NETWORKING AND THE INTERNET

Similar documents
Chapter 4: Networking and the Internet

2. Ethernet is a means of implementing which of the following network topologies?

Internet Concepts. What is a Network?

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers.

CMSI 182 Intro to Computer Science. Week 13 Tuesday B.J. Johnson Doolan :25 10:40

Lecture 28: Internet Protocols

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Overview of Computer Networks

Advanced Higher Computing. Computer Networks. Homework Sheets

DNS Basics. DNS Basics

Chapter 5. Data Communication And Internet Technology

Using MIS 3e Chapter 6A Appendix

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Kick starting science...

Technical Support Information Belkin internal use only

TCP/IP Basis. OSI Model

Computer Networks & Security 2014/2015

Ethernet. Ethernet. Network Devices

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet

Distributed Systems. 2. Application Layer

Communications and Networking

Connecting with Computer Science, 2e. Chapter 5 The Internet

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Study Guide CompTIA A+ Certification, Domain 2 Networking

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Cornerstones of Security

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Networks. Connecting Computers. Measures for connection speed. Ethernet. Collision detection. Ethernet protocol

This Lecture. The Internet and Sockets. The Start If everyone just sends a small packet of data, they can all use the line at the same.

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Linux MPS Firewall Supplement

IPv6 Firewalls. ITU/APNIC/MICT IPv6 Security Workshop 23 rd 27 th May 2016 Bangkok. Last updated 17 th May 2016

architecture: what the pieces are and how they fit together names and addresses: what's your name and number?

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Basic Network Configuration

Transport and Network Layer

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Networking Basics and Network Security

Multi-Homing Dual WAN Firewall Router

Linux MDS Firewall Supplement

Firewall VPN Router. Quick Installation Guide M73-APO09-380

VPN. Date: 4/15/2004 By: Heena Patel

Introduction to computer networks and Cloud Computing

Networking Technology Online Course Outline

The OSI and TCP/IP Models. Lesson 2

Algemene Theorie en Vaardigheden 2. April 2014 Theaterschool OTT-2 1

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Data Communication and Computer Network

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

Mathatma Gandhi University

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

SQA Higher Computing Unit 3b Computer Networking

EXPLORER. TFT Filter CONFIGURATION

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

M3-R3: INTERNET AND WEB DESIGN

Glossary of Technical Terms Related to IPv6

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues

Transport Layer Protocols

Chapter 11 Cloud Application Development

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

1.1 Prior Knowledge and Revision

CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus

Networking Test 4 Study Guide

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

Technical Glossary from Frontier

OSI Reference Model: An Overview

COMPUTER NETWORK TECHNOLOGY (300)

SSL VPN Technology White Paper

Layered protocol (service) architecture

Linux Network Security

BASIC ANALYSIS OF TCP/IP NETWORKS

Firewall: Getting started

Managed VPSv3 Firewall Supplement

Firewall Firewall August, 2003

DMZ Network Visibility with Wireshark June 15, 2010

Chapter 2 Application Layer

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d.

Answer FIVE Questions only. Each carries 20 marks.

Internet Privacy Options

Networks University of Stirling CSCU9B1 Essential Skills for the Information Age. Content

CITS1231 Web Technologies. Client, Server, the Internet, and the Web

CTS2134 Introduction to Networking. Module Network Security

524 Computer Networks

Introduction to TCP/IP

CISC 1600 Introduction to Multi-media Computing

CST111 Networking Page 1

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Transcription:

1 NETWORKING AND THE INTERNET COMS W1001 Introduction to Information Science Boyi Xie

2 Today s Topics Network Fundamentals The Internet The World Wide Web Internet Protocols Security

3 Network Classifications Size Local area network (LAN) Metropolitan area network (MAN) Wide area network (WAN) Public/Internal Open network Closed network, or proprietary network Sometimes a network looks like a star although it operates like a bus. Hub: a very short bus that relays any signal (with some amplification) it receives back out to all the machines connected to it Topology Bus Star

4 Combining Networks Connect existing networks to form an extended communication system Devices to form a single large network using the same protocols Repeater Connects two buses and passes signals back and forth with amplification Bridge Connects two buses but only forwards a message across the connection if the message is destined for the other side Switch A bridge with multiple connections

5 Combining Networks Connecting networks with incompatible characteristics A network of networks, known as an internet (lowercase i) Router provide links between networks while allowing each network to maintain its unique internal characteristics Each router maintains a forwarding table that contains the router s knowledge about the direction The point at which one network is linked to an internet is often called a gateway

6 Methods of Process Communication Interprocess communication Communication between processes Client/Server model, e.g. print server, file server Peer-to-peer (P2P) model, e.g. file distribution on a temporary basis

