SlideShare a Scribd company logo
1 of 49
Chapter 1
Networks
2
Networking
Computer network
A collection of computing devices connected in
order to communicate and share resources
Connections between computing devices can be
physical using wires or cables or wireless using
radio waves or infrared signals
3
Overview
•Network Topology
how is hardware (physically) connected?
•Addressing
how is a message’s destinations identified?
•Message Delivery
should all data be sent in the same fashion?
•Routing
what path through the network is taken?
•Security
how can strangers pass (private) messages?
4
Networking key terms
Node (host)
Any device on a network
Data transfer rate (bandwidth)
The speed with which data is moved from
one place to another on a network
5
Networking
Computer networks have opened up an
entire frontier in the world of computing
called the client/server model
Figure 15.1 Client/Server interaction
6
Networking
Protocol
A set of rules that defines how data is formatted and
processed on a network; i.e., rules that allow client/server
interaction
File server
A computer that stores and manages files for multiple
users on a network
Web server
A computer dedicated to responding to requests (from the
browser client) for web pages
7
Issue 1: Topology
•If every pair of computers on a network had
a dedicated communication link, passing
messages would be direct and
straightforward. (e.g., the “hotline” between
the White House and Kremlin)
•Unfortunately, with hundreds, thousands or
millions of computers on a network, they
cannot all have direct links to each other.
8
Network topology
Local-area network (LAN)
A network that connects a relatively small number of
machines in a relatively close geographical area
Ring topology connects all nodes in a closed loop on which
messages travel in one direction
Star topology centers around one node to which all others are
connected and through which all messages are sent
Bus topology nodes are connected to a single communication
line that carries messages in both directions
Types of Networks
Ethernet
The industry standard bus technology for
local-area networks
Figure 15.2 Various network topologies
10
Pros and Cons
Pro’s and Con’s
– Number of links (they cost money)
– Network Performance
How efficient is communication?
– Network Reliability
How does network respond to overload?
How susceptible is network to collapse?
Best choice depends on the size of the network
11
Types of Networks
Wide-area network (WAN)
A network that connects local-area networks over a
potentially large geographic distance
Metropolitan-area network (MAN)
The communication infrastructures that have been
developed in and around large cities
Gateway
One particular set up to handle all communication going
between that LAN and other networks
12
Types of Networks
Figure 15.1 Local-area networks connected across a
distance to create a wide-area network
13
Types of Networks
Internet
A wide area network that spans the planet
So, who owns the Internet?
14
Internet Connections
Internet backbone
A set of high-speed networks that carry
Internet traffic, provided by companies such
as AT&T, Verizon, GTE, British Telecom,
and IBM
Internet service provider (ISP)
A company that provides other companies
or individuals with access to the Internet
15
Internet Connections
Various technologies available to connect a home
computer to the Internet
Phone modem converts computer data into an analog audio
signal for transfer over a telephone line, and then a modem at
the destination converts it back again into data
Digital subscriber line (DSL) uses regular copper phone lines
to transfer digital data to and from the phone company’s central
office
Cable modem uses the same line that your cable TV signals
come in on to transfer the data back and forth
16
Internet Connections
Broadband
A connection in which transfer speeds are faster
than 768 kilobits per second
– DSL connections and cable modems are broadband
connections
– The speed for downloads (getting data from the
Internet to your home computer) may not be the same
as uploads (sending data from your home computer
to the Internet)
Issue 2: Addressing
If a device wants to send a
message to another, how does
it specify precisely which
device?
To what address?
18
Network Addresses
Hostname
A name made up of words separated by dots that uniquely
identifies a computer on the Internet:
Example: www.mathcs.slu.edu
IP address
An address made up of four one-byte numeric values
separated by dots that uniquely identifies a computer on
the Internet
Example: 192.0.0.1
Note: No direct way to translate between these!
