Chapter 4: Networking and the Internet

Size: px
Start display at page:

Download "Chapter 4: Networking and the Internet"

Transcription

1 Chapter 4: Networking and the Internet Computer Science: An Overview Tenth Edition by J. Glenn Brookshear Presentation files modified by Farn Wang Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

2 Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols 4.5 Security Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-2

3 Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area network (WAN) Ownership Closed versus open Topology (configuration) Bus (Ethernet) Star (Wireless networks with central Access Point) Ring (IBM FDDI) Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-3

4 Network topologies Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-4

5 Communication over a bus network Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-5

6 Network topologies (continued) Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-6

7 Protocols CSMA/CD (Carrier Sense, Multiple Access with Collision Detection) For wired communication. CSMA/CA (Carrier Sense, Multiple Access with Collision Avoidance) for wireless communication Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-7

8 Protocols CSMA/CD (Carrier Sense, Multiple Access with Collision Detection) For wired communication. Used in Ethernet Silent bus provides right to introduce new message Retry after collection detection. CSMA/CA (Carrier Sense, Multiple Access with Collision Avoidance) Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-8

9 Ethernet bus arbitration algorithm IEEE Optimistic why pessimistic? Use it and withdraw if bad things happen. Collision detection bad things 51.2 s 2.5km Bus Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

10 Ethernet bus arbitration algorithm IEEE Ethernet bus arbitration algorithm 1. If there is some signals in the bus, then stop and try later. 2. Start sending the message and monitoring the bus. 3. If in 52 s the message is corrupted, then stop and try later. 4. At the 808 th s, complete the message. Bus Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

11 Communication over a bus network through a hub computer computer computer hub computer computer Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-11

12 Protocols CSMA/CD (Carrier Sense, Multiple Access with Collision Detection) CSMA/CA (Carrier Sense, Multiple Access with Collision Avoidance) For wireless communication. Used in WiFi (IEEE ) Hidden terminal problem signal drowning or blocking difficulties in collision detection. Random stream testing before the real frames Significantly reduction in retries. may need ack from AP Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-12

13 The hidden terminal problem May block collision detection. Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-13

14 Connecting Networks Repeater: Extends a network Bridge: Connects two compatible networks Switch: Connect several compatible networks Router: Connects two incompatible networks resulting in a network of networks called an internet forwarding table Gateway: connecting a network to Internet Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-14

15 Building a large bus network from smaller ones Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-15

16 Routers connecting two WiFi networks and an Ethernet network to form an internet Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-16

17 Inter-process Communication Client-server Peer-to-peer (P2P) Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-17

18 Inter-process Communication Client-server One server, many clients Ideal for fast network access Server must execute continuously Client initiates communication For large-scale organization Win/NT, Linux, NetWare Peer-to-peer (P2P) Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-18

19 Inter-process Communication Client-server Peer-to-peer (P2P) Two processes communicating as equals Ideal for sharing resources and applications For families and small offices Peer processes can be short-lived text conversation, interactive games, file sharing could be difficult for copyright enforcing Win 98, Win 95, Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-19

20 The client/server model compared to the peer-to-peer model Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-20

21 Distributed Systems Systems with parts that run on different computers Infrastructure can be provided by standardized toolkits Example: Enterprise Java Beans from Sun Microsystems Example:.NET framework from Microsoft Example: Cloud computing Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-21

22 The Internet The Internet: An internet that spans the world Original goal was to develop a means of connecting networks that would not be disrupted by local disasters. Today it has shifted from an academic research project to a commercial undertaking. Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-22

23 Internet Architecture Internet Service Provider (ISP) sometimes means the internet. Access ISP (intranet) Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-23

24 Internet Architecture Internet Service Provider (ISP) Tier-1 very high-speed, high-capacity, international WAN Tier-2 regional, less potent Access ISP (intranet): Provides connectivity to the Internet Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-24

25 Internet Architecture Internet Service Provider (ISP) Access ISP (intranet): Provides connectivity to the Internet is essentially an independent internet. is sometimes called intranet. provides connectivity to the Internet AOL, Microsoft, local cable companies, telephone companies,. Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-25

26 Internet Architecture Internet Service Provider (ISP) Access ISP (intranet): Provides connectivity to the Internet hosts (end systems) Traditional telephone (dial up connection) Cable connections DSL (digital subscriber line) through modems Dial-up access (old tech) fiber-optic cables Wireless through AP hotspot: the range of an AP Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-26

