The Internet. Chapter 10. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:

Size: px
Start display at page:

Download "The Internet. Chapter 10. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:"

Transcription

1 The Internet Chapter 10 Learning Objectives After reading this chapter, you should be able to: Discuss the responsibilities of the Internet Protocol (IP) and how IP can be used to create a connection between networks Discuss the responsibilities of the Transmission Control Protocol (TCP) and how it can be used to create a reliable end-to-end network connection Identify the relationships between TCP/IP and the protocols ICMP, UDP, ARP, DHCP, NAT, and tunneling protocols Cite the basic features of HTML, Dynamic HTML, and XML and describe how they differ from each other Describe the responsibility of the Domain Name Service and how it converts a URL into a dotted decimal IP address Describe the major Internet applications and services Discuss the business advantages of the World Wide Web Recognize that the Internet is constantly evolving and that IPv6 and Internet2 demonstrate that evolution Chapter Outline 1. Introduction 2. Internet Protocols a. The Internet Protocol (IP) b. The Transmission Control Protocol (TCP) c. Internet Control Message Protocol (ICMP) d. User Datagram Protocol (UDP) e. Address Resolution Protocol (ARP) f. Dynamic Host Configuration Protocol (DHCP) g. Network Address Translation (NAT) h. Tunneling protocols and virtual private networks (VPNs) 3. The World Wide Web a. Locating a document on the Internet b. Creating Web pages

2 4. Internet Services a. Electronic mail ( ) b. File Transfer Protocol (FTP) c. Remote login (Telnet) d. Voice over IP (Internet telephony) e. Listservs f. Streaming audio and video g. Instant messaging 5. The Internet and Business a. Cookies and state information b. Intranets and extranets 6. The Future of the Internet a. Ipv6 b. Internet2 7. The Internet In Action: A Company Creates a VPN 8. Summary Lecture Notes Introduction Many people think the Internet is only the service that allows a person to browse Web pages and click links, but it is actually much more. One of the first services, and still one of the more popular offered on the Internet, is the File Transfer Protocol (FTP), which allows a user to upload or download files. Other services offered by the Internet include remote login, Internet telephony, electronic mail, listservs, voice over IP, and streaming audio and video. To support the Internet, a host of protocols is necessary. Two of the most common protocols are the Internet Protocol (IP) and the Transmission Control Protocol (TCP). These protocols are supported by a host of secondary protocols, which include Internet Control Message Protocol (ICMP), User Datagram Protocol (UDP), and Address Recognition Protocol (ARP). Internet Protocols Although many protocols are necessary to support the operation of the Internet, several stand out as the most common: Internet Protocol (IP), Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Internet Control Message Protocol (ICMP), and Address Resolution Protocol (ARP). The reliable transport service, provided by software called Transmission Control Protocol (TCP), turns an unreliable sub-network into a reliable network, free from lost and duplicate packets. If an application did not need to create a connection to transfer data, the User Datagram Protocol (UDP) could be used instead of TCP. UDP supports a connectionless application in which a connection-oriented stream of packets is not necessary. The