19
IP Addresses
•An IP address can be split into
– network address, which specifies a specific
network
– host number, which specifies a particular machine
in that network
Figure 15.9
An IP address
is stored in
four bytes
Where does the host number
come from?
20
Network Classes
•The first part of the IP address designates the
network. The number of bits in the network
address depends upon the size of the network
•Class A network: Designated by first byte
(very large; e.g., Apple has 17.x.x.x, MIT has 9.x.x.x)
•Class B network: Designated by first two bytes
(moderate size; e.g., SLU has 165.134.x.x)
•Class C network: Designated by first three bytes
(very small; e.g., Iowa Public Television iptv.org has 205.221.205.x)
21
IPv4 and IPv6
•IPv4 is the protocol using 32-bit addresses. It has
been officially used since 1977
•IPv6 is a new protocol (defined in 1996) using
128-bit addresses. The Internet is in the process
of transitioning to IPv6
With a vastly larger address space, it provides
better separation of network location and host
identity, allowing better portability when devices
move from network to network.
22
Domain Name System
•A hostname generally consists of the computer
name followed by the domain name
•csc.villanova.edu is the domain name
– A domain name is separated into two or more
sections that specify the organization, and possibly a
subset of an organization, of which the computer is a
part
– Two organizations can have a computer named the
same thing because the domain name makes it clear
which one is being referred to
23
Domain Name System
matisse.csc.villanova.edu
Computer
name
Domain name TLD
24
Domain Name System
Figure 15.10 Top-level domains, including some relatively new ones
25
Domain Name System
Organizations based in countries other than the United
States use a top-level domain that corresponds to their
two-letter country codes
Figure 15.11
Some of the top-level domain
names based on country codes
26
Hostnames->IP addresses
•How is this conversion done?
– Originally, there was one big table kept on a
computer at Stanford. Whenever a computer
needed to know an address, it would ask this
computer.
– But as the Internet grew, this computer was
overloaded with requests and the underlying
table was being updated too often.
27
Hostnames->IP addresses
•The domain name system (DNS) is chiefly
used to translate hostnames into numeric IP
addresses
– DNS is an example of a distributed database.
Many computer all over the Internet keep
(partial) tables.
– If a server can resolve the hostname, it does
– If not, that server asks another domain name
server for the translations. And so on…
Issue 3: Routing
•When you send something by US Mail:
– You must give an address which uniquely identifies
the recipient
– You usually send everything in one package.
Packages are not all the same size.
– You do not know what physical route your package
will take on its way to destination.
– Are packages ever lost?
– How fast would you like delivery to be?
– Do you want confirmation of receipt?
Delivery on the Internet
•Many different types of data delivered
– Instant Message (very short)
– Email (size ranges)
– Web Page Description (size ranges)
– Photographs, MP3, software (large)
– Streaming Radio/Music
– Streaming Video
•Software protocols are used for delivery
Packet Switching
Packet
A unit of data sent across a network
Router
A network device that directs a packet between networks
toward its final destination
Packet switching
Messages are divided into fixed-sized, numbered packets;
packets are individually routed to their destination, then
reassembled
31
Packet Switching
Figure 15.4
Messages
sent by
packet
switching
Take a message, break it into three packets, and
simulate this process
32
Open Systems
A logical progression...
Proprietary system
A system that uses technologies kept private by a
particular commercial vendor
Interoperability
The ability of software and hardware on multiple
machines and from multiple commercial vendors to
communicate
Open systems
Systems based on a common model of network
architecture and a suite of protocols used in its
implementation
33
Open Systems
Open Systems
Interconnection Reference
Model
A seven-layer logical break
down of network interaction to
facilitate communication
standards
Each layer deals with a
particular aspect of network
communication
Figure 15.5 The layers of the OSI Reference Model
34
Network Protocols
• Network protocols are layered such that
each one relies on the protocols that
underlie it
• Sometimes referred to as a protocol
stack
Figure 15.6 Layering of key network protocols
35