27 Internet Composition Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-27

28 Internet Addressing IP address: pattern often represented in dotted decimal notation from 32 to 128 bits Mnemonic address: Domain names Top-Level Domains (TLD) edu, com, gov, org, info, net, The dots in Mnemonic addresses are not related to the dots in IP address. Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-28

29 Internet Addressing Domain name system (DNS) How to translate Mnemonic names to IP addresses? Name servers basically directories DNS is an Internet-wide directory system. DNS lookup Originally domain names are tied to physical regions Now individuals and small firms can also have domain presences. Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-29

30 Internet Corporation for Assigned Names & Numbers (ICANN) Allocates IP address blocks to ISPs who then assign those addresses within their regions. Oversees the registration of domains and domain names. through companies called registrars once registered, the domain organization can extend for identifiers. ntu.edu.tw subdomains for network in the domain ee.ntu.edu.tw Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-30

31 Traditional Internet Applications Electronic Mail ( ) Domain mail server collects incoming mail and transmits outing mail Mail server delivers collected incoming mail to clients via POP3 or IMAP SMTP for text mails MIME for non-ascii mails to SMTP File Transfer Protocol (FTP) Telnet and SSH Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-31

32 More Recent Applications Voice Over IP (VoIP) Internet Radio - webcasting streaming audio N-unicast burden to the sending servers and their immediate neighbors Multicast let the routers decide to send copies to destinations Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-32

33 World Wide Web Hypertext and HTTP Browser gets documents from Web server Documents uniquely identified by URLs Uniform Resource Locator Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-33

34 2013/04/13 stopped here. Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-34

35 A typical URL Uniform Resource Locator a subset of the Uniform Resource Identifier (URI) the location of an identified resource the mechanism for retrieving it. Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-35

36 Hypertext Document Format Encoded as text file Contains tags to communicate with browser Appearance <h1> to start a level one heading <p> to start a new paragraph Links to other documents and content <a href =... > Insert images <img src =... > Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-36

37 A simple Web page Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-37

38 An enhanced simple Web page Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-38

39 Extensible Markup Language (XML) XML: A language for constructing markup languages similar to HTML A descendant of SGML (Standard Generalized ML) Opens door to a World Wide Semantic Web note HTML does not strictly follow XML. XHTML does. Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-39

40 Using XML <staff clef = treble > <key>c minor</key> <time> 2/4 </time> <measure> < rest> egth </rest> <notes> egth G, egth G, egth G </notes></measure> <measure> <notes> hlf E </notes></measure> </staff> Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-40

41 Figure 4.11 The first two bars of Beethoven s Fifth Symphony Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-41

42 WWW - Client Side Versus Server Side Client-side activities Examples: java applets, javascript, Macromedia Flash Server-side activities Common Gateway Interface (CGI) Servlets: a Java class in Java EE conforms to the Java Servlet API, a protocol of Java classes to HTTP requests. PHP (personal home page) a scripting language for webpages Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-42

43 Package-shipping example Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-43

44 Internet Software Layers Application: Constructs message with address Transport: Chops message into packets Network: Handles routing through the Internet Link: Handles actual transmission of packets Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-44

45 The Internet software layers Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-45

46 Following a message through the Internet Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-46

47 TCP/IP Protocol Suite Much more than TCP and IP. Transport Layer built on top of IP networks Users can choose from different versions, e.g.: TCP (Transmission Control Protocol) UDP (User Datagram Protocol) Network Layer IP (IPv4 and IPv6) deals only with packets Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-47

48 TCP (Transmission Control Protocol) connection-oriented. deal with streams high-quality and reliable. enables two hosts to establish a connection and exchange streams of data. guarantees delivery of data guarantees that packets will be delivered in the same order in which they were sent. Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-48

49 UDP (User Datagram Protocol) very few error recovery services used primarily for broadcasting messages minimal overhead connectionless Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-49

50 Choosing between TCP and UDP Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-50

51 Security Attacks Malware viruses: inserting itself into programs already in the machine. worms: replicating and forwarding themselves Trojan horses: disguised as useful programs spyware: sniffing to collect private infor. phishing software Denial of service Spam: unwanted junk mails Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-51

