Networks Week 2 LBSC 690 Information Technology. Computer Systems Hardware –Types of hardware –Storage hierarchy –Moore’s law Software –Types of software.

Slides:



Advertisements
Similar presentations
Computer networks SATISH MISHRA,PGT CS,KV TRIMULGHERRY.
Advertisements

Chapter 1: Computer Networks IB 300: Advanced Computer Sciences. Professor: Nabil Elmjati.
LBSC 690 Session #2 FTP, "Hello World!" HTML Jimmy Lin The iSchool University of Maryland Wednesday, September 10, 2008 This work is licensed under a Creative.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
Networking Practicum: TraceRoute, FTP, Basic HTML Week 2 LBSC 690 Information Technology.
Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”
Shalini Bhavanam. Key words: Basic Definitions Classification of Networks Types of networks Network Topologies Network Models.
1 LBSC 690: Week 2 HTML, The Internet Jen Golbeck College of Information Studies University of Maryland.
Networks Week 2 LBSC 690 Information Technology. Computer Systems Hardware –Types of hardware –Storage hierarchy –Moore’s law Software –Types of software.
Introduction To Networking
04/26/2004CSCI 315 Operating Systems Design1 Computer Networks.
11 Networks The Great Information Exchange. 2 Networking Fundamentals Computer network: Two or more computers connected together Each is a Node Benefits.
LBSC 690: Session 2 FTP, “Hello World!” HTML Jimmy Lin College of Information Studies University of Maryland Monday, September 17, 2007.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
Chapter 15 Networks.
1 Networking A computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources. The.
TCP/IP Reference Model Host To Network Layer Transport Layer Application Layer Internet Layer.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
15-1 More Chapter 15 Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of.
Chapter 15 Networks. Chapter Goals Types of networks Topologies Open Systems Home Internet connections 15-2.
Overview, Circuit & Packet Switching, Addressing
Computing Week 9 LBSC 671 Creating Information Infrastructures.
Laudon & Laudon: Canadian Edition
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Chapter 3 The Basics of Networking
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
How the Internet Works. The Internet and the Web The Web is actually just one of many computer applications that run on the Internet Among others are.
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Common Devices Used In Computer Networks
1 Computer Networks DA Chapter 1-3 Introduction.
NETWORKS.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications ◦The client requested data.
Practicum: Networks, Basic HTML Week 2 LBSC 690 Information Technology.
Communication, Networks, The internet and the Worldwide Web.
Chapter 1 Communication Networks and Services Network Architecture and Services.
Data Networking Fundamentals Chapter 7. Objectives In this chapter, you will learn to: Discuss basic networking concepts, including the elements common.
William Stallings Data and Computer Communications
The Internet Lecture 16 CSCI 1405, CSCI 1301 Introduction to Computer Science Fall 2009.
TCP/IP (Transmission Control Protocol / Internet Protocol)
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Networks Part 2: Infrastructure + Protocols NYU-Poly: HSWP Instructor: Mandy Galante.
Higher Computing Networking. Networking – Local Area Networks.
1 Syllabus at a glance – CMCN 6103 Introduction Introduction to Networking Network Fundamentals Number Systems Ethernet IP Addressing Subnetting ARP DNS.
INTRODUCTION TO THE INTERNET Internet Protocol Cameras Training: Session 1.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
The Internet Session 3 INST 301 Introduction to Information Science.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Ad Hoc – Wireless connection between two devices Backbone – The hardware used in networking Bandwidth – The speed at which the network is capable of sending.
Chapter Objectives In this chapter, you will learn:
Instructor Materials Chapter 5 Providing Network Services
NETWORK Unit 1 Module: 2 Objective: 7.
Data Networking Fundamentals
Wednesday, September 19, 2018 What Is the Internet?
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Topic 5: Communication and the Internet
Computing Over Distance
Chapter Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of various network.
NETWORK Unit 1 Module: 2 Objective: 7.
NETWORK Unit 1 Module: 2 Objective: 7.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Week 2 LBSC 690 Information Technology
Computer Networks DA2402.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
COMPUTER NETWORKING Presented by Pushpanjali Associate professor
Presentation transcript:

Networks Week 2 LBSC 690 Information Technology

Computer Systems Hardware –Types of hardware –Storage hierarchy –Moore’s law Software –Types of software –Types of interfaces

Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program” Compilers and interpreters (e.g., JavaScript) –Allow programmers to create new behavior Operating system (e.g., Windows XP) –Moves data between disk and RAM (+lots more!) Embedded program (e.g., BIOS) –Permanent software inside some device

Installing Applications Copy to a permanent place on your hard drive –From a CD, the Internet, … Installs any other required programs –“DLL” files can be shared by several applications Register the program’s location –Associates icons/start menu items with it –Configures the uninstaller for later removal Configure it for your system –Where to find data files and other programs

Discussion Point: What’s a Virus? Characteristics –Initiation –Behavior –Propagation Spyware Detection

Network Computers and devices connected via –Communication devices –Transmission media

Why Network? Sharing data Sharing information Sharing hardware Sharing software Increasing robustness Facilitating communications Facilitating commerce

Packet vs. Circuit Networks Telephone system (“circuit-switched”) –Fixed connection between caller and called –High network load results in busy signals Internet (“packet-switched”) –Each transmission is routed separately –High network load results in long delays

Packet Switching Break long messages into short “packets” –Keeps one user from hogging a line Route each packet separately –Number them for easy reconstruction Request retransmission for lost packets –Unless the first packet is lost!

Networks of Networks Local Area Networks (LAN) –Connections within a room, or perhaps a building Wide Area Networks (WAN) –Provide connections between LANs Internet –Collection of WANs across multiple organizations

Local Area Networks Within a campus or an office complex –Short-distance lines are fast and cheap –Fast communications makes routing simple Ethernet is a common LAN technology –All computers are connected to the same cable Ordinary phone lines can carry 10 Mb/sec 100 Mb/s connections require special cables 1 Gb/s connections require special switches –Every host broadcasts everything to all others Collisions limit throughput to about 50% utilization

Shared Network All attach to the same cable –Ethernet and “cable modems” Transmit anytime –Collision detection –Automatic retransmission Inexpensive and flexible –Easy to add new machines –Robust to computer failure Practical for short distances –Half the bandwidth is wasted

Switched (“Star”) Network All attach directly to a hub –Switched Ethernet –Digital Subscriber Lines (DSL) Higher cost –Line from hub to each machine –Hub must handle every packet –Hub requires backup power Much higher bandwidth –No sharing, no collisions –Allows disks to be centralized

Local Area Networks sam kim joe ann dove rac4rac3wwwrac2 ttclass HBK PLS CSS

Wireless Networks Radio-based Ethernet –Effective for a few rooms within buildings “Access Point” gateways to wired networks –Available throughout most of the Maryland campus –Commercial providers offer “hot spots” in airports, etc. Available in two speeds –IEEE b: 10Mbps (good enough for most uses) –IEEE g: 54Mbps (required for wireless video)

Wide Area Networks Campus, regional, national, or global scale –Expensive communications must be used well Limiting to two hosts allows 100% utilization –Routing is complex with point-to-point circuits Which path is shortest? Which is least busy? … Internet routers exchange “routing tables” –Which routes seem fast, which seem slow?

Between a LAN and a WAN

Ring Network Unidirectional transmission –Used mostly for WANs Very high bandwidth –No collisions –Simple routing policies Complex management –Changes must be coordinated

Maryland’s Campus Network sam kim joe ann dove rac4rac3wwwrac2 ttclass HBK CSS 1410 Elsewhere in CSS

The Internet Global collection of public “IP” networks –Private networks are often called “intranets” Independent –Each organization maintains its own network Cooperating –Internet Protocol (IP) address blocks –Domain names –World-Wide Web Consortium (W3C) –Computer Emergency Response Team (CERT)

