Chapter 4: Networking and the Internet
|
|
- Cody McGee
- 7 years ago
- Views:
Transcription
1 Chapter 4: Networking and the Internet Computer Science: An Overview Tenth Edition by J. Glenn Brookshear Presentation files modified by Farn Wang Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
2 Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols 4.5 Security Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-2
3 Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area network (WAN) Ownership Closed versus open Topology (configuration) Bus (Ethernet) Star (Wireless networks with central Access Point) Ring (IBM FDDI) Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-3
4 Network topologies Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-4
5 Communication over a bus network Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-5
6 Network topologies (continued) Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-6
7 Protocols CSMA/CD (Carrier Sense, Multiple Access with Collision Detection) For wired communication. CSMA/CA (Carrier Sense, Multiple Access with Collision Avoidance) for wireless communication Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-7
8 Protocols CSMA/CD (Carrier Sense, Multiple Access with Collision Detection) For wired communication. Used in Ethernet Silent bus provides right to introduce new message Retry after collection detection. CSMA/CA (Carrier Sense, Multiple Access with Collision Avoidance) Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-8
9 Ethernet bus arbitration algorithm IEEE Optimistic why pessimistic? Use it and withdraw if bad things happen. Collision detection bad things 51.2 s 2.5km Bus Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
10 Ethernet bus arbitration algorithm IEEE Ethernet bus arbitration algorithm 1. If there is some signals in the bus, then stop and try later. 2. Start sending the message and monitoring the bus. 3. If in 52 s the message is corrupted, then stop and try later. 4. At the 808 th s, complete the message. Bus Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
11 Communication over a bus network through a hub computer computer computer hub computer computer Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-11
12 Protocols CSMA/CD (Carrier Sense, Multiple Access with Collision Detection) CSMA/CA (Carrier Sense, Multiple Access with Collision Avoidance) For wireless communication. Used in WiFi (IEEE ) Hidden terminal problem signal drowning or blocking difficulties in collision detection. Random stream testing before the real frames Significantly reduction in retries. may need ack from AP Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-12
13 The hidden terminal problem May block collision detection. Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-13
14 Connecting Networks Repeater: Extends a network Bridge: Connects two compatible networks Switch: Connect several compatible networks Router: Connects two incompatible networks resulting in a network of networks called an internet forwarding table Gateway: connecting a network to Internet Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-14
15 Building a large bus network from smaller ones Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-15
16 Routers connecting two WiFi networks and an Ethernet network to form an internet Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-16
17 Inter-process Communication Client-server Peer-to-peer (P2P) Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-17
18 Inter-process Communication Client-server One server, many clients Ideal for fast network access Server must execute continuously Client initiates communication For large-scale organization Win/NT, Linux, NetWare Peer-to-peer (P2P) Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-18
19 Inter-process Communication Client-server Peer-to-peer (P2P) Two processes communicating as equals Ideal for sharing resources and applications For families and small offices Peer processes can be short-lived text conversation, interactive games, file sharing could be difficult for copyright enforcing Win 98, Win 95, Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-19
20 The client/server model compared to the peer-to-peer model Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-20
21 Distributed Systems Systems with parts that run on different computers Infrastructure can be provided by standardized toolkits Example: Enterprise Java Beans from Sun Microsystems Example:.NET framework from Microsoft Example: Cloud computing Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-21
22 The Internet The Internet: An internet that spans the world Original goal was to develop a means of connecting networks that would not be disrupted by local disasters. Today it has shifted from an academic research project to a commercial undertaking. Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-22
23 Internet Architecture Internet Service Provider (ISP) sometimes means the internet. Access ISP (intranet) Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-23