52 Security Protection Firewalls: filtering traffic through a point Spam filters: a variation of firewall Proxy Servers: intermediary shielding the clients from suspicious servers. for specific services, elg., FTP, HTTP, telnet, auditing software for sudden change of system behaviors Antivirus software Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-52

53 Encryption FTPS, HTTPS, SSL (secure socket layer) Private-key Encryption Public-key Encryption Public key: Used to encrypt messages Private key: Used to decrypt messages Certificates and Digital Signatures Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-53

54 Private-key encryption key: k affine transformation modulo operand d message m 1 m 2 m n with m i [0,d), Encryption: ((m 1 +k)% d)((m 2 +k)% d) ((m n +k)%d) Decryption: c 1 c 2 c n with c i [0,d), ((c 1 -k)% d)((c 2 -k)% d) ((c n -k)% d) remainder operator Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-54

55 Private-key encryption Example: k = 5 d = 26 Encryption: S (int(s)+5)%26 = T (int(t)+5)%26 = O (int(o)+5)%26 = P (int(p)+5)%26 = X Y T U Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-55

56 Private-key encryption Drawbacks Receivers also must know the private key. No authentication Once the key is known, messages can be forged. Solution: Need a private key for each sender-receiver pair. Needs a lot of keys. Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-56

57 Public-key encryption Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-57

58 Public key encrytion RSA encryption method Ronald Rivest, Adi Shamir, Leonard Adleman 2 large primes p, q (hundreds of bits each) Ancient Chinese: incorrect! n is prime iff 2 n-1 %n = 1%n Fermat s little theorem: Given a%p 0, a p %p=a%p and a p-1 %p = 1%p Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-58

59 Public key encrytion RSA encryption method Ronald Rivest, Adi Shamir, Leonard Adleman 2 large primes p, q (hundreds of bits each) e: relative prime to (p-1)(q-1) Private key: pq Public key: d with gcd(d,e%(p-1)(q-1))=1 Encryption: c = (m e ) % (pq) Decryption: c d =((m e )%(pq)) d =m 1+k(p-1)(q-1) % (pq) = m%(pq) Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-59

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals

More information

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). 1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).

More information

2. Ethernet is a means of implementing which of the following network topologies?

2. Ethernet is a means of implementing which of the following network topologies? Test Bank Chapter Four (Networks and the Internet) Multiple Choice Questions 1. Which of the following is not a way of classifying networks? A. WAN versus LAN B. Closed versus open C. Router versus bridge

More information

CMSI 182 Intro to Computer Science. Week 13 Tuesday B.J. Johnson Doolan 222 09:25 10:40

CMSI 182 Intro to Computer Science. Week 13 Tuesday B.J. Johnson Doolan 222 09:25 10:40 CMSI 182 Intro to Computer Science Week 13 Tuesday B.J. Johnson Doolan 222 09:25 10:40 Where We Are: History Lesson We re here! I/O Peripherals Internet Architecture RAM/ROM Applications O/S Programs Languages

More information

Connecting with Computer Science, 2e. Chapter 5 The Internet

Connecting with Computer Science, 2e. Chapter 5 The Internet Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar

More information

Advanced Higher Computing. Computer Networks. Homework Sheets

Advanced Higher Computing. Computer Networks. Homework Sheets Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and

More information

Basic Internet programming Formalities. Hands-on tools for internet programming

Basic Internet programming Formalities. Hands-on tools for internet programming Welcome Basic Internet programming Formalities Hands-on tools for internet programming DD1335 (gruint10) Serafim Dahl serafim@nada.kth.se DD1335 (Lecture 1) Basic Internet Programming Spring 2010 1 / 23

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d.

The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d. C H A P T E R 7 The Internet, Intranets, and Extranets What is the Internet Millions of computers, all linked together on a computer network. A home computer usually links to the Internet using a phone

More information

Detailed Table of Contents

Detailed Table of Contents Detailed Table of Contents Foreword Preface 1. Networking Protocols and OSI Model 1 1.1 Protocols in Computer Communications 3 1.2 The OSI Model 7 1.3 OSI Layer Functions 11 Summary 19 Key Terms and Concepts

More information

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

Internet Concepts. What is a Network?

