Chapter 4: Networking and the Internet



Similar documents
Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

2. Ethernet is a means of implementing which of the following network topologies?

Connecting with Computer Science, 2e. Chapter 5 The Internet

Detailed Table of Contents

CMSI 182 Intro to Computer Science. Week 13 Tuesday B.J. Johnson Doolan :25 10:40

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

COMPUTER NETWORK TECHNOLOGY (300)

Chapter 5. Data Communication And Internet Technology

Basic Internet programming Formalities. Hands-on tools for internet programming

Internet Privacy Options

Technical Glossary from Frontier

Advanced Higher Computing. Computer Networks. Homework Sheets

Web Foundations Series Internet Business Associate

Communications and Networking

ICTTEN8195B Evaluate and apply network security

Multi-Homing Dual WAN Firewall Router

Networking Technology Online Course Outline

Firewall VPN Router. Quick Installation Guide M73-APO09-380

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Network System Design Lesson Objectives

Using MIS 3e Chapter 6A Appendix

Telecommunications, the Internet, and Wireless Technology

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Web Hosting & Maintenance

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

CompTIA Network+ (Exam N10-005)

architecture: what the pieces are and how they fit together names and addresses: what's your name and number?

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

CSCI 362 Computer and Network Security

Connecting to and Setting Up a Network

Key Term Quiz Answers

CHAPTER 9: THE EVOLVING INTERNET

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Technical Support Information Belkin internal use only

Microsoft Exchange Server 2007, Upgrade from Exchange 2000/2003 ( /5049/5050) Course KC Days OVERVIEW COURSE OBJECTIVES AUDIENCE

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Network Technology CMP-354-TE. TECEP Test Description

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

Multi-Homing Security Gateway

Kick starting science...

M3-R3: INTERNET AND WEB DESIGN

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

Lecture 28: Internet Protocols

Chapter 1 Personal Computer Hardware hours

IT4405 Computer Networks (Compulsory)

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

SSVP SIP School VoIP Professional Certification

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers

The Internet. Chapter 10. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:

The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d.

Terminology. Internet Addressing System

Chapter 12 Homework CIT J001/02/04/06. Name: Date: Course: Test:

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.

TCP/IP Basis. OSI Model

Fortigate Features & Demo

Networking Basics for Automation Engineers

Networking Basics and Network Security

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

Introduction to computer networks and Cloud Computing

DMZ Network Visibility with Wireshark June 15, 2010

Cornerstones of Security

IP addresses. IP addresses: IPv4: 32 bits:

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus

Chapter 1: Introduction to Communications What is Data Communications? Data Communication Networks Basic Components of a communications system

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Alexander Nikov. 6. Telecommunications and networks, the Internet. Hyundai Heavy Industries Creates A Wireless Shipyard. a Wireless Shipyard

COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES

Networks. Connecting Computers. Measures for connection speed. Ethernet. Collision detection. Ethernet protocol

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

SSVVP SIP School VVoIP Professional Certification

Fundamentals of the Internet 2009/ Explain meaning the following networking terminologies:

TEACHING AND EXAMINATION SCHEME FOR

Inside-Out Attacks. Covert Channel Attacks Inside-out Attacks Seite 1 GLÄRNISCHSTRASSE 7 POSTFACH 1671 CH-8640 RAPPERSWIL

Linux MDS Firewall Supplement

Study Guide CompTIA A+ Certification, Domain 2 Networking

Local Area Networks (LANs) Blueprint (May 2012 Release)

Distributed Systems. 2. Application Layer

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Course Outline. Faculty of Applied Sciences University of Sri Jayewardanepura. Information Technology

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

The OSI and TCP/IP Models. Lesson 2

Introduction Chapter 1. Uses of Computer Networks

Transcription:

Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols 4.5 Security Copyright 2012 Pearson Education, Inc. 0-2 1

Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area network (WAN) Ownership Closed versus open Topology (configuration) Bus (Ethernet) Star (Wireless networks with central Access Point) Copyright 2012 Pearson Education, Inc. 0-3 Figure 4.1 Network topologies Copyright 2012 Pearson Education, Inc. 0-4 2

Figure 4.1 Network topologies (continued) Copyright 2012 Pearson Education, Inc. 0-5 Protocols CSMA/CD Used in Ethernet Silent bus provides right to introduce new message CSMA/CA Used in WiFi Hidden terminal problem Copyright 2012 Pearson Education, Inc. 0-6 3

Figure 4.2 Communication over a bus network Copyright 2012 Pearson Education, Inc. 0-7 Figure 4.3 The hidden terminal problem Copyright 2012 Pearson Education, Inc. 0-8 4

Connecting Networks Repeater: Extends a network Bid Bridge: Connects two compatible networks Switch: Connects several compatible networks Router: Connects two incompatible networks resulting in a network of networks called an internet Copyright 2012 Pearson Education, Inc. 0-9 Figure 4.4 Building a large bus network from smaller ones Copyright 2012 Pearson Education, Inc. 0-10 5