24 Internet Architecture Internet Service Provider (ISP) Tier-1 very high-speed, high-capacity, international WAN Tier-2 regional, less potent Access ISP (intranet): Provides connectivity to the Internet Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-24
25 Internet Architecture Internet Service Provider (ISP) Access ISP (intranet): Provides connectivity to the Internet is essentially an independent internet. is sometimes called intranet. provides connectivity to the Internet AOL, Microsoft, local cable companies, telephone companies,. Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-25
26 Internet Architecture Internet Service Provider (ISP) Access ISP (intranet): Provides connectivity to the Internet hosts (end systems) Traditional telephone (dial up connection) Cable connections DSL (digital subscriber line) through modems Dial-up access (old tech) fiber-optic cables Wireless through AP hotspot: the range of an AP Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-26
27 Internet Composition Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-27
28 Internet Addressing IP address: pattern often represented in dotted decimal notation from 32 to 128 bits Mnemonic address: Domain names Top-Level Domains (TLD) edu, com, gov, org, info, net, The dots in Mnemonic addresses are not related to the dots in IP address. Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-28
29 Internet Addressing Domain name system (DNS) How to translate Mnemonic names to IP addresses? Name servers basically directories DNS is an Internet-wide directory system. DNS lookup Originally domain names are tied to physical regions Now individuals and small firms can also have domain presences. Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-29
30 Internet Corporation for Assigned Names & Numbers (ICANN) Allocates IP address blocks to ISPs who then assign those addresses within their regions. Oversees the registration of domains and domain names. through companies called registrars once registered, the domain organization can extend for identifiers. ntu.edu.tw subdomains for network in the domain ee.ntu.edu.tw Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-30
31 Traditional Internet Applications Electronic Mail ( ) Domain mail server collects incoming mail and transmits outing mail Mail server delivers collected incoming mail to clients via POP3 or IMAP SMTP for text mails MIME for non-ascii mails to SMTP File Transfer Protocol (FTP) Telnet and SSH Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-31
32 More Recent Applications Voice Over IP (VoIP) Internet Radio - webcasting streaming audio N-unicast burden to the sending servers and their immediate neighbors Multicast let the routers decide to send copies to destinations Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-32
33 World Wide Web Hypertext and HTTP Browser gets documents from Web server Documents uniquely identified by URLs Uniform Resource Locator Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-33
34 2013/04/13 stopped here. Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-34
35 A typical URL Uniform Resource Locator a subset of the Uniform Resource Identifier (URI) the location of an identified resource the mechanism for retrieving it. Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-35
36 Hypertext Document Format Encoded as text file Contains tags to communicate with browser Appearance <h1> to start a level one heading <p> to start a new paragraph Links to other documents and content <a href =... > Insert images <img src =... > Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-36
37 A simple Web page Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-37
38 An enhanced simple Web page Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-38
39 Extensible Markup Language (XML) XML: A language for constructing markup languages similar to HTML A descendant of SGML (Standard Generalized ML) Opens door to a World Wide Semantic Web note HTML does not strictly follow XML. XHTML does. Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-39
40 Using XML <staff clef = treble > <key>c minor</key> <time> 2/4 </time> <measure> < rest> egth </rest> <notes> egth G, egth G, egth G </notes></measure> <measure> <notes> hlf E </notes></measure> </staff> Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-40
41 Figure 4.11 The first two bars of Beethoven s Fifth Symphony Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-41
42 WWW - Client Side Versus Server Side Client-side activities Examples: java applets, javascript, Macromedia Flash Server-side activities Common Gateway Interface (CGI) Servlets: a Java class in Java EE conforms to the Java Servlet API, a protocol of Java classes to HTTP requests. PHP (personal home page) a scripting language for webpages Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-42
43 Package-shipping example Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-43
44 Internet Software Layers Application: Constructs message with address Transport: Chops message into packets Network: Handles routing through the Internet Link: Handles actual transmission of packets Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-44
45 The Internet software layers Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-45