Internet Concepts. What is a Network? Internet Concepts Network, Protocol Client/server model TCP/IP Internet Addressing Development of the Global Internet Autumn 2004 Trinity College, Dublin 1 What is a Network? A group of two or more devices,

More information

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006 Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which

More information

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY) E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system

More information

ICTTEN8195B Evaluate and apply network security

ICTTEN8195B Evaluate and apply network security ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

IP addresses. IP addresses: IPv4: 32 bits: 10.110.4.199

IP addresses. IP addresses: IPv4: 32 bits: 10.110.4.199 Internet domain region of Internet operated by 1 entity (university, company, etc.) domain name assigned by registrars Top-level domains.edu,.com,.dk Example: login.imada.sdu.dk imada is a subdomain IP

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET 3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs

More information

Kick starting science...

Kick starting science... Computer ing (TDDD63): Part 1 Kick starting science... Niklas Carlsson, Associate Professor http://www.ida.liu.se/~nikca/ What do you have in the future? What do you have in the future? How does it keep

More information

CHAPTER 9: THE EVOLVING INTERNET

CHAPTER 9: THE EVOLVING INTERNET CHAPTER 9: THE EVOLVING INTERNET Multiple Choice: 1. What was the department of the U.S. government that developed the initial stages of the Internet? A. Department of Commerce B. Department of Defense

More information

The Internet. Chapter 10. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:

The Internet. Chapter 10. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to: The Internet Chapter 10 Learning Objectives After reading this chapter, you should be able to: Discuss the responsibilities of the Internet Protocol (IP) and how IP can be used to create a connection between

More information

Introduction to computer networks and Cloud Computing

Introduction to computer networks and Cloud Computing Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication

More information

Mathatma Gandhi University

Mathatma Gandhi University Mathatma Gandhi University BSc Computer Science IV th semester BCS 402 Computer Network &Internet MULTIPLE CHOICE QUESTIONS 1. The computer network is A) Network computer with cable B) Network computer

More information

Networks. Connecting Computers. Measures for connection speed. Ethernet. Collision detection. Ethernet protocol

Networks. Connecting Computers. Measures for connection speed. Ethernet. Collision detection. Ethernet protocol Connecting Computers Networks Computers use networks to communicate like people use telephones or the postal service Requires either some sort of cable point-to-point links connect exactly 2 computers

More information

Lecture 28: Internet Protocols

Lecture 28: Internet Protocols Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further

More information

Overview of Computer Networks

Overview of Computer Networks Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

More information

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0 CCNA 1: Networking Basics Cisco Networking Academy Program Version 3.0 Table of Contents CCNA 1: NETWORKING BASICS...1 TARGET AUDIENCE...3 PREREQUISITES...3 COURSE DESCRIPTION...3 COURSE OBJECTIVES...3

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

COMPUTER NETWORK TECHNOLOGY (300)

COMPUTER NETWORK TECHNOLOGY (300) Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant

More information

Technical Glossary from Frontier

Technical Glossary from Frontier Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to

More information

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human

More information

Introduction to Computer Networks

Introduction to Computer Networks Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,

More information

Study Guide CompTIA A+ Certification, Domain 2 Networking

Study Guide CompTIA A+ Certification, Domain 2 Networking Study Guide CompTIA A+ Certification, Domain 2 Networking Brought to you by RMRoberts.com Introduction to CSR Domain - 2 (220-801) The CompTIA A+ 220-801 Domain 2 Networking has expanded a lot since the

More information

Networking Basics and Network Security

Networking Basics and Network Security Why do we need networks? Networking Basics and Network Security Shared Data and Functions Availability Performance, Load Balancing What is needed for a network? ISO 7-Layer Model Physical Connection Wired:

More information

Communications and Networking

Communications and Networking Communications and Networking History and Background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and

More information

TCP/IP Basis. OSI Model

TCP/IP Basis. OSI Model TCP/IP Basis 高 雄 大 學 資 訊 工 程 學 系 嚴 力 行 Source OSI Model Destination Application Presentation Session Transport Network Data-Link Physical ENCAPSULATION DATA SEGMENT PACKET FRAME BITS 0101010101010101010