Figure 4.5 Routers connecting two WiFi networks and an Ethernet network to form an internet Copyright 2012 Pearson Education, Inc. 0-11 Inter-process Communication Client-server One server, many clients Server must execute continuously Client initiates communication Peer-to-peer (P2P) Two processes communicating as equals Peer processes can be short-lived Copyright 2012 Pearson Education, Inc. 0-12 6

Figure 4.6 The client/server model compared to the peer-to-peer model Copyright 2012 Pearson Education, Inc. 0-13 Distributed Systems Systems with parts that run on different computers Infrastructure can be provided by standardized toolkits Example: Enterprise Java Beans from Oracle Example:.NET framework from Microsoft Copyright 2012 Pearson Education, Inc. 0-14 7

The Internet The Internet: An internet that spans the world Original goal was to develop a means of connecting networks that would not be disrupted by local disasters. Today it has shifted from an academic research project to a commercial undertaking. Copyright 2012 Pearson Education, Inc. 0-15 Internet Architecture Internet Service Provider (ISP) Tier-1 Tier-2 Access ISP: Provides connectivity to the Internet Traditional telephone (dial up connection) Cable connections DSL Wireless Copyright 2012 Pearson Education, Inc. 0-16 8

Figure 4.7 Internet Composition Copyright 2012 Pearson Education, Inc. 0-17 Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation Mnemonic address: Domain names Top-Level Domains Domain name system (DNS) Name servers DNS lookup Copyright 2012 Pearson Education, Inc. 0-18 9

Internet Corporation for Assigned Names & Numbers (ICANN) Allocates IP addresses to ISPs who then assign those addresses within their regions. Oversees the registration of domains and domain names. Copyright 2012 Pearson Education, Inc. 0-19 Traditional Internet Applications Electronic Mail (email) Domain mail server collects incoming mail and transmits outing mail Mail server delivers collected incoming mail to clients via POP3 or IMAP File Transfer Protocol (FTP) Telnet and SSH Copyright 2012 Pearson Education, Inc. 0-20 10

More Recent Applications Voice Over IP (VoIP) Internet Radio N-unicast Multicast Copyright 2012 Pearson Education, Inc. 0-21 World Wide Web Hypertext and HTTP Browser gets documents from Web server Documents identified by URLs Copyright 2012 Pearson Education, Inc. 0-22 11

Figure 4.8 A typical URL Copyright 2012 Pearson Education, Inc. 0-23 Hypertext Document Format Encoded as text file Contains tags to communicate with browser Appearance <h1> to start a level one heading <p> to start a new paragraph Links to other documents and content <a href =... > Insert images <img src =... > Copyright 2012 Pearson Education, Inc. 0-24 12

Figure 4.9 A simple Web page Copyright 2012 Pearson Education, Inc. 0-25 Figure 4.9 A simple Web page (continued) Copyright 2012 Pearson Education, Inc. 0-26 13

Figure 4.10 An enhanced simple Web page Copyright 2012 Pearson Education, Inc. 0-27 Figure 4.10 An enhanced simple Web page (continued) Copyright 2012 Pearson Education, Inc. 0-28 14

Extensible Markup Language (XML) XML: A language for constructing markup languages similar il to HTML A descendant of SGML Opens door to a World Wide Semantic Web Copyright 2012 Pearson Education, Inc. 0-29 Using XML <staff clef = treble > <key>c minor</key> <time> 2/4 </time> <measure> < rest> egth </rest> <notes> egth G, egth G, egth G </notes></measure> <measure> <notes> hlf E </notes></measure> </staff> Copyright 2012 Pearson Education, Inc. 0-30 15

Figure 4.11 The first two bars of Beethoven s Fifth Symphony Copyright 2012 Pearson Education, Inc. 0-31 Client Side Versus Server Side Client-side activities Examples: java applets, javascript, Macromedia Flash Server-side activities Common Gateway Interface (CGI) Servlets PHP Copyright 2012 Pearson Education, Inc. 0-32 16

Figure 4.12 Package-shipping example Copyright 2012 Pearson Education, Inc. 0-33 Internet Software Layers Application: Constructs message with address Transport: Chops message into packets Network: Handles routing through the Internet Link: Handles actual transmission of packets Copyright 2012 Pearson Education, Inc. 0-34 17

Figure 4.13 The Internet software layers Copyright 2012 Pearson Education, Inc. 0-35 Figure 4.14 Following a message through the Internet Copyright 2012 Pearson Education, Inc. 0-36 18

TCP/IP Protocol Suite Transport Layer TCP UDP Network Layer IP (IPv4 and IPv6) Copyright 2012 Pearson Education, Inc. 0-37 Figure 4.15 and UDP Choosing between TCP Copyright 2012 Pearson Education, Inc. 0-38 19

Security Attacks Malware (viruses, worms, Trojan horses, spyware, phishing software) Denial of service Spam Protection Firewalls Spam filters Proxy Servers Antivirus software Copyright 2012 Pearson Education, Inc. 0-39 Encryption FTPS, HTTPS, SSL Public-key Encryption Public key: Used to encrypt messages Private key: Used to decrypt messages Certificates and Digital Signatures Copyright 2012 Pearson Education, Inc. 0-40 20

Figure 4.16 Public-key encryption Copyright 2012 Pearson Education, Inc. 0-41 21