3 connectionless packet delivery service provides an unreliable, connectionless network service in which packets may be lost, duplicated, delayed, or delivered out of order. Even worse, the sender and receiver of these packets may not be informed that these problems have occurred. This connectionless packet delivery service is called Internet Protocol (IP). Because the connectionless packet delivery service doesn t inform users that problems may have occurred, a reliable transport service is needed above the connectionless packet delivery service to cover for its possible shortcomings. The World Wide Web Although the Internet still offers tried-and-true services, such as file transfer, electronic mail, and remote login, a relatively new service has grown dramatically since its introduction in 1992: the World Wide Web (WWW). Using a Web browser such as Netscape Navigator or Microsoft Internet Explorer, you can download and view Web pages on a personal computer. Of all the Internet services, the World Wide Web has probably had the most profound impact on business. Web pages are created using Hypertext Markup Language (HTML) generated manually with a text-based editor such as Notepad or by using a Web page authoring tool. Once a Web page is created, it is stored on a computer that contains Web server software and has a connection to the Internet. The Web server software accepts Hypertext Transport Protocol (HTTP) requests from Web browsers connected to the Internet, retrieves the requested Web page from storage, and returns that Web page to the requesting computer via the Internet. Although HTML is the original and still most commonly used method for controlling the display of Web pages, two new forms of HTML have emerged that offer more power and flexibility in Web page creation: dynamic HTML and extensible Markup Language. Internet Services When the Internet came into existence as the Arpanet, most people used the Internet for , file transfers, and remote logins. To appreciate the many capabilities of the Internet, let s examine several of the more popular services that the Internet provides today, starting with File Transfer Protocol for downloading and uploading files and continuing with remote login, Internet telephony, , listservs, voice over IP, and streaming audio and video. The Internet and Business An intranet is a TCP/IP network inside a company that allows employees to access the company s information resources through an Internet-like interface. Using a Web browser on a workstation, an employee can perform browsing operations, but the applications that can be accessed through the browser are available only to employees within the company. When an intranet is extended outside the corporate walls to include suppliers, customers, or other external agents, the intranet becomes an extranet. Since an extranet allows external agents to have access to corporate computing resources, a much higher level of security is usually established.

4 The Future of the Internet The Internet is not a static entity; it continues to grow by adding new networks and new users every day. People are constantly working on updating and revising the Internet s myriad pieces. One of the biggest changes to affect the Internet will be the adoption of a new version of the Internet Protocol, IPv6. Currently, most of the Internet is using IPv4, which was the version presented earlier in the chapter. If changes to the IP protocol are not enough, work is progressing on a new, very high-speed network that will cover the U.S., interconnecting universities and research centers at transmission rates up to a gigabit per second (1000 Mbps). The new highspeed network is called Internet2, and its links are currently being built and tested on top of existing Internet links. The Internet In Action: A Company Creates a VPN The In Action example for this chapter shows how a company can support its external and mobile employees by providing them with a virtual private network (VPN). This VPN uses the Internet along with additional protocols that support secure connections from anywhere into the corporate system. Quick Quiz 1. What is the relationship between the Internet and World Wide Web? The World Wide Web is one service of many offered by the Internet. 2. What is the relationship between HTTP and HTML? HTTP is the protocol to transfer Web pages and HTML is the scripting language that displays Web pages. 3. What are the principal functions of TCP and IP? TCP provides an error-free end-to-end connection, while IP provides a connectionless network packet transfer service. Discussion Topics 1. Is IP fragmentation a thing of the past? 2. Are cookies an invasion of privacy? 3. With the flurry of viruses that are passed in attachments, will the attachments such as Word files and Excel files become outlawed?

5 4. The hackers that perform distributed denial-of-service attacks on e-commerce sites: are they criminals or are they heroes helping computer specialists discover faults within computer networks and systems? Teaching Tips 1. Emphasize that the Internet offers many services and not just the World Wide Web. 2. Suggest that students seek out and join a listserv of their choice. Make sure they save the information necessary to unsubscribe at a later date. 3. It is probably not necessary to discuss each of the fields in the IP and TCP headers. You may only want to introduce the few that are relevant to the discussion. 4. Tunneling protocols and virtual private networks are very popular. Make sure you discuss these terms with an example or two. 5. You might want to discuss the current status of IPv6 and/or Internet2. Solutions to Review Questions 1. What was the precursor to the present day Internet? Arpanet first, then NSFnet 2. List the main responsibilities of the Internet Protocol. To transfer data packets across the Internet 3. List the main responsibilities of the Transmission Control Protocol. To create an error-free end-to-end connection over the Internet 4. Explain the relationship of the port to an IP address. An IP address identifies a computer s connection to the Internet, while a port address identifies a particular application on that computer. 5. Is UDP the same thing as TCP? UDP creates an error-free connectionless connection, while TCP creates an error-free connection-oriented connection.

