Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Tenth.

Slides:



Advertisements
Similar presentations
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin APPENDIX B NETWORKS AND TELECOMMUNI CATIONS APPENDIX B NETWORKS.
Advertisements

Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
(4.4) Internet Protocols Layered approach to Internet Software 1.
IS Network and Telecommunications Risks
Infrastructure for Electronic Commerce
Networking and the Internet
Internet…issues Managing the Internet
Nasca Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.
1 Chapter 2 Infrastructure for Electronic Commerce.
Copyright © 2015 Pearson Education, Inc. Chapter 4: Networking and the Internet Computer Science: An Overview Twelfth Edition by J. Glenn Brookshear Dennis.
Chapter 15 Networks.
1 Networking A computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources. The.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
©Brooks/Cole, 2003 Chapter 6 Computer Networks. ©Brooks/Cole, 2003 Understand the rationale for the existence of networks. Distinguish between the three.
Module 4 - Networking MIS5122: Enterprise Architecture for the IT Auditor.
Chapter 4 Telecommunications, the Internet, Intranets, and Extranets
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Tenth.
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Tenth.
Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved.
The Internet, Intranets, & Extranets Chapter 7. IS for Management2 The Internet (1) A collection of networks that pass data around in packets, each of.
Networks A network is a collection of computers and devices connected together via communications devices and transmission media Advantages of a network.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Lesson 2 — The Internet and the World Wide Web
Chapter 4 Networking and the Internet Introduction to CS 1 st Semester, 2015 Sanghyun Park.
Chapter 3 Hardware, Software, and Networks Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 3-1.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Tenth.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
Copyright © 2015 Pearson Education, Inc. Chapter 4: Networking and the Internet.
Chapter 4 Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved.
Lecture 10: 9/26/2002CS149D Fall CS149D Elements of Computer Science Ayman Abdel-Hamid Department of Computer Science Old Dominion University Lecture.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Chapter 4 Networking and the Internet. © 2005 Pearson Addison-Wesley. All rights reserved 4-2 Chapter 4: Networking and the Internet 4.1 Network Fundamentals.
1 Web Development & Design Foundations with XHTML Chapter 1 Key Concepts.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
MySQL and PHP Internet and WWW. Computer Basics A Single Computer.
Chapter 4 Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved.
Copyright © 2012 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Network Basics. Network Classifications Scope Scope Local area network (LAN) Local area network (LAN) Metropolitan area (MAN) Metropolitan area (MAN)
Chapter 4 Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved.
Chapter 6 Data Communications. Network Collection of computers Communicate with one another over transmission line Major types of network topologies What.
The Internet Lecture 16 CSCI 1405, CSCI 1301 Introduction to Computer Science Fall 2009.
Internet Architecture and Governance
TCP/IP (Transmission Control Protocol / Internet Protocol)
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
© 2003 Prentice Hall, Inc.4-1 Chapter 4 Telecommunications and the Internet Information Systems Today Leonard Jessup & Joseph Valacich.
INTERNET AND PROTOCOLS For more notes and topics visit: eITnotes.com.
Chapter 11 Panko and Panko Business Data Networks and Security, 10 th Edition, Global Edition Copyright © 2015 Pearson Education, Ltd. Panko and Panko.
Networks. Local area network (LAN( Wide-area network (WAN( Networks Topology.
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
7.1 © 2010 by Prentice Hall 4 Chapter Telecommunications, the Internet, and Wireless Technology.
Win Phillips, Ph.D Win Phillips, Ph.D. Clinical Assistant Professor University of Missouri Columbia, MO.
Chapter 11 Panko and Panko Business Data Networks and Security, 11 th Edition Copyright © 2016 Pearson Finally, Layer 5!
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Tenth.
Web Development & Design Foundations with XHTML Chapter 1 Key Concepts 1.
Chapter Objectives In this chapter, you will learn:
Chapter 4: Networking and the Internet
Computer Networks.
Networking and the Internet
E-commerce Infrastructure
Chapter 4: Networking and the Internet
Presentation transcript:

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Tenth Edition by J. Glenn Brookshear Modified by Marie desJardins for CMSC 100, Fall 2009

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-2 Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols 4.5 Security

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Networking Basics

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-4 Network Classifications Scope –Local area network (LAN) –Metropolitan area (MAN) –Wide area network (WAN) Ownership –Closed versus open Topology (configuration) –Bus (Ethernet) –Star (Wireless networks with central Access Point)

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-5 Figure 4.1 Network topologies

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-6 Figure 4.1 Network topologies (continued)

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-7 Protocols CSMA/CD –Used in Ethernet –Silent bus provides right to introduce new message CSMA/CA –Used in WiFi –Hidden terminal problem

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-8 Figure 4.2 Communication over a bus network

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-9 Figure 4.3 The hidden terminal problem

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-10 Connecting Networks Repeater: Extends a network Bridge: Connects two compatible networks Switch: Connect several compatible networks Router: Connects two incompatible networks resulting in a network of networks called an internet

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-11 Figure 4.4 Building a large bus network from smaller ones

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-12 Figure 4.5 Routers connecting two WiFi networks and an Ethernet network to form an internet

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley The Internet

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-14 The Internet The Internet: An internet that spans the world –Original goal was to develop a means of connecting networks that would not be disrupted by local disasters. –Today it has shifted from an academic research project to a commercial undertaking.