7 Today s Topics Network Fundamentals The Internet The World Wide Web Internet Protocols Security

8 The Internet The Internet is the most notable example of an internet Originated from the early 1960s Shifted from a government-sponsored project to an academic research project, and today it s largely commercialized

9 Internet Architecture Networks are constructed and maintained by Internet Service Providers (ISPs) Tier-1 ISPs very high speed, high capacity, international WANs Tier-2 ISPs more regional in scope, less potent in their capabilities Access ISPs independent internet, sometimes called an intranet, supplying Internet access to individual users End systems, or hosts the devices that individual users connect to the access ISPs

10 Internet Addressing IP address An internet-wide unique address assigned to computers Blocks of consecutively numbered IP addresses are awarded to ISPs by the Internet Corporation for Assigned Names and Numbers (ICANN) 32 bits, and in the process of converting to 128 bits Dotted decimal notation 10000000 00111011 11110101 00000011 128.59.245.3

11 Internet Addressing Alternative addressing by mnemonic names Domain, registered with ICANN and handled by registrars Top-level domains (TLDs), e.g. com, edu, gov, org Country code TLDs, e.g. au, ca, uk Subdomains organizing the names within a domain cs.columbia.edu Convert a mnemonic address into an IP address Name server a server to perform the conversion Domain name system (DNS) collectively these name servers being used as an Internet-wide directory system DNS lookup the process of using the DNS to perform a translation

12 Internet Applications Electronic Mail (email) File Transfer Protocol (FTP) Telnet and Secure Shell Voice over Internet Protocol (VoIP) Internet Radio

13 Today s Topics Network Fundamentals The Internet The World Wide Web Internet Protocols Security

14 The World Wide Web Hypertext, hyper links, and hypermedia World Wide Web (WWW, W3, or the Web) Web page, website Hypertext Transfer Protocol (HTTP) Uniform Resource Locator (URL)

An example layered approach 15

The Internet software layers 16

17 The Internet software layers The TCP/IP protocol suite is a collection of protocol standards used by the Internet to implement the four-level communication hierarchy deals with messages from the application s point of view converts these messages into segments that are compatible with Internet and reassembles messages that are received before delivering them to the appropriate application Protocol: TCP, UDP deals with directing the segments through in the Internet Protocol: IP handles the actual transmission of segments from one machine to another

18 TCP and UDP Transmission Control Protocol (TCP) & User Datagram Protocol (UDP) establish a connection before sending a message Acknowledgement and retransmission to assure all segments of a message are transferred Flow control and congestion control Less efficient, e.g. use for email More reliable Less efficient TCP UDP Does not establish a connections, merely sends the message to the address No retransmission services -> said to be unreliable protocol No flow control and congestion control More efficient, e.g. use for DNS lookups, VoIP More efficient Less reliable TCP: Flow control The origin can reduce the transmission rate to keep from overwhelming its destination Congestion control The origin can adjust its transmission rate to alleviate congestion between it and the destination

19 TCP The TCP three-way handshake TCP sequence number and acknowledgement TCP windowing

20 Well-Known Port 21 FTP 22 SSH login 25 SMTP 53 DNS 80 HTTP 110 POP3 Internet Assigned Numbers Authority (IANA) http://www.iana.org/assignments/service-names-port-numbers/service-namesport-numbers.xhtml

21 Distributed Systems Example distributed systems Amazon Elastic Compute Cloud (Amazon EC2) Columbia High Performance Computing Cluster Apache Hadoop

22 Security Forms of attack Virus Worm Trojan horse Spyware (sniffing software) Phishing Denial of service (DOS) Spam

23 Protection and Cures Firewall installed at gateway Filter messages passing in and out of the region Terminate a denial of service attack Prevent the harm of spoofing Spam filter Block unwanted email Proxy server Act as an intermediary between a client and a server with the goal to shielding the client from adverse actions of the actual server The actual server has no way of knowing that the proxy server is not the true client, and is never aware of the actual client s existence Filter messages sent from the server to the client Auditing software Detect a sudden increase in message traffic at various locations Monitor the activities of the system s firewalls Analyze the pattern of requests being made by individual computers Anti-virus software Detect and remove the presence of known viruses and other infections

24 Encryption Encrypt messages being transferred over networks FTPS secure version of FTP SSH secure version of telnet HTTPS secure version of HTTP using Secure Sockets Layer (SSL) Public-key encryption Public key (to encrypt) and private key (to decrypt)

25 References & Photo Credits Brookshear, J. Glenn (2011-04-13). Computer Science: An Overview (11th Edition). Prentice Hall. Kindle Edition.