IP addresses. IP addresses: IPv4: 32 bits: 10.110.4.199



Similar documents
Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Connecting with Computer Science, 2e. Chapter 5 The Internet

LESSON Networking Fundamentals. Understand TCP/IP

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Lab - Observing DNS Resolution

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet

Lecture 28: Internet Protocols

Chapter 4: Networking and the Internet

Advanced Higher Computing. Computer Networks. Homework Sheets

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Basic Internet programming Formalities. Hands-on tools for internet programming

Terminology. Internet Addressing System

TCP/IP Network Essentials. Linux System Administration and IP Services

Communications and Networking

Networking Test 4 Study Guide

1 Introduction: Network Applications


Lab - Observing DNS Resolution

TCP/IP and the Internet

Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers

Glossary of Technical Terms Related to IPv6

Lecture 2. Internet: who talks with whom?

M3-R3: INTERNET AND WEB DESIGN

Computer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

The OSI and TCP/IP Models. Lesson 2

The Internet. Chapter 10. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:

Transport and Network Layer

2. Ethernet is a means of implementing which of the following network topologies?

Technical Support Information Belkin internal use only

Web Browsing Examples. How Web Browsing and HTTP Works

CMSI 182 Intro to Computer Science. Week 13 Tuesday B.J. Johnson Doolan :25 10:40

architecture: what the pieces are and how they fit together names and addresses: what's your name and number?

1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?

How To Understand The History Of The Web (Web)

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas

Computer Networks I Laboratory Exercise 1

Networking Technology Online Course Outline

TCP/IP Basis. OSI Model

Computer Networking. First, you will use the ifconfig command to retrieve the IP address of the computer you are using:

DNS Basics. DNS Basics

Using MIS 3e Chapter 6A Appendix

Cisco Configuring Commonly Used IP ACLs

Chapter 5. Data Communication And Internet Technology

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Protocol Data Units and Encapsulation

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Basic Network Configuration

School District of Springfield Township

BASIC ANALYSIS OF TCP/IP NETWORKS

Lab 1: Packet Sniffing and Wireshark

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Objectives of Lecture. Network Architecture. Protocols. Contents

Application Layer -1- Network Tools

Computer Networks CS321

Lesson 1 Quiz Certification Partners, LLC. All Rights Reserved. Version 2.0

Protocols. Packets. What's in an IP packet

Algemene Theorie en Vaardigheden 2. April 2014 Theaterschool OTT-2 1

The OSI Model and the TCP/IP Protocol Suite

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Wireshark DNS. Introduction. nslookup

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

CSE 203 Web Programming 1. Prepared by: Asst. Prof. Dr. Maryam Eskandari

COMPUTER NETWORK TECHNOLOGY (300)

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

CITS1231 Web Technologies. Client, Server, the Internet, and the Web

Linux MPS Firewall Supplement

Web Design and Development ACS-1809

Web Development. How the Web Works 3/3/2015. Clients / Server

Introduction to LAN/WAN. Application Layer (Part II)

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Network Pop Quiz 5 Brought to you by please visit our site!

idatafax Troubleshooting

Data Communication I

Network Models OSI vs. TCP/IP

Chakchai So-In, Ph.D.

Application Layer. CMPT Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Layered Architectures and Applications

Transport Layer Protocols

Connecting to and Setting Up a Network

MMGD0204 Web Application Technologies. Chapter 1 Introduction to Internet

Homework 3 TCP/IP Network Monitoring and Management

Web Development. Owen Sacco. ICS2205/ICS2230 Web Intelligence

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering

Internet Control Protocols Reading: Chapter 3

7 TRANSMISSION CONTROL PROTOCOL/ INTERNET PROTOCOL (TCP/IP)

Ethereal Lab: DNS. 1. nslookup

The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Detailed Table of Contents

CS101 Lecture 19: Internetworking. What You ll Learn Today

Product Standard General Interworking: Internet Server

Internet Concepts. What is a Network?

Transcription:

Internet domain region of Internet operated by 1 entity (university, company, etc.) domain name assigned by registrars Top-level domains.edu,.com,.dk Example: login.imada.sdu.dk imada is a subdomain IP addresses: IPv4: 32 bits: 10.110.4.199 IPv6: 128 bits: 2001:0DB8:AC10:FE01 hexadecimal (first half shown) Domain name server (DNS) Internet directory 212.97.129.250 vs. www.sdu.dk

IP addresses IP addresses: IPv4: 32 bits: 10.110.4.199 Which number base are IPv4 addresses written in? How large can a number between dots be? A. decimal, less than 256 between dots B. hexadecimal, less than 256 between dots C. decimal, less than 512 between dots D. hexadecimal, less than 512 between dots E. decimal, less than 1024 between dots Vote at m.socrative.com. Room number 415439.

IP addresses IP addresses: IPv4: 32 bits: 10.110.4.199 Which number base are IPv4 addresses written in? How large can a number between dots be? A. decimal, less than 256 between dots

Application: email Some protocols involved: SMTP sending e-mail between machines MIME make data compatible with SMTP accessing e-mail POP3 mail transferred to your own computer IMAP mail stays on mail server can access mail from other computers Try looking at full header for some email. How many intermediate machines did it go through?

Protocols Layered models abstraction to handle complexity Philosopher in Thailand Translator in Thailand Computer sending e-mail English ideas Philosopher in Denmark Translator in Denmark Computer receiving e-mail Communication protocols at layer N see virtual machine connection at layer N 1. invoke facilities at layer N 1 to transmit layer N data units.