More information

Using MIS 3e Chapter 6A Appendix

Using MIS 3e Chapter 6A Appendix Study Questions Using MIS 3e Chapter 6A Appendix How the Internet Works David Kroenke Q1: How does email travel? Q2: What is a communications protocol? Q3: What are the functions of the five TCP/IP-OSI

More information

Web Hosting & Maintenance

Web Hosting & Maintenance The Further Education and Training Awards Council (FETAC) was set up as a statutory body on 11 June 2001 by the Minister for Education and Science. Under the Qualifications (Education & Training) Act,

More information

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server

More information

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

Course Description and Outline. IT Essential II: Network Operating Systems V2.0 Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs

More information

How To Understand And Understand Network Theory

How To Understand And Understand Network Theory University of Southern California Course Title: EE450: Computer Networks Semester: Fall Semester 2014 Instructor: Professor A. Zahid, azahid@usc.edu Office: PHE 418, 213-740-9058 Office Hours: TTH 9:00

More information

CSCI 362 Computer and Network Security

CSCI 362 Computer and Network Security The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,

More information

CompTIA Network+ (Exam N10-005)

CompTIA Network+ (Exam N10-005) CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

Computer Networks Vs. Distributed Systems

Computer Networks Vs. Distributed Systems Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require

More information

architecture: what the pieces are and how they fit together names and addresses: what's your name and number?

architecture: what the pieces are and how they fit together names and addresses: what's your name and number? Communications and networking history and background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and

More information

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01 JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment

More information

Internet Privacy Options

Internet Privacy Options 2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms

More information

Web Foundations Series Internet Business Associate

Web Foundations Series Internet Business Associate Web Foundations Series Internet Business Associate Internet Business Associate prepares students to work effectively in today's business environment. In this course, you will learn about the tasks involved

More information

Networking Technology Online Course Outline

Networking Technology Online Course Outline Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

IT4504 - Data Communication and Networks (Optional)

IT4504 - Data Communication and Networks (Optional) - Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett Network Security Internet not originally designed with (much) security in mind original vision: a group of mutually trusting users attached to a transparent network Security considerations in all layers!

More information

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: victorkleo@live.com ABSTRACT Internet security

More information

Network Models and Protocols

Network Models and Protocols 669-5ch01.fm Page 1 Friday, April 12, 2002 2:01 PM C H A P T E R Network Models and Protocols 1 EXAM OBJECTIVES 1.1 Layered Network Models 1.2 The Layers of the TCP/IP 5-Layer Model 1.3 Network Protocols

More information

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

More information

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0 EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

More information

Computer Networks & Security 2014/2015

Computer Networks & Security 2014/2015 Computer Networks & Security 2014/2015 IP Protocol Stack & Application Layer (02a) Security and Embedded Networked Systems time Protocols A human analogy All Internet communication is governed by protocols!

More information

Layered protocol (service) architecture

Layered protocol (service) architecture Layered protocol (service) architecture The Internet is complex! many pieces : hosts access network routers links of various media applications protocols Question: Is there any hope of organizing a structure

More information

Fundamentals of the Internet 2009/10. 1. Explain meaning the following networking terminologies:

Fundamentals of the Internet 2009/10. 1. Explain meaning the following networking terminologies: Fundamentals of Internet Tutorial Questions (2009) 1. Explain meaning the following networking terminologies: Client/server networking, Coax, twisted pair, protocol, Bit, Byte, Kbps, KBps, MB, KB, MBps,

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

Network Technology CMP-354-TE. TECEP Test Description

Network Technology CMP-354-TE. TECEP Test Description Network Technology CMP-354-TE This TECEP tests knowledge of the fundamental concepts of data communications. Topics covered include: network architectures, topologies, media and devices, protocols, types

More information

Telecommunications, the Internet, and Wireless Technology

Telecommunications, the Internet, and Wireless Technology Chapter 6 Telecommunications, the Internet, and Wireless Technology 6.1 Copyright 2011 Pearson Education, Inc. STUDENT LEARNING OBJECTIVES What are the principal components of telecommunications networks

More information

TCP/IP and the Internet

TCP/IP and the Internet TCP/IP and the Internet Computer networking today is becoming more and more entwined with the internet. By far the most popular protocol set in use is TCP/IP (Transmission Control Protocol/Internet Protocol).

