Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lecture#1 on Internet. Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation IP address: pattern of 32.

Similar presentations


Presentation on theme: "Lecture#1 on Internet. Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation IP address: pattern of 32."— Presentation transcript:

1 Lecture#1 on Internet

2 Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation IP address: pattern of 32 or 128 bits often represented in dotted decimal notation Mnemonic address: Mnemonic address: Domain names Domain names Top-Level Domains Top-Level Domains Domain name system (DNS) Domain name system (DNS) Name servers Name servers DNS lookup DNS lookup

3 Internet Corporation for Assigned Names & Numbers (ICANN) Allocates IP addresses to ISPs who then assign those addresses within their regions. Allocates IP addresses to ISPs who then assign those addresses within their regions. Oversees the registration of domains and domain names. Oversees the registration of domains and domain names.

4 Proxy Server A server that sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server. A server that sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server.serverclient applicationWeb browserserverclient applicationWeb browser

5 Two Purpose Improve Performance: Proxy servers can dramatically improve performance for groups of users. This is because it saves the results of all requests for a certain amount of time. Consider the case where both user X and user Y access the World Wide Web through a proxy server. First user X requests a certain Web page, which we'll call Page 1. Sometime later, user Y requests the same page. Instead of forwarding the request to the Web server where Page 1 resides, which can be a time- consuming operation, the proxy server simply returns the Page 1 that it already fetched for user X. Since the proxy server is often on the same network as the user, this is a much faster operation. Improve Performance: Proxy servers can dramatically improve performance for groups of users. This is because it saves the results of all requests for a certain amount of time. Consider the case where both user X and user Y access the World Wide Web through a proxy server. First user X requests a certain Web page, which we'll call Page 1. Sometime later, user Y requests the same page. Instead of forwarding the request to the Web server where Page 1 resides, which can be a time- consuming operation, the proxy server simply returns the Page 1 that it already fetched for user X. Since the proxy server is often on the same network as the user, this is a much faster operation.userWorld Wide Web pagenetworkuserWorld Wide Web pagenetwork

6 Two Purpose Filter Requests: Proxy servers can also be used to filter requests. For example, a company might use a proxy server to prevent its employees from accessing a specific set of Web sites. Filter Requests: Proxy servers can also be used to filter requests. For example, a company might use a proxy server to prevent its employees from accessing a specific set of Web sites.Web sitesWeb sites

7 Distributed Networks the design of the ARPANet was influenced by the ideas of Paul Baran, a researcher at the RAND Institute the design of the ARPANet was influenced by the ideas of Paul Baran, a researcher at the RAND Institute Baran proposed 2 key ideas: distributed network and packet-switching Baran proposed 2 key ideas: distributed network and packet-switching recall: the ARPANet was funded by the Dept of Defense for communications recall: the ARPANet was funded by the Dept of Defense for communications as such, it needed to be resistant to attack or mechanical failure as such, it needed to be resistant to attack or mechanical failure

8 Packet Switching in a packet-switching network, messages to be sent over the network are first broken into small pieces known as packets in a packet-switching network, messages to be sent over the network are first broken into small pieces known as packets these packets are sent independently to their final destination these packets are sent independently to their final destination

9 Advantages of Packets 1.sending information in smaller units increases the efficient use of connections large messages can't monopolize the connection large messages can't monopolize the connection analogy: limiting call lengths at a pay phone to limit waiting analogy: limiting call lengths at a pay phone to limit waiting 2.transmitting packets independently allows the network to react to failures or network congestion routers (special-purpose computers that direct the flow of messages) can recognize failures or congestion and reroute the packet around trouble areas routers (special-purpose computers that direct the flow of messages) can recognize failures or congestion and reroute the packet around trouble areas 3.breaking the message into packets can improve reliability since the packets are transmitted independently, it is likely that at least part of the message will arrive (even if some failures occur within the network) since the packets are transmitted independently, it is likely that at least part of the message will arrive (even if some failures occur within the network) software at the destination can recognize which packets are missing and request retransmission software at the destination can recognize which packets are missing and request retransmission

10 Protocols and Addresses the Internet allows different types of computers from around the world to communicate the Internet allows different types of computers from around the world to communicate this is possible because the computing community agreed upon common protocols (sets of rules that describe how communication takes place) this is possible because the computing community agreed upon common protocols (sets of rules that describe how communication takes place) the two central protocols that control Internet communication are: the two central protocols that control Internet communication are: 1.Transmission Control Protocol (TCP) 2.Internet Protocol (IP) these protocols rely on each computer having a unique identifier (known as an IP address) these protocols rely on each computer having a unique identifier (known as an IP address) analogy: street address + zip code provide unique address for your house/dorm analogy: street address + zip code provide unique address for your house/dorm using this address, anyone in the world can send you a letter an IP address is a number, written as a dotted sequence such as 147.134.2.84 an IP address is a number, written as a dotted sequence such as 147.134.2.84 each computer is assigned an IP address by its Internet Service Provider (ISP) each computer is assigned an IP address by its Internet Service Provider (ISP) some ISPs (e.g., AOL, most colleges) maintain a pool of IP addresses and assign them dynamically to computers each time they connect some ISPs (e.g., AOL, most colleges) maintain a pool of IP addresses and assign them dynamically to computers each time they connect

11 TCP/IP Transmission Control Protocol (TCP) Transmission Control Protocol (TCP) controls the method by which messages are broken down into packets and then reassembled when they reach their final destination controls the method by which messages are broken down into packets and then reassembled when they reach their final destination Internet Protocol (IP) Internet Protocol (IP) concerned with labeling the packets for delivery and controlling the packets’ paths from sender to recipient concerned with labeling the packets for delivery and controlling the packets’ paths from sender to recipient

12 Routers and DNS the Internet relies on special purpose computers in the network the Internet relies on special purpose computers in the network routers are computers that receive packets, access the routing information, and pass the packets on toward their destination routers are computers that receive packets, access the routing information, and pass the packets on toward their destination domain name servers are computers that store mappings between domain names and IP addresses domain name servers are computers that store mappings between domain names and IP addresses domain names are hierarchical names for computers (e.g., bluejay.creighton.edu) domain names are hierarchical names for computers (e.g., bluejay.creighton.edu) they are much easier to remember and type than IP addresses domain name servers translate the names into their corresponding IP addresses domain name servers translate the names into their corresponding IP addresses


Download ppt "Lecture#1 on Internet. Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation IP address: pattern of 32."

Similar presentations


Ads by Google