6 6. What is the purpose of MPLS? To speed packets through routers 7. What is the relationship between IP and ICMP? ICMP returns an error message to the sender when an error happens during IP. 8. Is DHCP the same thing as NAT? Explain. No. DHCP dynamically assigns IP addresses to machines that need them, while NAT can substitute an IP address when the packet leaves the user s premises. 9. What is the relationship between the Internet and the World Wide Web? The World Wide Web is one service of the Internet. 10. What is the HTTP protocol used for? It is used to transfer Web pages across the Internet. 11. How is a Web markup language different than a programming language? Much simpler, relatively English-like, does not require loops or decisions 12. What features have been added to HTML to produce dynamic HTML? Pop-up responses, layering, cascading style sheets, and better data binding 13. What can a cascading style sheet add to a Web page? Uniformity by creating one style sheet (or a series of style sheets) for multiple documents. 14. How does XML differ from HTML and dynamic HTML? XML also defines the data that is transferred with the Web page. 15. What is the purpose of the uniform resource locator (URL)? To identify every document on the Internet 16. List the four basic parts of the URL. Service, host name, directory info, filename

7 17. How does the domain name server translate a URL into a 32-bit binary address? DNS uses a distributed database system of URL address. 18. What are the different classes of IP addresses? Classes A through D (using classful addressing) 19. What is the File Transfer Protocol (FTP) used for? It is used to download and upload files across the Internet. 20. What is the main function of Telnet? To allow a remote user to log in to a computer system via the Internet 21. Is VoIP more reliable within a business or over the Internet? Explain. More reliable within a business (better throughput) 22. What other options are available for transmitting voice via Internet technology besides voice over Internet? Voice over frame relay and voice over ATM 23. List the basic features of a common electronic mail system. Send, receive, archive messages; group mailings; listservs 24. What are the duties of SMTP, POP3, and IMAP when referring to systems? SMPT is used to transfer an , and POP3 and IMAP are used to hold and later access messages. 25. What is a listserv used for? It is used to support an -based discussion group on a particular subject of interest. 26. What tools are necessary to support streaming audio or video? A real-time streaming protocol and a software viewer 27. How does Instant Messaging differ from ? It is instant and usually only one or two lines of data.

8 28. What are the two competing protocols used to support Instant Messaging? This is not covered in the text, but here is what Wikipedia has to say: There have been several attempts to create a unified standard for instant messaging: IETF's SIP (Session Initiation Protocol) and SIMPLE (SIP for Instant Messaging and Presence Leverage), APEX (Application Exchange), Prim (Presence and Instant Messaging Protocol), the open XMLbased XMPP (Extensible Messaging and Presence Protocol), more commonly known as Jabber and OMA's (Open Mobile Alliance) IMPS (Instant Messaging and Presence Service) created specifically for mobile devices. 29. What is the relationship between Electronic Data Interchange and e-commerce? EDI is one facet of e-commerce. 30. What is a cookie? Who makes cookies and where are they stored? A cookie is a small set of data stored on a user s computer. Created by a Web server, cookies are stored in a file or files on the computer s hard disk. 31. How do intranets and extranets compare and differ from the Internet? An intranet is an internal Internet that is usually only open to employees of a company. An extranet is an interconnection of intranets. 32. How can a business use a private virtual network and tunneling to support an offsite connection? They allow a remote user to create a secure connection across the Internet into the user s corporate computing system. 33. How will IPv6 differ from the current version (4) of IP? Smaller, simpler header; bigger IP addresses; better security; quality of service added 34. What are the main features of Internet2? High speed, high bandwidth for computationally intensive applications Suggested Solutions to Exercises 1. Does the U.S. government support the Internet? Explain. No, it no longer directly supports the Internet. Private industry and universities now support the many facets of the Internet.