More information

Data Communication Networks Introduction

Data Communication Networks Introduction Data Communication Networks Introduction M. R. Pakravan Department of Electrical Engineering Sharif University of Technology Data Networks 1 Introduction The course introduces the underlying concepts and

More information

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network) 1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet

More information

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking. Chapter 8: Computer Networking AIMS The aim of this chapter is to give a brief introduction to computer networking. OBJECTIVES At the end of this chapter you should be able to: Explain the following terms:

More information

Network System Design Lesson Objectives

Network System Design Lesson Objectives Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network

More information

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department

More information

The OSI and TCP/IP Models. Lesson 2

The OSI and TCP/IP Models. Lesson 2 The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP

More information

M3-R3: INTERNET AND WEB DESIGN

M3-R3: INTERNET AND WEB DESIGN M3-R3: INTERNET AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF ANSWER

More information

Multi-Homing Dual WAN Firewall Router

Multi-Homing Dual WAN Firewall Router Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet

More information

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person

More information

DNS Basics. DNS Basics

DNS Basics. DNS Basics DNS Basics 1 A quick introduction to the Domain Name System (DNS). Shows the basic purpose of DNS, hierarchy of domain names, and an example of how the DNS protocol is used. There are many details of DNS

More information

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill Computer Networks A Top-Down Approach Behrouz A. Forouzan and Firouz Mosharraf \Connect Mc \ Learn Graw I Succeed* Hill Preface xvii Trademarks xxiii Chapter 1 Introduction 1 1.1 OVERVIEW OF THE INTERNET

More information

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers.

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers. Name: 1. What is an Enterprise network and how does it differ from a WAN? 2.,,,, and are key services that ISPs can provide to all customers. 3. Describe in detail what a managed service that an ISP might

More information

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts Competency: General Network Terminology and Concepts 1. Demonstrate knowledge of the purposes, benefits, and risks for installing a network. 2. Identify types of networks (e.g., LAN, WAN, MAN) and their

More information

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall VPN Router. Quick Installation Guide M73-APO09-380 Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking Learning Objectives Upon completion of this chapter, you should be able to: Describe the

More information

COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES

COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES Answers to End-of-Chapter Questions Matching g 1. router o 2. node i 3. ring l 4. hub c 5. star n 6. backbone b 7. latency

More information

Local Area Networks (LANs) Blueprint (May 2012 Release)

Local Area Networks (LANs) Blueprint (May 2012 Release) Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the

More information

CITS1231 Web Technologies. Client, Server, the Internet, and the Web

CITS1231 Web Technologies. Client, Server, the Internet, and the Web CITS1231 Web Technologies Client, Server, the Internet, and the Web Topic Outline How does the Internet work Client Server Architecture Connections Communications Protocols Addressing Routing One of the

More information

CISC 1600 Introduction to Multi-media Computing

CISC 1600 Introduction to Multi-media Computing CISC 1600 Introduction to Multi-media Computing Spring 2012 Instructor : J. Raphael Email Address: Course Page: Class Hours: raphael@sci.brooklyn.cuny.edu http://www.sci.brooklyn.cuny.edu/~raphael/cisc1600.html

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION Multiple Choice: 1. A basic computer network can be described as: A. a minimum of five computers linked together. B. a number of palmtop computers. C. two

More information

This Lecture. The Internet and Sockets. The Start 1969. If everyone just sends a small packet of data, they can all use the line at the same.

This Lecture. The Internet and Sockets. The Start 1969. If everyone just sends a small packet of data, they can all use the line at the same. This Lecture The Internet and Sockets Computer Security Tom Chothia How the Internet works. Some History TCP/IP Some useful network tools: Nmap, WireShark Some common attacks: The attacker controls the

More information

Computer Networks and the Internet

Computer Networks and the Internet ? Computer the IMT2431 - Data Communication and Network Security January 7, 2008 ? Teachers are Lasse Øverlier and http://www.hig.no/~erikh Lectures and Lab in A126/A115 Course webpage http://www.hig.no/imt/in/emnesider/imt2431

More information

SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet

SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet SWE 444 Internet and Web Application Development Introduction to Web Technology Dr. Ahmed Youssef Internet It is a network of networks connected and communicating using TCP/IP communication protocol 2

More information

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information