A Short History of the Internet 1969: Origins in government research –Advanced Research Projects Agency (ARPAnet) –Key standards: UDP, TCP, DNS 1983: Design adopted by other agencies –Created a need for inter-network connections –Key standards: IP 1991: World-Wide Web added point-and-click –Now 150 million Internet “hosts” –Key standards: HTTP, URL, HTML, XML

Overview

Types of Internet “Nodes” Hosts –Computers that use the network to do something Routers –Specialized computers that route packets Gateway –Routers that connect two networks Firewall –Gateways that pass packets selectively

An Internet Protocol (IP) Address IP address: Identifies a LAN Identifies a specific computer

Routing Tables IP PrefixNext RouterEstimated Delay xxx.xxx ms 216.xxx.xxx.xxx ms xxx ms xxx.xxx.xxx.xxx ms

Domain Name Service (DNS) “Domain names” improve usability –Easier to remember than numeric IP addresses –DNS coverts between names and numbers –Written like a postal address: general-to-specific Each name server knows one level of names –“Top level” name server knows.edu,.com,.mil, … –.edu name server knows umd, umbc, stanford, … –.umd.edu name server knows wam, glue, ttclass, … –.wam.umd.edu name server knows rac1, rac2, …

IP Addresses and Domain Names Domain Name : IP address:

Hands-on: Learn About Your IP Address Find your IP address –Select “start” on the taskbar, then “Run” –Type in “cmd” and click “OK” –Type “ipconfig /all” (and press enter) See who “owns” that address –Use See how packets get to your computer –Use

The TCP/IP “Protocol Stack” Link layer moves bits –Ethernet, cable modem, DSL Network layer moves packets –IP Transport layer provides services to applications –UDP, TCP Application layer uses those services –DNS, SFTP, SSH, …

User Datagram Protocol (UDP) The Internet’s basic transport service –Sends every packet immediately –Passes received packets to the application No delivery guarantee –Collisions can result in packet loss Example: sending clicks on web browser

Transmission Control Protocol (TCP) Built on the network-layer version of UDP Guarantees delivery all data –Retransmits missing data Guarantees data will be delivered in order –“Buffers” subsequent packets if necessary No guarantee of delivery time –Long delays may occur without warning

Telnet Simulates a dial-up connection –Read data from another machine VT-100 protocol allows only text –The pine program is designed for VT-100 –X Windows extension adds graphics

File Transfer Program (FTP) Used to move files between machines –Upload (put) moves from client to server –Download (get) moves files from server to client Available using command line and GUI interfaces Normally requires an account on the server –Userid “anonymous” provides public access –Web browsers incorporate anonymous FTP Automatically converts end-of-line conventions –Unless you select “binary”

Hands On: FTP Start a cmd window Type “ftp ftp.umiacs.umd.edu” Login in anonymously with –User: anonymous –Password: your address Go download a file –Type “cd pub/gina/lbsc690/” –Type “binary” –Type “get hwOne.ppt” Exit –Type “quit” Try it again with a graphical FTP program –WS_FTP, for example

HyperText Transfer Protocol (HTTP) Send request GET /path/file.html HTTP/1.0 From: User-Agent: HTTPTool/1.0 Server response HTTP/ OK Date: Fri, 31 Dec :59:59 GMT Content-Type: text/html Content-Length: 1354 Happy New Millennium! …

Encryption Secret-key systems (e.g., DES) –Use the same key to encrypt and decrypt Public-key systems (e.g., PGP) –Public key: open, for encryption –Private key: secret, for decryption Digital signatures –Encrypt with private key, decrypt with public key

Encrypted Standards Secure Shell (SSH) –Replaces Telnet Secure FTP (SFTP)/Secure Copy (SCP) –Replaces FTP Secure HTTP (HTTPS) –Used for financial and other private data Wired Equivalent Protocol (WEP) –Used on wireless networks

Network Abuse Flooding –Excessive activity, intended to prevent valid activity Worms –Like a virus, but self-propagating Sniffing –Monitoring network traffic (e.g., for passwords)

Before You Go On a sheet of paper, answer the following (ungraded) question (no names, please): What was the muddiest point in today’s class?