46 Following a message through the Internet Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-46
47 TCP/IP Protocol Suite Much more than TCP and IP. Transport Layer built on top of IP networks Users can choose from different versions, e.g.: TCP (Transmission Control Protocol) UDP (User Datagram Protocol) Network Layer IP (IPv4 and IPv6) deals only with packets Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-47
48 TCP (Transmission Control Protocol) connection-oriented. deal with streams high-quality and reliable. enables two hosts to establish a connection and exchange streams of data. guarantees delivery of data guarantees that packets will be delivered in the same order in which they were sent. Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-48
49 UDP (User Datagram Protocol) very few error recovery services used primarily for broadcasting messages minimal overhead connectionless Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-49
50 Choosing between TCP and UDP Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-50
51 Security Attacks Malware viruses: inserting itself into programs already in the machine. worms: replicating and forwarding themselves Trojan horses: disguised as useful programs spyware: sniffing to collect private infor. phishing software Denial of service Spam: unwanted junk mails Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-51
52 Security Protection Firewalls: filtering traffic through a point Spam filters: a variation of firewall Proxy Servers: intermediary shielding the clients from suspicious servers. for specific services, elg., FTP, HTTP, telnet, auditing software for sudden change of system behaviors Antivirus software Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-52
53 Encryption FTPS, HTTPS, SSL (secure socket layer) Private-key Encryption Public-key Encryption Public key: Used to encrypt messages Private key: Used to decrypt messages Certificates and Digital Signatures Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-53
54 Private-key encryption key: k affine transformation modulo operand d message m 1 m 2 m n with m i [0,d), Encryption: ((m 1 +k)% d)((m 2 +k)% d) ((m n +k)%d) Decryption: c 1 c 2 c n with c i [0,d), ((c 1 -k)% d)((c 2 -k)% d) ((c n -k)% d) remainder operator Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-54
55 Private-key encryption Example: k = 5 d = 26 Encryption: S (int(s)+5)%26 = T (int(t)+5)%26 = O (int(o)+5)%26 = P (int(p)+5)%26 = X Y T U Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-55
56 Private-key encryption Drawbacks Receivers also must know the private key. No authentication Once the key is known, messages can be forged. Solution: Need a private key for each sender-receiver pair. Needs a lot of keys. Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-56
57 Public-key encryption Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-57
58 Public key encrytion RSA encryption method Ronald Rivest, Adi Shamir, Leonard Adleman 2 large primes p, q (hundreds of bits each) Ancient Chinese: incorrect! n is prime iff 2 n-1 %n = 1%n Fermat s little theorem: Given a%p 0, a p %p=a%p and a p-1 %p = 1%p Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-58
59 Public key encrytion RSA encryption method Ronald Rivest, Adi Shamir, Leonard Adleman 2 large primes p, q (hundreds of bits each) e: relative prime to (p-1)(q-1) Private key: pq Public key: d with gcd(d,e%(p-1)(q-1))=1 Encryption: c = (m e ) % (pq) Decryption: c d =((m e )%(pq)) d =m 1+k(p-1)(q-1) % (pq) = m%(pq) Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-59
Chapter 4: Networking and the Internet
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals
More informationNetwork: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).
1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).
More information2. Ethernet is a means of implementing which of the following network topologies?
Test Bank Chapter Four (Networks and the Internet) Multiple Choice Questions 1. Which of the following is not a way of classifying networks? A. WAN versus LAN B. Closed versus open C. Router versus bridge
More informationCMSI 182 Intro to Computer Science. Week 13 Tuesday B.J. Johnson Doolan 222 09:25 10:40
CMSI 182 Intro to Computer Science Week 13 Tuesday B.J. Johnson Doolan 222 09:25 10:40 Where We Are: History Lesson We re here! I/O Peripherals Internet Architecture RAM/ROM Applications O/S Programs Languages
More informationConnecting with Computer Science, 2e. Chapter 5 The Internet
Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar
More informationAdvanced Higher Computing. Computer Networks. Homework Sheets
Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationOct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols
E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and
More informationBasic Internet programming Formalities. Hands-on tools for internet programming
Welcome Basic Internet programming Formalities Hands-on tools for internet programming DD1335 (gruint10) Serafim Dahl serafim@nada.kth.se DD1335 (Lecture 1) Basic Internet Programming Spring 2010 1 / 23
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationThe Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d.