9 2. Given an IP packet of size 540 bytes and a maximum packet size of 200 bytes, what are the IP Fragment Offsets and More flags for the appropriate packet fragments? First fragment: Offset=0, More flag=true Second fragment: Offset=25, More flag=true Third fragment: Offset=50, More flag=false 3. The Hop Limit field in IP version 6 is 8 bits long (the same size as the equivalent Time to Live field in IPv4). Since this hop count is decremented each time an IP datagram enters a router, what are the implications of such a small field size? A packet cannot hop through as many routers. 4. In your town there is a small commercial retail building with essentially one room. On one side of the room is a real estate agency and on the other side of the room is a guy who sells tea. What is the relationship between this setup and the concept of IP addresses with TCP port numbers? You could think of the building as having one postal address (IP address) with two operations within the building (two port addresses). 5. Somewhere in the middle of the United States are two Internet routers with routing tables that are all messed up. The two routers keep sending their packets back and forth to each other, nonstop. Will an error message ever be generated from this action? If so, who will generate the error message and what might it look like? Eventually each packet s Time to Live field should expire, causing the packet to be discarded and ICMP to send a message back to the source that generated the packet. 6. Why is ARP necessary if every workstation connected to the Internet has a unique IP address? Because once a packet arrives at the destination local area network (such as a CSMA/CD LAN), the LAN protocol does not look at IP addresses but uses the MAC layer addresses to deliver the frame. 7. If I dial in to the Internet from home, is it likely that my workstation is using DHCP? Explain. Yes, very likely. It s much easier to assign an IP address dynamically than to give every potential user an IP address. 8. If someone on the Internet sends you an , will NAT delete it before it gets delivered to you? Why or why not?

10 No, because even though a user on the inside did not request the incoming packet, the NAT server will recognize that the packet is intended for the local server. 9. If three users on one local area network all request a Web page at the same time, how does NAT know which results go to which workstation? The NAT software records each outgoing request so that when the Web pages come back, it knows which Web page goes to which workstation. 10. If your computer workstation has an IP address of , is it a Class A, B, C, or D IP address? It is a Class C address. 11. What are the advantages and disadvantages of using dynamic IP address assignments? Advantages: A company can purchase fewer IP addresses since each machine will not be statically assigned a fixed address but dynamically assigned an address when it accesses the Internet. Disadvantages: The software is more elaborate; what if 100 IP addresses are purchased and the 101st user tries to access the Internet? 12. Locate and label the service, host name, directory, and filename in the following URL: Service: Host name: Directory: /listings/pages/ Filename: web.htm 13. Using a Web browser, go to site and list three of the subdirectories in the directory pub. 14. If you use your computer primarily for Telnet into a remote computer, will you have a large long-distance telephone bill? No. Telnet allows you to log in to a remote computer system by placing a (hopefully) local call to your Internet service provider. 15. What is the difference between voice over the Internet and private VoIP? Private VoIP exists only within a corporate network and may never access the outside Internet. 16. Convert the telephone number into ENUM form e164.arpa

11 17. With respect to , what is the relationship between SMTP and POP3? Can one operate without the other? SMTP transmits the messages, while POP3 holds the messages and displays them when you log on. You really need both for an system to work. 18. Your company has asked you to keep abreast of workplace ethics. Which Internet service(s) introduced in this chapter would best help you accomplish this task? You might consider a listserv for workplace ethics. If there is none, the World Wide Web would also be a good resource. 19. Are HTTP and HTML two protocols with the same function? Explain. No. HTTP transmits Web pages and HTML displays them. 20. Given the following section of HTML code, what will be displayed on the screen when the HTML code is read by a browser: <HTML> <BODY> <H1> Chapter Eleven </H1> <HR> <IMG SRC= amerflag.gif ALIGN=RIGHT> <A HREF= > Everyone College Home Page </A> </BODY> </HTML> 21. Which dynamic HTML concept will print the phrase Computer Network multiple times on the screen, each one larger than the previous one and each one slightly overlapping the previous one? Layers 22. Is HTML a subset of XML, or is it the other way around? Explain. HTML is a subset of XML. In XML, you can define any tag you wish, including the tags normally used in HTML. 23. Some of the new protocols, such as Internet Protocol version 6, are not including any kind of error detection scheme on the data portion of the packet. What significance does this trend indicate? To some degree, the protocols are relying on the better transmission qualities of modern media, such as fiber-optic cable. Also, the protocols are relying on higher-layer protocols to take care of error detection and correction.