Protocols ISO Open System Interconnection Model (OSI) vs. Internet Model TCP/IP

Protocols Internet Model TCP/IP Application ssh, sftp, HTTP, SMTP Transport converts messages to packets, orders packets TCP transmission control protocol establishes a connection before sending messages and acknowledgements example: e-mail UDP user datagram protocol no connection established example: VoIP Network IP internet protocol converts packets to datagrams assigns intermediate addresses Link transfers packets

Protocols Internet Model TCP/IP Messages sent through a path in Internet. Going from one machine to the next hop In intermediate stops for a message, only lower layers involved. Determining which application protocol should get incoming message port number 80 is HTTP

Hands-on Internet Start a command promt. (Win 8: Win-X, choose command prompt, Win 7: Search for command in start button, Ubuntu (Unity): search for terminal in Ubuntu-button (top, left), Mac OS X: search (top, right) for terminal ). Try the following commands: Show network interface info: ipconfig /all; ifconfig; /sbin/ifconfig Show active connections: netstat Contact host: ping google.com Show route to host: tracert google.com; traceroute google.com (Some must be stopped by CNTL C )

Browsers World Wide Web (WWW) for making information available. Which browser do you use most? A. Firefox B. Internet Explorer C. Chrome D. Opera E. Safari Vote at m.socrative.com. Room number 415439. No correct answer.

WWW hypertext text documents containing hyperlinks. hypermedia more than text (audio and/or video) Hypertext Transfer Protocol (HTTP) to get Web pages displayed by your browser HTTPS using SSL or TLS Transport Layer Security URL = Uniform Resource Locator address Example: http://imada.sdu.dk/ joan/intro/15slides5.pdf protocol://host with document/directory path/file (document) HTML Hypertext Markup Language can include JPEG, etc. XML more general than text standardized style organizing and making searching easy for recipes, one markup language for music another

WWW Different systems for server-side or client-side functionality. PHP, ASP, JSP for server side functionality (database operation, for example) JavaScript, Applets, Flash to run programs on client side Security problem running programs from elsewhere

Algorithms Algorithm: a well-ordered collection of unambiguous and effectively computable operations, that, when executed, produces a result in a finite amount of time.

Algorithms Algorithm: a well-ordered collection of unambiguous and effectively computable operations, that, when executed, produces a result in a finite amount of time. Examples: computing with floating point numbers compressing data executing machine code

Algorithms Algorithm: a well-ordered collection of unambiguous and effectively computable operations, that, when executed, produces a result in a finite amount of time. Examples: computing with floating point numbers compressing data executing machine code Program: representation of an algorithm Pseudocode: representation of an algorithm Process: execution of an algorithm

Algorithms Art of problem solving Polya s principles applied to algorithms: 1. Understand the problem 2. Get an idea for a possible algorithmic procedure (to solve it) 3. Formulate the algorithm and represent it as a program 4. Evaluate the program for correctness and its potential as a tool for solving other problems

Algorithms Art of problem solving Polya s principles applied to algorithms: 1. Understand the problem 2. Get an idea for a possible algorithmic procedure (to solve it) 3. Formulate the algorithm and represent it as a program 4. Evaluate the program for correctness and its potential as a tool for solving other problems Not so easy as 1 2 3 4.

Algorithms Examples: Magic trick ideas, discover they don t work with some initial cards... 3 politicians (no names) A, B, C know each other 1 always tells the truth 1 always lies 1 does some of each Ask 3 true/false questions choose whichever politician you like for whichever question determine which politician is which

Algorithm design techniques Techniques: Brute force Stepwise refinement (top-down) break into smaller and smaller problems if modular (relatively independent) parts, can program in teams software engineering

Algorithm design techniques Cute problems in textbook. Example: Step from pier into a boat Hat falls into water. River flows 2.5 miles/hour Go upstream at 4.75 miles/hour After 10 minutes discover hat missing. Turn around to travel downstream. How long before you get to the hat?

Algorithm design techniques Cute problems in textbook. Example: Step from pier into a boat Hat falls into water. River flows 2.5 miles/hour Go upstream at 4.75 miles/hour After 10 minutes discover hat missing. Turn around to travel downstream. How long before you get to the hat? Answer: 10 minutes It pays to think.

Pseudocode Pseudocode easier to read than a program syntax less important constructs from many languages work the same

Pseudocode Pseudocode easier to read than a program syntax less important constructs from many languages work the same if...then...else condition is Boolean while repeat for recursion

Pseudocode Types use consistently and clearly Incorrect example: Card := Card + n

Pseudocode Types use consistently and clearly Incorrect example: Card := Card + n Incorrect example: Suppose Card has the form (s 1, v 1 ) and 1 n 6. Must explain the general idea and what variables are used for if not obvious not what it does, but why, in if...then...else clause for example.

Sequential search Sequential search problem: Input: List of elements, TargetValue Output: success if TargetValue is in List failure if it is not in List A brute force algorithm.

Sequential search procedure Search(List, TargetValue): { Input: List is a list; TargetValue is a possible entry } { Output: success if TargetValue in List; failure otherwise } if (List empty) then Output failure else TestEntry := 1st entry in List while (TargetValue TestEntry and there are entries not considered) (TestEntry := next entry in List) if (TargetValue = TestEntry) then Output success else Output failure

Sequential search Analysis: time fundamental operation takes time number of occurrences proportional to everything else that happens

Sequential search Analysis: List = n How many comparisons are necessary in the worst case? A. 1 B. n 1 C. n D. n + 1 E. 2n Vote at m.socrative.com. Room number 415439.

Sequential search Analysis: List = n How many comparisons are necessary in the worst case? D. n + 1 This is Θ(n).