C H A P T E R 7 The Internet, Intranets, and Extranets What is the Internet Millions of computers, all linked together on a computer network. A home computer usually links to the Internet using a phone
More informationDetailed Table of Contents
Detailed Table of Contents Foreword Preface 1. Networking Protocols and OSI Model 1 1.1 Protocols in Computer Communications 3 1.2 The OSI Model 7 1.3 OSI Layer Functions 11 Summary 19 Key Terms and Concepts
More informationChapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition
Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts
More information1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
More informationInternet Concepts. What is a Network?
Internet Concepts Network, Protocol Client/server model TCP/IP Internet Addressing Development of the Global Internet Autumn 2004 Trinity College, Dublin 1 What is a Network? A group of two or more devices,
More informationCore Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006
Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which
More informationE-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
More informationICTTEN8195B Evaluate and apply network security
ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated
More informationBasic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
More informationIP addresses. IP addresses: IPv4: 32 bits: 10.110.4.199
Internet domain region of Internet operated by 1 entity (university, company, etc.) domain name assigned by registrars Top-level domains.edu,.com,.dk Example: login.imada.sdu.dk imada is a subdomain IP
More informationVPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu
VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More information3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs
More informationKick starting science...
Computer ing (TDDD63): Part 1 Kick starting science... Niklas Carlsson, Associate Professor http://www.ida.liu.se/~nikca/ What do you have in the future? What do you have in the future? How does it keep
More informationCHAPTER 9: THE EVOLVING INTERNET
CHAPTER 9: THE EVOLVING INTERNET Multiple Choice: 1. What was the department of the U.S. government that developed the initial stages of the Internet? A. Department of Commerce B. Department of Defense
More informationThe Internet. Chapter 10. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:
The Internet Chapter 10 Learning Objectives After reading this chapter, you should be able to: Discuss the responsibilities of the Internet Protocol (IP) and how IP can be used to create a connection between
More informationIntroduction to computer networks and Cloud Computing
Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication
More informationMathatma Gandhi University
Mathatma Gandhi University BSc Computer Science IV th semester BCS 402 Computer Network &Internet MULTIPLE CHOICE QUESTIONS 1. The computer network is A) Network computer with cable B) Network computer
More informationNetworks. Connecting Computers. Measures for connection speed. Ethernet. Collision detection. Ethernet protocol
Connecting Computers Networks Computers use networks to communicate like people use telephones or the postal service Requires either some sort of cable point-to-point links connect exactly 2 computers
More informationLecture 28: Internet Protocols
Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further
More informationOverview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
More informationCCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0
CCNA 1: Networking Basics Cisco Networking Academy Program Version 3.0 Table of Contents CCNA 1: NETWORKING BASICS...1 TARGET AUDIENCE...3 PREREQUISITES...3 COURSE DESCRIPTION...3 COURSE OBJECTIVES...3
More informationSonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
More informationTechnical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
More informationCOMPUTER NETWORK TECHNOLOGY (300)
Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant
More informationTechnical Glossary from Frontier
Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to
More informationCS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
More informationIntroduction to Computer Networks
Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,
More informationStudy Guide CompTIA A+ Certification, Domain 2 Networking
Study Guide CompTIA A+ Certification, Domain 2 Networking Brought to you by RMRoberts.com Introduction to CSR Domain - 2 (220-801) The CompTIA A+ 220-801 Domain 2 Networking has expanded a lot since the
More informationNetworking Basics and Network Security
Why do we need networks? Networking Basics and Network Security Shared Data and Functions Availability Performance, Load Balancing What is needed for a network? ISO 7-Layer Model Physical Connection Wired:
More informationCommunications and Networking
Communications and Networking History and Background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and
More informationTCP/IP Basis. OSI Model
TCP/IP Basis 高 雄 大 學 資 訊 工 程 學 系 嚴 力 行 Source OSI Model Destination Application Presentation Session Transport Network Data-Link Physical ENCAPSULATION DATA SEGMENT PACKET FRAME BITS 0101010101010101010