12 Thinking Outside the Box 1. You are working for a company that wants to begin electronic data interchange (EDI) with two other companies that supply parts. Your company produces mobile telephones, and the two other companies produce batteries and telephone keypads. When your company places an order with the battery company, it specifies battery size, battery type, battery power, and quantity. When your company places an order with the keypad company, it specifies keypad configuration, power consumption, keypad dimensions, and keypad color. How might XML be used to support EDI between these companies? XML can be used to define the data structure (battery size, battery type, battery power, quantity) that is part of the purchase order. 2. Two banks want to establish an electronic link between themselves, over which they can transmit money transfers. Can they use a virtual private network and a tunneling protocol, or is a better technique available? Defend your answer. A VPN would be a good solution, as long as a high level of security is implemented. A leased telephone service with encryption will also work. 4. You are thinking about creating a network solution for a small business of approximately 10 users. You give each user a workstation and access to the Internet. Which Internet protocols will your network and workstations need to support? Which optional IP protocols might you implement? TCP, IP, and ARP are necessary. NAT and DHCP might be very useful too. 5. A company currently has a telephone system and a separate system of local area networks. It is thinking about converting its telephone system to VoIP and running both voice and data over the system of local area networks. What must the company consider before making this move? Can the company s current network support the much higher load of voice over IP? If not, what has to be installed? How much will this upgrade cost?

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information

TCP/IP Protocol Suite. Marshal Miller Chris Chase

TCP/IP Protocol Suite. Marshal Miller Chris Chase TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Overview of TCP/IP. TCP/IP and Internet

Overview of TCP/IP. TCP/IP and Internet Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

Connecting with Computer Science, 2e. Chapter 5 The Internet

Connecting with Computer Science, 2e. Chapter 5 The Internet Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar

More information

CITS1231 Web Technologies. Client, Server, the Internet, and the Web

CITS1231 Web Technologies. Client, Server, the Internet, and the Web CITS1231 Web Technologies Client, Server, the Internet, and the Web Topic Outline How does the Internet work Client Server Architecture Connections Communications Protocols Addressing Routing One of the

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: victorkleo@live.com ABSTRACT Internet security

More information

SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet

SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet SWE 444 Internet and Web Application Development Introduction to Web Technology Dr. Ahmed Youssef Internet It is a network of networks connected and communicating using TCP/IP communication protocol 2

More information

TCP/IP Concepts Review. A CEH Perspective

TCP/IP Concepts Review. A CEH Perspective TCP/IP Concepts Review A CEH Perspective 1 Objectives At the end of this unit, you will be able to: Describe the TCP/IP protocol stack For each level, explain roles and vulnerabilities Explain basic IP

More information

Unit 4. Introduction to TCP/IP. Overview. Description. Unit Table of Contents

Unit 4. Introduction to TCP/IP. Overview. Description. Unit Table of Contents Unit 4 Introduction to TCP/IP Overview Description This unit contains one lesson: This lesson will introduce protocols in general. You will look at how a protocol functions, the differences between a routable

More information

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall VPN Router. Quick Installation Guide M73-APO09-380 Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,

More information

Multi-Homing Dual WAN Firewall Router

Multi-Homing Dual WAN Firewall Router Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet

More information

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer) Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI

More information

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation

More information

COMPUTER NETWORK TECHNOLOGY (300)

COMPUTER NETWORK TECHNOLOGY (300) Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant

More information

The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d.

The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d. C H A P T E R 7 The Internet, Intranets, and Extranets What is the Internet Millions of computers, all linked together on a computer network. A home computer usually links to the Internet using a phone

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET 3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

Module 6. Internetworking. Version 2 CSE IIT, Kharagpur

Module 6. Internetworking. Version 2 CSE IIT, Kharagpur Module 6 Internetworking Lesson 2 Internet Protocol (IP) Specific Instructional Objectives At the end of this lesson, the students will be able to: Explain the relationship between TCP/IP and OSI model

More information

2. IP Networks, IP Hosts and IP Ports

2. IP Networks, IP Hosts and IP Ports 1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3

More information

Using MIS 3e Chapter 6A Appendix

Using MIS 3e Chapter 6A Appendix Study Questions Using MIS 3e Chapter 6A Appendix How the Internet Works David Kroenke Q1: How does email travel? Q2: What is a communications protocol? Q3: What are the functions of the five TCP/IP-OSI

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if

More information

Copyright 2006 Comcast Communications, Inc. All Rights Reserved.