TCP/IP
Transmission Control Protocol (TCP)
Software that breaks messages into packets,
hands them off to the IP software for delivery, and
then orders and reassembles the packets at their
destination
Internet Protocol (IP)
Software that deals with the routing of packets
through the maze of interconnected networks to
their final destination
36
TCP
•TCP = Transmission Control Protocol
(reliable, but less efficient)
– Before sending true message, it sends a
warning message to recipient:
“I’m about to send you a # of packets”
– It then waits for an acknowledgement
message from the recipient
“okay, I’ll watch for them”
– This process establishes a “connection”
37
TCP
•Once “connection” is established:
– Individual packets are sent
– The receiver separately acknowledges each
packet which arrives by sending an ACK.
Or if the packet arrived damaged, a negative
acknowledgement (NAK)
– Sender will resend damaged packets. Also, if
a long time passes without an ACK or NAK, it
assumes the packet must have been lost, and
so it resends.
38
UDP
•UDP stands for User Datagram Protocol
(more efficient, less reliable)
– Original device simply sends the packets and
doesn’t worry about whether they get lost.
•Which protocol would you choose for:
– Email messages?
– Streaming Audio?
39
Other protocols
Ping
A program used to test whether a particular network
computer is active and reachable
Traceroute
A program that shows the route a packet takes across the
Internet
40
High-Level Protocols
Other protocols build on TCP/IP protocol suite
Simple Mail Transfer Protocol (SMTP) used to specify
transfer of electronic mail
File Transfer Protocol (FTP) allows a user to transfer
files to and from another computer
Telnet used to log onto one computer from another
Hyper Text Transfer Protocol (http) allows exchange
of Web documents
Which of these have you used?
41
High-Level Protocols
Figure 15.7
Some protocols
and the ports
they use
Port
A numeric
designation
that
corresponds to
a particular
high-level
protocol
42
Issue #4: Routing
•Since there are not direct connections between
all devices, the communication of messages will
need to routed through intermediary nodes.
•Of course, there is (intentionally) more than one
route between most pairs of nodes on the Internet.
•Deciding on an entire route from the origination is
difficult, since it might require a map of the entire
Internet.
43
Message Hops
•If a node has a packet to deliver to a
destination, it does not plan the entire route.
•Instead, it simply decides on the single next
“hop” for the packet. That is, it chooses one
of its neighbors to send it too, and leaves
the rest of the routine decisions to that
neighbor (or others).
44
Routing Tables
•Each node has its personal routing table
which it uses to decide where to pass
packets, based on the destination.
•Many complications arise in having routing
tables coordinated properly to avoid too
many hops (or infinitely many hops in the
case that a messages encounters a loop).
•Last resort: “Hot Potato” routing (random)
45
Final Issue: Security
•How can you pass messages “securely” on
an open network like the Internet?
•Issues:
– your message might be read by others
– it could presumably even be modified
– can others read/modify information on your
computer which you did not intend to share?
– can others disrupt efficiency of your system
with unnecessary network activity?
46
Security Solutions
•Some possible techniques for security
– A group can rely entirely on a private network
for important communication.
– Password Protection!
– Perhaps your messages can be suitably
encrypted so that anyone who intercepts it
will not be able to understand it or to forward
on a forgery.
– A protected network could be connected to
Internet through a single machine (“firewall”)
47
Firewalls
Firewall
A gateway machine and its software that protects
a network by filtering the traffic it allows
Access control policy
A set of rules established by an organization that
specify what types of network communication are
permitted and denied
Have your messages ever been
returned undelivered, blocked by a firewall?
48
Firewalls
Figure 15.8 A firewall protecting a LAN
49
Social Networks
Social networks are a model (simulation) of how objects--
individuals and organizations--interact
– Internal: Participants are within a closed or private community
– External: No restrictions on membership
Functionality
Participants can
– describe themselves
– set privacy settings
– block unwanted members
– have personal pages of pictures/bloggs
– form or be a member of a community within the larger community

