure? © 2013 Pearson
Host P transmits a packet to Host Q. There are seven networks between the hosts. 1. How many packets will there be along the way? 2. How many frames will there be along the way? 3. How many routes will there be along the way? 4. How many data links will there be along the way? 63 © 2013 Pearson
64 © 2013 Pearson
65 © 2013 Pearson
LayerNameBroad PurposeSpecific Purpose 5Application 4Transport 3Internet 2Data Link Single- network transmission (switched or wireless) Connection across a single network, Frame formats and switch operation 1PhysicalPhysical connections between adjacent devices 66 © 2013 Pearson
LayerNameBroad PurposeSpecific Purpose 5Application 4Transport Internet Transmission Application message fragmentation, error correction, congestion reduction, etc. 3InternetTransmission of packet across an internet, Packet formats, router operation 2Data Link 1Physical 67 © 2013 Pearson
NumberNameBroad PurposeSpecific Purpose 5ApplicationCommunication between applications Same 4Transport 3Internet 2Data Link 1Physical 68 © 2013 Pearson
Into the CloudBasic Network ConceptsPacket SwitchingInternetworkingLayers Internet Standards A Small Home Network 69 © 2013 Pearson
IP ◦ Internet layer protocol ◦ Unreliable best-effort internet layer operation 70 © 2013 Pearson
TCP ◦ Transport layer protocol ◦ TCP messages are called segments ◦ Provides transport layer functionality to fix problems ◦ Error correction, and so on UDP ◦ The other transport layer protocol ◦ Messages are called datagrams ◦ Unreliable, so used when reliability is not desired 71 © 2013 Pearson
LayerStandard(s) Transport LayerTransmission Control Protocol (TCP) Fragmentation Error Correction Congestion control User Datagram Protocol (UDP) No Fragmentation No Error Correction No Congestion Control Internet LayerInternet Protocol (IP) IPv4 and IPv6 72 © 2013 Pearson
1977 ◦ First experimental connection of three networks ◦ (Two wireless and the ARPANET) 1980s ◦ Internet opened to outside network for e-mail exchanges 73 © 2013 Pearson
TCP/IP standards evolved in the 1980s ◦ Hosts could run either TCP/IP or NCP standards. 1983 ◦ All hosts were required to run TCP/IP. NSFNET ◦ In the 1980s, the NSFNET funded by NSF was the core of the Internet. ◦ NSF had an Acceptable Use Policy barring commercial activity such as e-commerce. 74 © 2013 Pearson
1995 ◦ NSFNET replaced by commercial ISPs. ◦ E-commerce was no longer forbidden. ◦ The e-commerce revolution began. ◦ The World Wide Web became popular just before that. 75 © 2013 Pearson
To use the Internet, you need an Internet service provider and an access line to your ISP. Your ISP gives you access and carries your packets. To use the Internet, you need an Internet service provider and an access line to your ISP. Your ISP gives you access and carries your packets. Organizations also need ISPs. Organizations also need ISPs. 76 © 2013 Pearson
ISPs collectively comprise the Internet backbone. They interconnect at Network Access Points (NAPs) to exchange packets. ISPs collectively comprise the Internet backbone. They interconnect at Network Access Points (NAPs) to exchange packets. 77 © 2013 Pearson
Trace the path packets take from the User PC to the Webserver. 78 © 2013 Pearson
IP, TCP, and UDP are standards for delivery packets. TCP/IP also has supervisory protocols: ◦ To handle things beyond packet delivery. ◦ Managing IP addresses. ◦ Error handling, and so on. ◦ We will look at two supervisory protocols in this chapter. ◦ We will look at many more in Chapter 10. 79 © 2013 Pearson
80 © 2013 Pearson
81 © 2013 Pearson
82 © 2013 Pearson
83 © 2013 Pearson
84 © 2013 Pearson
85 © 2013 Pearson
86 © 2013 Pearson
Into the CloudBasic Network ConceptsPacket SwitchingInternetworkingLayersInternet Standard A Small Home Network 87 © 2013 Pearson
88 © 2013 Pearson
89 © 2013 Pearson
90 © 2013 Pearson
The IP gives the home one IP address. The home network has multiple devices that need IP addresses. The IP gives the home one IP address. The home network has multiple devices that need IP addresses. 91 © 2013 Pearson
The access router DHCP circuit gives private IP addresses to other devices. The access router DHCP circuit gives private IP addresses to other devices. 92 © 2013 Pearson
NAT allows multiple internal hosts to share a single external IP address. External sniffers cannot learn internal addresses. NAT allows multiple internal hosts to share a single external IP address. External sniffers cannot learn internal addresses. 93 © 2013 Pearson
Into the CloudBasic Network ConceptsPacket SwitchingInternetworkingLayersInternet StandardA Small Home Network 94 © 2013 Pearson
This is the first of four introductory chapters. ◦ The others deal with standards, security, and network and security management. Chapter 1 introduces basic network concepts and issues. ◦ Presented historically because some aspects of networking only make sense if you understand the development of internetworking. ◦ Specifically, single-network versus internet concepts and terminology (two of everything). 95 © 2013 Pearson
Chapter 2 looks at standards in more depth. ◦ It will look at major characteristics of standards, such as the syntax of messages. ◦ It will focus on the data link, internet, transport, and application layers, which work by sending structured messages. 96 © 2013 Pearson
Chapter 1 Panko and Panko Business Data Networks and Security, 9 th Edition © 2013 Pearson Panko and Panko Business Data Networks and Security, 9 th Edition.