Copyright 2006 Comcast Communications, Inc. All Rights Reserved. ii Copyright 2006 Comcast Communications, Inc. All Rights Reserved. Comcast is a registered trademark of Comcast Corporation. Comcast Business IP Gateway is a trademark of Comcast Corporation. The Comcast

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Chapter 12 Supporting Network Address Translation (NAT)

Chapter 12 Supporting Network Address Translation (NAT) [Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information

More information

Review: Lecture 1 - Internet History

Review: Lecture 1 - Internet History Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration

More information

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student

More information

Introduction to computer networks and Cloud Computing

Introduction to computer networks and Cloud Computing Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication

More information

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). 1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

Lecture 28: Internet Protocols

Lecture 28: Internet Protocols Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further

More information

About Firewall Protection

About Firewall Protection 1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote

More information

Fundamentals of the Internet 2009/10. 1. Explain meaning the following networking terminologies:

Fundamentals of the Internet 2009/10. 1. Explain meaning the following networking terminologies: Fundamentals of Internet Tutorial Questions (2009) 1. Explain meaning the following networking terminologies: Client/server networking, Coax, twisted pair, protocol, Bit, Byte, Kbps, KBps, MB, KB, MBps,

More information

EXPLORER. TFT Filter CONFIGURATION

EXPLORER. TFT Filter CONFIGURATION EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content

More information

TCP/IP and the Internet

TCP/IP and the Internet TCP/IP and the Internet Computer networking today is becoming more and more entwined with the internet. By far the most popular protocol set in use is TCP/IP (Transmission Control Protocol/Internet Protocol).

More information

WEB SITE DEVELOPMENT WORKSHEET

WEB SITE DEVELOPMENT WORKSHEET WEB SITE DEVELOPMENT WORKSHEET Thank you for considering Xymmetrix for your web development needs. The following materials will help us evaluate the size and scope of your project. We appreciate you taking

More information

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe

More information

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Internetworking. Problem: There is more than one network (heterogeneity & scale) Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

Internet Privacy Options

Internet Privacy Options 2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms

More information

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewalls and VPNs. Principles of Information Security, 5th Edition 1 Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches

More information

TCP IPX/SPX. 1 The Mattapan/Greater Boston Technology Learning Center.

TCP IPX/SPX. 1 The Mattapan/Greater Boston Technology Learning Center. 1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4) Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely

More information

The OSI and TCP/IP Models. Lesson 2

The OSI and TCP/IP Models. Lesson 2 The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP

More information

Revised: 14-Nov-07. Inmarsat Fleet from Stratos MPDS Firewall Service Version 1.0

Revised: 14-Nov-07. Inmarsat Fleet from Stratos MPDS Firewall Service Version 1.0 Revised: 14-Nov-07 Inmarsat Fleet from Stratos MPDS Firewall Service Version 1.0 2 / 16 This edition of the User Manual has been updated with information available at the date of issue. This edition supersedes

More information

NQA Technology White Paper

NQA Technology White Paper NQA Technology White Paper Keywords: NQA, test, probe, collaboration, scheduling Abstract: Network Quality Analyzer (NQA) is a network performance probe and statistics technology used to collect statistics

More information

Chapter 9 Monitoring System Performance

Chapter 9 Monitoring System Performance Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals

More information

Module 11: TCP/IP Transport and Application Layers

Module 11: TCP/IP Transport and Application Layers Module 11: TCP/IP Transport and Application Layers 11.1 TCP/IP Transport Layer 11.1.1 Introduction to the TCP/IP transport layer The primary duties of the transport layer are to transport and regulate

More information

Connecting to and Setting Up a Network

Connecting to and Setting Up a Network Chapter 9 Connecting to and Setting Up a Network Reviewing the Basics 1. How many bits are in a MAC address? 48 bits 2. How many bits are in an IPv4 IP address? In an IPv6 IP address? 32 bits, 128 bits

More information

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Network Security TCP/IP Refresher

Network Security TCP/IP Refresher Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)

More information

Chapter 8 Router and Network Management

Chapter 8 Router and Network Management Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by