More Related Content

Similar to Chapter16.ppt

computer networking slides with full detail
computer  networking slides with full detailcomputer  networking slides with full detail
computer networking slides with full detailsonykhan3
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networksuhaimin othman
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkVinnu Vinod Kvk
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkkaran saini
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkAnchal doomra
 
Computer Network - Types & Definition
Computer Network - Types & DefinitionComputer Network - Types & Definition
Computer Network - Types & Definitionshreyarai297
 
Computer Network
Computer NetworkComputer Network
Computer NetworkHassan Khan
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkkaran saini
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkamare lakew
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkAyush Bhardwaj
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkAntenh Mekonen
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkBuntha Chhay
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkDuy Hoang Nguyen
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkSompal Duhan
 
Information system for you Chapter 15
Information system for you Chapter 15Information system for you Chapter 15
Information system for you Chapter 15Chakamru Pak
 
Computer-Networks--Network.ppt
Computer-Networks--Network.pptComputer-Networks--Network.ppt
Computer-Networks--Network.pptSamiAAli44
 
Computer-Networks-fundamentals-concepts.ppt
Computer-Networks-fundamentals-concepts.pptComputer-Networks-fundamentals-concepts.ppt
Computer-Networks-fundamentals-concepts.pptashaks17
 

Similar to Chapter16.ppt (20)

computer networking slides with full detail
computer  networking slides with full detailcomputer  networking slides with full detail
computer networking slides with full detail
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
IARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdfIARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdf
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer Network - Types & Definition
Computer Network - Types & DefinitionComputer Network - Types & Definition
Computer Network - Types & Definition
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
TIL networks
TIL networksTIL networks
TIL networks
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Information system for you Chapter 15
Information system for you Chapter 15Information system for you Chapter 15
Information system for you Chapter 15
 
Computer-Networks--Network.ppt
Computer-Networks--Network.pptComputer-Networks--Network.ppt
Computer-Networks--Network.ppt
 
Computer-Networks-fundamentals-concepts.ppt
Computer-Networks-fundamentals-concepts.pptComputer-Networks-fundamentals-concepts.ppt
Computer-Networks-fundamentals-concepts.ppt
 

More from Arumugam90

Notes for AR.ppt
Notes for AR.pptNotes for AR.ppt
Notes for AR.pptArumugam90
 
Unity Tutorial_Highlighted Notes.pdf
Unity Tutorial_Highlighted Notes.pdfUnity Tutorial_Highlighted Notes.pdf
Unity Tutorial_Highlighted Notes.pdfArumugam90
 
AUGMENTED REALITY.pptx
AUGMENTED REALITY.pptxAUGMENTED REALITY.pptx
AUGMENTED REALITY.pptxArumugam90
 
Introductiontokaryotyping.pptx
Introductiontokaryotyping.pptxIntroductiontokaryotyping.pptx
Introductiontokaryotyping.pptxArumugam90
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptArumugam90
 
Unit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfUnit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfArumugam90
 
CS3114_09212011.ppt
CS3114_09212011.pptCS3114_09212011.ppt
CS3114_09212011.pptArumugam90
 
HTTP, JSP, and AJAX.pdf
HTTP, JSP, and AJAX.pdfHTTP, JSP, and AJAX.pdf
HTTP, JSP, and AJAX.pdfArumugam90
 
JSP Components and Directives.pdf
JSP Components and Directives.pdfJSP Components and Directives.pdf
JSP Components and Directives.pdfArumugam90
 
Java Servlets.pdf
Java Servlets.pdfJava Servlets.pdf
Java Servlets.pdfArumugam90
 
JDBC with MySQL.pdf
JDBC with MySQL.pdfJDBC with MySQL.pdf
JDBC with MySQL.pdfArumugam90
 
JDBC with MySQL.pdf
JDBC with MySQL.pdfJDBC with MySQL.pdf
JDBC with MySQL.pdfArumugam90
 
DSJ_Unit III_Collection framework.pdf
DSJ_Unit III_Collection framework.pdfDSJ_Unit III_Collection framework.pdf
DSJ_Unit III_Collection framework.pdfArumugam90
 
DSJ_Unit III.pdf
DSJ_Unit III.pdfDSJ_Unit III.pdf
DSJ_Unit III.pdfArumugam90
 
DSJ_Unit I & II.pdf
DSJ_Unit I & II.pdfDSJ_Unit I & II.pdf
DSJ_Unit I & II.pdfArumugam90
 

More from Arumugam90 (20)

Notes for AR.ppt
Notes for AR.pptNotes for AR.ppt
Notes for AR.ppt
 
Unity Tutorial_Highlighted Notes.pdf
Unity Tutorial_Highlighted Notes.pdfUnity Tutorial_Highlighted Notes.pdf
Unity Tutorial_Highlighted Notes.pdf
 
AUGMENTED REALITY.pptx
AUGMENTED REALITY.pptxAUGMENTED REALITY.pptx
AUGMENTED REALITY.pptx
 
Introductiontokaryotyping.pptx
Introductiontokaryotyping.pptxIntroductiontokaryotyping.pptx
Introductiontokaryotyping.pptx
 
ML
MLML
ML
 
intro.ppt
intro.pptintro.ppt
intro.ppt
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.ppt
 
Unit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfUnit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdf
 