Component Generic Terminology Single Networks Internets Addresses Vary by network technology 32-bit IPv4 Addresses and 128-bit IPv6 Addresses Packets are.
1 Figure 3-2: TCP/IP Standards (Study Figure) Origins Defense Advanced Research Projects Agency (DARPA) created the ARPANET An internet connects multiple.
Chapter 1 Panko and Panko Business Data Networks and Security, 10 th Edition, Global Edition Copyright © 2015 Pearson Education, Ltd. Panko and Panko Business.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
William Stallings Data and Computer Communications Chapter 1 Introduction.
The Network layer and Transport layer are responsible for moving messages from end to end in a network. The transport layer performs three functions:
Introduction© Dr. Ayman Abdel-Hamid, CS4254 Spring CS4254 Computer Network Architecture and Programming Dr. Ayman A. Abdel-Hamid Computer Science.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
Network Architectures Week 3 – OSI and The Internet.
EE 4272Spring, 2003 EE4272: Computer Networks Instructor: Tricia Chigan Dept.: Elec. & Comp. Eng. Spring, 2003.
Introduction Chapter 1. TCP/IP Reference Model Why Another Model? Although the OSI reference model is universally recognized, the historical and technical.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 0 TCP/IP Overview.
Review on Networking Technologies Linda Wu (CMPT )
William Stallings Data and Computer Communications 7 th Edition Data Communications and Networks Overview Protocols and Architecture.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
Lecturer: Tamanna Haque Nipa Data Communication Data Communications and Networking, 4rd Edition, Behrouz A. Forouzan.
Computer Networks with Internet Technology William Stallings Chapter 2 Protocols and the TCP/IP Protocol Suite.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
TCP/IP Reference Model Host To Network Layer Transport Layer Application Layer Internet Layer.
OSI Model Open Systems Interconnection (OSI) is a set of internationally recognized, non-proprietary standards for networking and for operating system.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Reading TCP/IP Protocol. Training target: Read the following reading materials and use the reading skills mentioned in the passages above. You may also.
Presented By: Priyanka Sharma. OBJECTIVES: To discuss the OSI model and its layer architecture and to show the interface between the layers. To briefly.
1 Kyung Hee University Chapter 2 Network Models. 2 Kyung Hee University 2.1 LAYERED TASKS We use the concept of layers in our daily life. As an example,
CSCI-235 Micro-Computers in Science The Network. Network Fundamentals A computer network consists of two or more computers linked together to exchange.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
Evolution of the Internet Mrs. Wilson Internet Basics & Beyond Rocky Point High School.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
An Introduction to Networking Chapter 1. Part I: Basic Networks Concepts Concepts we will see throughout the book.
1 William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
ECS 152A 1. Introduction. A Communications Model Source —generates data to be transmitted Transmitter —Converts data into transmittable signals Transmission.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
1 Networking A computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources. The.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
TCP/IP Protocol Suite 1 Chapter 2 Upon completion you will be able to: The OSI Model and the TCP/IP Protocol Suite Understand the architecture of the OSI.
Networks and the Internet Topic 3. Three Important Networking Technologies Networks, Internet, WWW.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Network Protocols and Communications Introduction to Networks.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 2 Network Models.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
NET 221D:COMPUTER NETWORKS FUNDAMENTALS Lecture 4: OSI versus TCP/IP Behrouz A. Forouzan” Data communications and Networking 1.
CSCI-100 Introduction to Computing The Network. Network Fundamentals A computer network consists of two or more computers linked together to exchange.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 1 – Data Communications, Data Networks, and.
Ch 1. Computer Networks and the Internet Myungchul Kim
© 2017 SlidePlayer.com Inc. All rights reserved.