More information

ICS 351: Today's plan. IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration

ICS 351: Today's plan. IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration ICS 351: Today's plan IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration IP address exhaustion IPv4 addresses are 32 bits long so there

More information

DOCUMENTS ON WEB OBJECTIVE QUESTIONS

DOCUMENTS ON WEB OBJECTIVE QUESTIONS MODULE 11 DOCUMENTS ON WEB OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module for

More information

Basic Network Configuration

Basic Network Configuration Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the

More information

AS/400e. TCP/IP routing and workload balancing

AS/400e. TCP/IP routing and workload balancing AS/400e TCP/IP routing and workload balancing AS/400e TCP/IP routing and workload balancing Copyright International Business Machines Corporation 2000. All rights reserved. US Government Users Restricted

More information

LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP

LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with

More information

Chapter 4 Managing Your Network

Chapter 4 Managing Your Network Chapter 4 Managing Your Network This chapter describes how to perform network management tasks with your ADSL2+ Modem Wireless Router. Backing Up, Restoring, or Erasing Your Settings The configuration

More information

Using IPM to Measure Network Performance

Using IPM to Measure Network Performance CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring

More information

Web Foundations Series Internet Business Associate

Web Foundations Series Internet Business Associate Web Foundations Series Internet Business Associate Internet Business Associate prepares students to work effectively in today's business environment. In this course, you will learn about the tasks involved

More information

What really is a Service?

What really is a Service? Internet Services What really is a Service? On internet (network of networks), computers communicate with one another. Users of one computer can access services from another. You can use many methods to

More information

Protocol Data Units and Encapsulation

Protocol Data Units and Encapsulation Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing

More information

Introduction to IPv6 and Benefits of IPv6

Introduction to IPv6 and Benefits of IPv6 Introduction to IPv6 and Benefits of IPv6 Ammar Yasir Korkusuz 2012 Bogazici University, Electrical-Electronics Engineering Department MSc. Student EE 545 TERM PROJECT Abstract: IPv6 is a new internet

More information

Version 0.1 June 2010. Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP)

Version 0.1 June 2010. Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP) Version 0.1 June 2010 Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP) Thank you for choosing the Xerox WorkCentre 7120. Table of Contents Introduction.........................................

More information

Terminology. Internet Addressing System

Terminology. Internet Addressing System Terminology A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. The defining characteristics

More information

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Networks II Agenda Introduction to networking architecture Historical

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks

More information

Objectives of Lecture. Network Architecture. Protocols. Contents

Objectives of Lecture. Network Architecture. Protocols. Contents Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking

More information

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

Configuring Network Address Translation (NAT)

Configuring Network Address Translation (NAT) 8 Configuring Network Address Translation (NAT) Contents Overview...................................................... 8-3 Translating Between an Inside and an Outside Network........... 8-3 Local and

More information

Networking Basics and Network Security

Networking Basics and Network Security Why do we need networks? Networking Basics and Network Security Shared Data and Functions Availability Performance, Load Balancing What is needed for a network? ISO 7-Layer Model Physical Connection Wired:

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Communications and Networking

Communications and Networking Communications and Networking History and Background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and

More information

Getting Started. 16-Channel VoIP Gateway Card. Model No. KX-TDA0490

Getting Started. 16-Channel VoIP Gateway Card. Model No. KX-TDA0490 16-Channel VoIP Gateway Card Getting Started Model No. KX-TDA0490 Thank you for purchasing a Panasonic 16-Channel VoIP Gateway Card. Please read this manual carefully before using this product and save

More information

architecture: what the pieces are and how they fit together names and addresses: what's your name and number?

architecture: what the pieces are and how they fit together names and addresses: what's your name and number? Communications and networking history and background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

Encapsulating Voice in IP Packets

Encapsulating Voice in IP Packets Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols

More information

Technology/Internet Usage Workshop

Technology/Internet Usage Workshop Technology/Internet Usage Workshop 1) Workshop Goals (1 st Slide) 2) Computers Desk Top (Show examples) Lap-Top Hand-held Wireless Device Introduce Tammy Welsh from Gateway 3) What is the Internet? The

More information