CS3114_09212011.ppt
CS3114_09212011.pptCS3114_09212011.ppt
CS3114_09212011.ppt
 
Chapter15.ppt
Chapter15.pptChapter15.ppt
Chapter15.ppt
 
HTTP, JSP, and AJAX.pdf
HTTP, JSP, and AJAX.pdfHTTP, JSP, and AJAX.pdf
HTTP, JSP, and AJAX.pdf
 
JSP Components and Directives.pdf
JSP Components and Directives.pdfJSP Components and Directives.pdf
JSP Components and Directives.pdf
 
JSP.pdf
JSP.pdfJSP.pdf
JSP.pdf
 
Java Servlets.pdf
Java Servlets.pdfJava Servlets.pdf
Java Servlets.pdf
 
JDBC with MySQL.pdf
JDBC with MySQL.pdfJDBC with MySQL.pdf
JDBC with MySQL.pdf
 
JDBC with MySQL.pdf
JDBC with MySQL.pdfJDBC with MySQL.pdf
JDBC with MySQL.pdf
 
JDBC.pdf
JDBC.pdfJDBC.pdf
JDBC.pdf
 
DSJ_Unit III_Collection framework.pdf
DSJ_Unit III_Collection framework.pdfDSJ_Unit III_Collection framework.pdf
DSJ_Unit III_Collection framework.pdf
 
DSJ_Unit III.pdf
DSJ_Unit III.pdfDSJ_Unit III.pdf
DSJ_Unit III.pdf
 
DSJ_Unit I & II.pdf
DSJ_Unit I & II.pdfDSJ_Unit I & II.pdf
DSJ_Unit I & II.pdf
 

Recently uploaded

Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 

Recently uploaded (20)

Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 

Chapter16.ppt

  • 2. 2 Networking Computer network A collection of computing devices connected in order to communicate and share resources Connections between computing devices can be physical using wires or cables or wireless using radio waves or infrared signals
  • 3. 3 Overview •Network Topology how is hardware (physically) connected? •Addressing how is a message’s destinations identified? •Message Delivery should all data be sent in the same fashion? •Routing what path through the network is taken? •Security how can strangers pass (private) messages?
  • 4. 4 Networking key terms Node (host) Any device on a network Data transfer rate (bandwidth) The speed with which data is moved from one place to another on a network
  • 5. 5 Networking Computer networks have opened up an entire frontier in the world of computing called the client/server model Figure 15.1 Client/Server interaction
  • 6. 6 Networking Protocol A set of rules that defines how data is formatted and processed on a network; i.e., rules that allow client/server interaction File server A computer that stores and manages files for multiple users on a network Web server A computer dedicated to responding to requests (from the browser client) for web pages
  • 7. 7 Issue 1: Topology •If every pair of computers on a network had a dedicated communication link, passing messages would be direct and straightforward. (e.g., the “hotline” between the White House and Kremlin) •Unfortunately, with hundreds, thousands or millions of computers on a network, they cannot all have direct links to each other.
  • 8. 8 Network topology Local-area network (LAN) A network that connects a relatively small number of machines in a relatively close geographical area Ring topology connects all nodes in a closed loop on which messages travel in one direction Star topology centers around one node to which all others are connected and through which all messages are sent Bus topology nodes are connected to a single communication line that carries messages in both directions
  • 9. Types of Networks Ethernet The industry standard bus technology for local-area networks Figure 15.2 Various network topologies
  • 10. 10 Pros and Cons Pro’s and Con’s – Number of links (they cost money) – Network Performance How efficient is communication? – Network Reliability How does network respond to overload? How susceptible is network to collapse? Best choice depends on the size of the network
  • 11. 11 Types of Networks Wide-area network (WAN) A network that connects local-area networks over a potentially large geographic distance Metropolitan-area network (MAN) The communication infrastructures that have been developed in and around large cities Gateway One particular set up to handle all communication going between that LAN and other networks
  • 12. 12 Types of Networks Figure 15.1 Local-area networks connected across a distance to create a wide-area network
  • 13. 13 Types of Networks Internet A wide area network that spans the planet So, who owns the Internet?
  • 14. 14 Internet Connections Internet backbone A set of high-speed networks that carry Internet traffic, provided by companies such as AT&T, Verizon, GTE, British Telecom, and IBM Internet service provider (ISP) A company that provides other companies or individuals with access to the Internet
  • 15. 15 Internet Connections Various technologies available to connect a home computer to the Internet Phone modem converts computer data into an analog audio signal for transfer over a telephone line, and then a modem at the destination converts it back again into data Digital subscriber line (DSL) uses regular copper phone lines to transfer digital data to and from the phone company’s central office Cable modem uses the same line that your cable TV signals come in on to transfer the data back and forth
  • 16. 16 Internet Connections Broadband A connection in which transfer speeds are faster than 768 kilobits per second – DSL connections and cable modems are broadband connections – The speed for downloads (getting data from the Internet to your home computer) may not be the same as uploads (sending data from your home computer to the Internet)
  • 17. Issue 2: Addressing If a device wants to send a message to another, how does it specify precisely which device? To what address?
  • 18. 18 Network Addresses Hostname A name made up of words separated by dots that uniquely identifies a computer on the Internet: Example: www.mathcs.slu.edu IP address An address made up of four one-byte numeric values separated by dots that uniquely identifies a computer on the Internet Example: 192.0.0.1 Note: No direct way to translate between these!
  • 19. 19 IP Addresses •An IP address can be split into – network address, which specifies a specific network – host number, which specifies a particular machine in that network Figure 15.9 An IP address is stored in four bytes Where does the host number come from?
  • 20. 20 Network Classes •The first part of the IP address designates the network. The number of bits in the network address depends upon the size of the network •Class A network: Designated by first byte (very large; e.g., Apple has 17.x.x.x, MIT has 9.x.x.x) •Class B network: Designated by first two bytes (moderate size; e.g., SLU has 165.134.x.x) •Class C network: Designated by first three bytes (very small; e.g., Iowa Public Television iptv.org has 205.221.205.x)
  • 21. 21 IPv4 and IPv6 •IPv4 is the protocol using 32-bit addresses. It has been officially used since 1977 •IPv6 is a new protocol (defined in 1996) using 128-bit addresses. The Internet is in the process of transitioning to IPv6 With a vastly larger address space, it provides better separation of network location and host identity, allowing better portability when devices move from network to network.
  • 22. 22 Domain Name System •A hostname generally consists of the computer name followed by the domain name •csc.villanova.edu is the domain name – A domain name is separated into two or more sections that specify the organization, and possibly a subset of an organization, of which the computer is a part – Two organizations can have a computer named the same thing because the domain name makes it clear which one is being referred to
  • 24. 24 Domain Name System Figure 15.10 Top-level domains, including some relatively new ones
  • 25. 25 Domain Name System Organizations based in countries other than the United States use a top-level domain that corresponds to their two-letter country codes Figure 15.11 Some of the top-level domain names based on country codes
  • 26. 26 Hostnames->IP addresses •How is this conversion done? – Originally, there was one big table kept on a computer at Stanford. Whenever a computer needed to know an address, it would ask this computer. – But as the Internet grew, this computer was overloaded with requests and the underlying table was being updated too often.