More informationUsing MIS 3e Chapter 6A Appendix
Study Questions Using MIS 3e Chapter 6A Appendix How the Internet Works David Kroenke Q1: How does email travel? Q2: What is a communications protocol? Q3: What are the functions of the five TCP/IP-OSI
More informationWeb Hosting & Maintenance
The Further Education and Training Awards Council (FETAC) was set up as a statutory body on 11 June 2001 by the Minister for Education and Science. Under the Qualifications (Education & Training) Act,
More informationWhat You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals
What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server
More informationCourse Description and Outline. IT Essential II: Network Operating Systems V2.0
Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs
More informationHow To Understand And Understand Network Theory
University of Southern California Course Title: EE450: Computer Networks Semester: Fall Semester 2014 Instructor: Professor A. Zahid, azahid@usc.edu Office: PHE 418, 213-740-9058 Office Hours: TTH 9:00
More informationCSCI 362 Computer and Network Security
The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,
More informationCompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
More informationComputer Networks Vs. Distributed Systems
Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require
More informationarchitecture: what the pieces are and how they fit together names and addresses: what's your name and number?
Communications and networking history and background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and
More informationJOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment
More informationInternet Privacy Options
2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms
More informationWeb Foundations Series Internet Business Associate
Web Foundations Series Internet Business Associate Internet Business Associate prepares students to work effectively in today's business environment. In this course, you will learn about the tasks involved
More informationNetworking Technology Online Course Outline
Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course
More informationIT4405 Computer Networks (Compulsory)
IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and
More informationIT4504 - Data Communication and Networks (Optional)
- Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication
More informationIntroduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
More informationNetwork Security. Vorlesung Kommunikation und Netze SS 10 E. Nett
Network Security Internet not originally designed with (much) security in mind original vision: a group of mutually trusting users attached to a transparent network Security considerations in all layers!
More informationINTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: victorkleo@live.com ABSTRACT Internet security
More informationNetwork Models and Protocols
669-5ch01.fm Page 1 Friday, April 12, 2002 2:01 PM C H A P T E R Network Models and Protocols 1 EXAM OBJECTIVES 1.1 Layered Network Models 1.2 The Layers of the TCP/IP 5-Layer Model 1.3 Network Protocols
More information1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network
Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server
More informationEUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
More informationComputer Networks & Security 2014/2015
Computer Networks & Security 2014/2015 IP Protocol Stack & Application Layer (02a) Security and Embedded Networked Systems time Protocols A human analogy All Internet communication is governed by protocols!
More informationLayered protocol (service) architecture
Layered protocol (service) architecture The Internet is complex! many pieces : hosts access network routers links of various media applications protocols Question: Is there any hope of organizing a structure
More informationFundamentals of the Internet 2009/10. 1. Explain meaning the following networking terminologies:
Fundamentals of Internet Tutorial Questions (2009) 1. Explain meaning the following networking terminologies: Client/server networking, Coax, twisted pair, protocol, Bit, Byte, Kbps, KBps, MB, KB, MBps,
More informationCSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
More informationNetwork Technology CMP-354-TE. TECEP Test Description
Network Technology CMP-354-TE This TECEP tests knowledge of the fundamental concepts of data communications. Topics covered include: network architectures, topologies, media and devices, protocols, types
More informationTelecommunications, the Internet, and Wireless Technology
Chapter 6 Telecommunications, the Internet, and Wireless Technology 6.1 Copyright 2011 Pearson Education, Inc. STUDENT LEARNING OBJECTIVES What are the principal components of telecommunications networks
More informationTCP/IP and the Internet
TCP/IP and the Internet Computer networking today is becoming more and more entwined with the internet. By far the most popular protocol set in use is TCP/IP (Transmission Control Protocol/Internet Protocol).
