Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Tenth.

Similar presentations


Presentation on theme: "Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Tenth."— Presentation transcript:

1 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Tenth Edition by J. Glenn Brookshear Modified by Marie desJardins for CMSC 100, Fall 2009

2 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-2 Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols 4.5 Security

3 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Networking Basics

4 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-4 Network Classifications Scope –Local area network (LAN) –Metropolitan area (MAN) –Wide area network (WAN) Ownership –Closed versus open Topology (configuration) –Bus (Ethernet) –Star (Wireless networks with central Access Point)

5 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-5 Figure 4.1 Network topologies

6 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-6 Figure 4.1 Network topologies (continued)

7 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-7 Protocols CSMA/CD –Used in Ethernet –Silent bus provides right to introduce new message CSMA/CA –Used in WiFi –Hidden terminal problem

8 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-8 Figure 4.2 Communication over a bus network

9 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-9 Figure 4.3 The hidden terminal problem

10 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-10 Connecting Networks Repeater: Extends a network Bridge: Connects two compatible networks Switch: Connect several compatible networks Router: Connects two incompatible networks resulting in a network of networks called an internet

11 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-11 Figure 4.4 Building a large bus network from smaller ones

12 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-12 Figure 4.5 Routers connecting two WiFi networks and an Ethernet network to form an internet

13 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley The Internet

14 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-14 The Internet The Internet: An internet that spans the world –Original goal was to develop a means of connecting networks that would not be disrupted by local disasters. –Today it has shifted from an academic research project to a commercial undertaking.

15 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-15 Internet Architecture Internet Service Provider (ISP) –Tier-1 –Tier-2 Access ISP: Provides connectivity to the Internet –Traditional telephone (dial up connection) –Cable connections –DSL –Wireless

16 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-16 Figure 4.7 Internet Composition

17 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-17 The Structure of the Internet The Internet is an example of a “scale-free network” –“Degree distribution” follows a power law –There are very many machines on the Internet that are connected only to one or two other machines –There are a few “hub nodes” that are connected to hundreds or thousands of machines Power law distribution (from Wikipedia)

18 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-18 The connectivity of 100K Internet routers From W K Cheswick / Bell Labs via physicsworld.com

19 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-19 Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation Mnemonic address: –Domain names –Top-Level Domains Domain name system (DNS) –Name servers –DNS lookup

20 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-20 Internet Corporation for Assigned Names & Numbers (ICANN) Allocates IP addresses to ISPs who then assign those addresses within their regions. Oversees the registration of domains and domain names.

21 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-21 Traditional Internet Applications Electronic Mail (email) –Domain mail server collects incoming mail and transmits outgoing mail –Mail server delivers collected incoming mail to clients via POP3 or IMAP File Transfer Protocol (FTP) Telnet and SSH

22 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-22 More Recent Applications Voice Over IP (VoIP) Internet Radio –N-unicast –Multicast

23 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley The World Wide Web

24 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-24 World Wide Web Hypertext and HTTP Browser gets documents from Web server Documents identified by URLs

25 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-25 Figure 4.8 A typical URL

26 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-26 Hypertext Document Format Encoded as text file Contains tags to communicate with browser –Appearance to start a level one heading to start a new paragraph –Links to other documents and content –Insert images

27 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-27 Figure 4.9 A simple Web page

28 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-28 Figure 4.9 A simple Web page (continued)

29 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-29 Figure 4.10 An enhanced simple Web page

30 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-30 Figure 4.10 An enhanced simple Web page (continued)

31 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-31 Extensible Markup Language (XML) XML: A language for constructing markup languages similar to HTML –A descendant of SGML –Opens door to a World Wide Semantic Web

32 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-32 Using XML C minor 2/4 egth egth G, egth G, egth G hlf E

33 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-33 Figure 4.11 The first two bars of Beethoven’s Fifth Symphony

34 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Protocols and Distributed Processes

35 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-35 Distributed Systems Systems with parts that run on different computers –Infrastructure can be provided by standardized toolkits Example: Enterprise Java Beans from Sun Microsystems Example:.NET framework from Microsoft

36 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-36 Inter-process Communication Client-server –One server, many clients –Server must execute continuously –Client initiates communication Peer-to-peer (P2P) –Two processes communicating as equals –Peer processes can be short-lived

37 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-37 Figure 4.6 The client/server model compared to the peer-to-peer model

38 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-38 Client Side Versus Server Side Client-side activities –Examples: java applets, javascript, Macromedia Flash Server-side activities –Common Gateway Interface (CGI) –Servlets –PHP “Cloud computing” –Basically server-side computing when you don’t know which server is handling your job –Largely a buzzword… but a current one that will make you sound like you know what you’re talking about

39 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Routing Messages

40 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-40 Routing & Deadlock Let’s play a game… :-)

41 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-41 Figure 4.12 Package-shipping example

42 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-42 Internet Software Layers Application: Constructs message with address Transport: Chops message into packets Network: Handles routing through the Internet Link: Handles actual transmission of packets

43 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-43 Figure 4.13 The Internet software layers

44 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-44 Figure 4.14 Following a message through the Internet

45 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-45 TCP/IP Protocol Suite Transport Layer –TCP –UDP Network Layer –IP (IPv4 and IPv6)

46 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-46 Figure 4.15 Choosing between TCP and UDP

47 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Network Security

48 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-48 Security Attacks –Malware (viruses, worms, Trojan horses, spyware, phishing software) –Denial of service –Spam Protection –Firewalls –Spam filters –Proxy servers –Antivirus software

49 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-49 Encryption FTPS, HTTPS, SSL Public-key Encryption –Public key: Used to encrypt messages –Private key: Used to decrypt messages Certificates and Digital Signatures

50 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-50 Figure 4.16 Public-key encryption


Download ppt "Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Tenth."

Similar presentations


Ads by Google