  • 27. 27 Hostnames->IP addresses •The domain name system (DNS) is chiefly used to translate hostnames into numeric IP addresses – DNS is an example of a distributed database. Many computer all over the Internet keep (partial) tables. – If a server can resolve the hostname, it does – If not, that server asks another domain name server for the translations. And so on…
  • 28. Issue 3: Routing •When you send something by US Mail: – You must give an address which uniquely identifies the recipient – You usually send everything in one package. Packages are not all the same size. – You do not know what physical route your package will take on its way to destination. – Are packages ever lost? – How fast would you like delivery to be? – Do you want confirmation of receipt?
  • 29. Delivery on the Internet •Many different types of data delivered – Instant Message (very short) – Email (size ranges) – Web Page Description (size ranges) – Photographs, MP3, software (large) – Streaming Radio/Music – Streaming Video •Software protocols are used for delivery
  • 30. Packet Switching Packet A unit of data sent across a network Router A network device that directs a packet between networks toward its final destination Packet switching Messages are divided into fixed-sized, numbered packets; packets are individually routed to their destination, then reassembled
  • 31. 31 Packet Switching Figure 15.4 Messages sent by packet switching Take a message, break it into three packets, and simulate this process
  • 32. 32 Open Systems A logical progression... Proprietary system A system that uses technologies kept private by a particular commercial vendor Interoperability The ability of software and hardware on multiple machines and from multiple commercial vendors to communicate Open systems Systems based on a common model of network architecture and a suite of protocols used in its implementation
  • 33. 33 Open Systems Open Systems Interconnection Reference Model A seven-layer logical break down of network interaction to facilitate communication standards Each layer deals with a particular aspect of network communication Figure 15.5 The layers of the OSI Reference Model
  • 34. 34 Network Protocols • Network protocols are layered such that each one relies on the protocols that underlie it • Sometimes referred to as a protocol stack Figure 15.6 Layering of key network protocols
  • 35. 35 TCP/IP Transmission Control Protocol (TCP) Software that breaks messages into packets, hands them off to the IP software for delivery, and then orders and reassembles the packets at their destination Internet Protocol (IP) Software that deals with the routing of packets through the maze of interconnected networks to their final destination
  • 36. 36 TCP •TCP = Transmission Control Protocol (reliable, but less efficient) – Before sending true message, it sends a warning message to recipient: “I’m about to send you a # of packets” – It then waits for an acknowledgement message from the recipient “okay, I’ll watch for them” – This process establishes a “connection”
  • 37. 37 TCP •Once “connection” is established: – Individual packets are sent – The receiver separately acknowledges each packet which arrives by sending an ACK. Or if the packet arrived damaged, a negative acknowledgement (NAK) – Sender will resend damaged packets. Also, if a long time passes without an ACK or NAK, it assumes the packet must have been lost, and so it resends.
  • 38. 38 UDP •UDP stands for User Datagram Protocol (more efficient, less reliable) – Original device simply sends the packets and doesn’t worry about whether they get lost. •Which protocol would you choose for: – Email messages? – Streaming Audio?
  • 39. 39 Other protocols Ping A program used to test whether a particular network computer is active and reachable Traceroute A program that shows the route a packet takes across the Internet
  • 40. 40 High-Level Protocols Other protocols build on TCP/IP protocol suite Simple Mail Transfer Protocol (SMTP) used to specify transfer of electronic mail File Transfer Protocol (FTP) allows a user to transfer files to and from another computer Telnet used to log onto one computer from another Hyper Text Transfer Protocol (http) allows exchange of Web documents Which of these have you used?
  • 41. 41 High-Level Protocols Figure 15.7 Some protocols and the ports they use Port A numeric designation that corresponds to a particular high-level protocol
  • 42. 42 Issue #4: Routing •Since there are not direct connections between all devices, the communication of messages will need to routed through intermediary nodes. •Of course, there is (intentionally) more than one route between most pairs of nodes on the Internet. •Deciding on an entire route from the origination is difficult, since it might require a map of the entire Internet.
  • 43. 43 Message Hops •If a node has a packet to deliver to a destination, it does not plan the entire route. •Instead, it simply decides on the single next “hop” for the packet. That is, it chooses one of its neighbors to send it too, and leaves the rest of the routine decisions to that neighbor (or others).
  • 44. 44 Routing Tables •Each node has its personal routing table which it uses to decide where to pass packets, based on the destination. •Many complications arise in having routing tables coordinated properly to avoid too many hops (or infinitely many hops in the case that a messages encounters a loop). •Last resort: “Hot Potato” routing (random)
  • 45. 45 Final Issue: Security •How can you pass messages “securely” on an open network like the Internet? •Issues: – your message might be read by others – it could presumably even be modified – can others read/modify information on your computer which you did not intend to share? – can others disrupt efficiency of your system with unnecessary network activity?
  • 46. 46 Security Solutions •Some possible techniques for security – A group can rely entirely on a private network for important communication. – Password Protection! – Perhaps your messages can be suitably encrypted so that anyone who intercepts it will not be able to understand it or to forward on a forgery. – A protected network could be connected to Internet through a single machine (“firewall”)
  • 47. 47 Firewalls Firewall A gateway machine and its software that protects a network by filtering the traffic it allows Access control policy A set of rules established by an organization that specify what types of network communication are permitted and denied Have your messages ever been returned undelivered, blocked by a firewall?
  • 48. 48 Firewalls Figure 15.8 A firewall protecting a LAN
  • 49. 49 Social Networks Social networks are a model (simulation) of how objects-- individuals and organizations--interact – Internal: Participants are within a closed or private community – External: No restrictions on membership Functionality Participants can – describe themselves – set privacy settings – block unwanted members – have personal pages of pictures/bloggs – form or be a member of a community within the larger community