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-15 Internet Architecture Internet Service Provider (ISP) –Tier-1 –Tier-2 Access ISP: Provides connectivity to the Internet –Traditional telephone (dial up connection) –Cable connections –DSL –Wireless

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-16 Figure 4.7 Internet Composition

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-17 The Structure of the Internet The Internet is an example of a “scale-free network” –“Degree distribution” follows a power law –There are very many machines on the Internet that are connected only to one or two other machines –There are a few “hub nodes” that are connected to hundreds or thousands of machines Power law distribution (from Wikipedia)

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-18 The connectivity of 100K Internet routers From W K Cheswick / Bell Labs via physicsworld.com

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-19 Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation Mnemonic address: –Domain names –Top-Level Domains Domain name system (DNS) –Name servers –DNS lookup

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-20 Internet Corporation for Assigned Names & Numbers (ICANN) Allocates IP addresses to ISPs who then assign those addresses within their regions. Oversees the registration of domains and domain names.

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-21 Traditional Internet Applications Electronic Mail ( ) –Domain mail server collects incoming mail and transmits outgoing mail –Mail server delivers collected incoming mail to clients via POP3 or IMAP File Transfer Protocol (FTP) Telnet and SSH

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-22 More Recent Applications Voice Over IP (VoIP) Internet Radio –N-unicast –Multicast

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley The World Wide Web

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-24 World Wide Web Hypertext and HTTP Browser gets documents from Web server Documents identified by URLs

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-25 Figure 4.8 A typical URL

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-26 Hypertext Document Format Encoded as text file Contains tags to communicate with browser –Appearance to start a level one heading to start a new paragraph –Links to other documents and content –Insert images

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-27 Figure 4.9 A simple Web page

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-28 Figure 4.9 A simple Web page (continued)

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-29 Figure 4.10 An enhanced simple Web page

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-30 Figure 4.10 An enhanced simple Web page (continued)

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-31 Extensible Markup Language (XML) XML: A language for constructing markup languages similar to HTML –A descendant of SGML –Opens door to a World Wide Semantic Web

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-32 Using XML C minor 2/4 egth egth G, egth G, egth G hlf E

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-33 Figure 4.11 The first two bars of Beethoven’s Fifth Symphony

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Protocols and Distributed Processes

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-35 Distributed Systems Systems with parts that run on different computers –Infrastructure can be provided by standardized toolkits Example: Enterprise Java Beans from Sun Microsystems Example:.NET framework from Microsoft

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-36 Inter-process Communication Client-server –One server, many clients –Server must execute continuously –Client initiates communication Peer-to-peer (P2P) –Two processes communicating as equals –Peer processes can be short-lived

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-37 Figure 4.6 The client/server model compared to the peer-to-peer model

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-38 Client Side Versus Server Side Client-side activities –Examples: java applets, javascript, Macromedia Flash Server-side activities –Common Gateway Interface (CGI) –Servlets –PHP “Cloud computing” –Basically server-side computing when you don’t know which server is handling your job –Largely a buzzword… but a current one that will make you sound like you know what you’re talking about

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Routing Messages

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-40 Routing & Deadlock Let’s play a game… :-)

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-41 Figure 4.12 Package-shipping example

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-42 Internet Software Layers Application: Constructs message with address Transport: Chops message into packets Network: Handles routing through the Internet Link: Handles actual transmission of packets

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-43 Figure 4.13 The Internet software layers

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-44 Figure 4.14 Following a message through the Internet

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-45 TCP/IP Protocol Suite Transport Layer –TCP –UDP Network Layer –IP (IPv4 and IPv6)

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-46 Figure 4.15 Choosing between TCP and UDP

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Network Security

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-48 Security Attacks –Malware (viruses, worms, Trojan horses, spyware, phishing software) –Denial of service –Spam Protection –Firewalls –Spam filters –Proxy servers –Antivirus software

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-49 Encryption FTPS, HTTPS, SSL Public-key Encryption –Public key: Used to encrypt messages –Private key: Used to decrypt messages Certificates and Digital Signatures

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-50 Figure 4.16 Public-key encryption