More informationData Communication Networks Introduction
Data Communication Networks Introduction M. R. Pakravan Department of Electrical Engineering Sharif University of Technology Data Networks 1 Introduction The course introduces the underlying concepts and
More informationHow To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)
1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet
More informationChapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.
Chapter 8: Computer Networking AIMS The aim of this chapter is to give a brief introduction to computer networking. OBJECTIVES At the end of this chapter you should be able to: Explain the following terms:
More informationNetwork System Design Lesson Objectives
Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network
More information2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring
2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department
More informationThe OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
More informationM3-R3: INTERNET AND WEB DESIGN
M3-R3: INTERNET AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF ANSWER
More informationMulti-Homing Dual WAN Firewall Router
Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet
More informationThe following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.
Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person
More informationDNS Basics. DNS Basics
DNS Basics 1 A quick introduction to the Domain Name System (DNS). Shows the basic purpose of DNS, hierarchy of domain names, and an example of how the DNS protocol is used. There are many details of DNS
More informationComputer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill
Computer Networks A Top-Down Approach Behrouz A. Forouzan and Firouz Mosharraf \Connect Mc \ Learn Graw I Succeed* Hill Preface xvii Trademarks xxiii Chapter 1 Introduction 1 1.1 OVERVIEW OF THE INTERNET
More informationCape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers.
Name: 1. What is an Enterprise network and how does it differ from a WAN? 2.,,,, and are key services that ISPs can provide to all customers. 3. Describe in detail what a managed service that an ISP might
More informationFBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts
Competency: General Network Terminology and Concepts 1. Demonstrate knowledge of the purposes, benefits, and risks for installing a network. 2. Identify types of networks (e.g., LAN, WAN, MAN) and their
More informationFirewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
More informationFIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking Learning Objectives Upon completion of this chapter, you should be able to: Describe the
More informationCOMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES
COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES Answers to End-of-Chapter Questions Matching g 1. router o 2. node i 3. ring l 4. hub c 5. star n 6. backbone b 7. latency
More informationLocal Area Networks (LANs) Blueprint (May 2012 Release)
Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the
More informationCITS1231 Web Technologies. Client, Server, the Internet, and the Web
CITS1231 Web Technologies Client, Server, the Internet, and the Web Topic Outline How does the Internet work Client Server Architecture Connections Communications Protocols Addressing Routing One of the
More informationCISC 1600 Introduction to Multi-media Computing
CISC 1600 Introduction to Multi-media Computing Spring 2012 Instructor : J. Raphael Email Address: Course Page: Class Hours: raphael@sci.brooklyn.cuny.edu http://www.sci.brooklyn.cuny.edu/~raphael/cisc1600.html
More informationProtocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
More informationCHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION
CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION Multiple Choice: 1. A basic computer network can be described as: A. a minimum of five computers linked together. B. a number of palmtop computers. C. two
More informationThis Lecture. The Internet and Sockets. The Start 1969. If everyone just sends a small packet of data, they can all use the line at the same.
This Lecture The Internet and Sockets Computer Security Tom Chothia How the Internet works. Some History TCP/IP Some useful network tools: Nmap, WireShark Some common attacks: The attacker controls the
More informationComputer Networks and the Internet
? Computer the IMT2431 - Data Communication and Network Security January 7, 2008 ? Teachers are Lasse Øverlier and http://www.hig.no/~erikh Lectures and Lab in A126/A115 Course webpage http://www.hig.no/imt/in/emnesider/imt2431
More informationSWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet
SWE 444 Internet and Web Application Development Introduction to Web Technology Dr. Ahmed Youssef Internet It is a network of networks connected and communicating using TCP/IP communication protocol 2
More informationLecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
More informationA host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
More informationNote! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
More informationSSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
More informationIP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
More information