SlideShare a Scribd company logo
1 of 26
Intro to Computer Networks
Basic Concepts of Networking
Intro to Computer Networks
The Internet
The global collection of connected networks that use
TCP/IP protocols.
The Internet was created from research done by the
U.S. Department of Defense Advanced Research
Projects Agency (ARPA) in the late 1960s – early
1970s.
The Internet became a commercial success in the
1990s.
No one group or country owns or “runs” the Internet,
because it is a collection of networks.
Intro to Computer Networks
Growth of the Internet
The Internet has experienced exponential growth
over two decades. It has been doubling in size every
nine to twelve months. (only recently has this
growth rate started to slow)
In 2001, there were over 100 Million computers attached to the
Internet.
In 2002, there were over 160 Million computer and nearly 800
Million Internet users.
In 2003, the number is approaching 200 Million computers.
Click here to see the real-time Internet growth charts http://www.netsizer.com/
(may not work)
See Internet growth at: http://www.isc.org/ds/
Intro to Computer Networks
World Wide Web
The hypermedia system used on the Internet in
which a page of information can contain text,
images, audio or video clips, and references to other
pages.
The main protocol of the Web is HTTP and the main
information format is HTML.
Information on the web is identified by a URL.
Invented by Dr. Tim Berners-Lee who donated his
work to the world for free!!!!
http://www.w3.org/People/Berners-Lee/Overview.html
Intro to Computer Networks
URL (Uniform Resource Locator)
A syntactic form used to identify a page of
information on the World Wide Web.
Example: http://www.utm.edu/~bbradley
Consists of a protocol :// hostname / page name
URLs are universal and unique. The URL to a page
can be used to identify and access it from anywhere
in the world on the Internet.
Can be on T-Shirts, on bill-boards, in magazines.
Intro to Computer Networks
TCP/IP
Transmission Control Protocol / Internet Protocol
The protocol suite used in the Internet.
Allows all the computers on the internet to
communicate with each other.
The common language of the Internet
A computer must be able to “speak” TCP/IP before it
can talk on the Internet.
Intro to Computer Networks
Protocol
Protocols are sets of rules.
What do you want to do? (Application)
Where are you going? (Addressing)
How do you get there? (Media types)
Did you get there? (Acknowledgments, Error
checking)
Intro to Computer Networks
Protocol Suite
A set of protocols that work together to provide a
seamless communication system. Each protocol
handles a subset of all possible details. The Internet
uses the TCP/IP protocol suite.
Includes: HTTP, SMTP, POP, IMAP, FTP.
Intro to Computer Networks
RFC (Requests For Comments)
Most of the Internet standards and protocols are fully
described in documents called RFCs.
See http://www.rfc-editor.org/
The Requests for Comments (RFC) document series
is a set of technical and organizational notes about
the Internet.
Memos in the RFC series discuss many aspects of
computer networking, including protocols,
procedures, programs, and concepts, as well as
meeting notes, opinions, and sometimes humor.
Intro to Computer Networks
Example RFCs
The following protocols are described by the
indicated RFC documents:
SMTP (RFC 821)
POP (RFC 1725)
IMAP (RFC 1730)
DNS (RFC 1034, RFC 1035)
Intro to Computer Networks
IP Address
A 32-bit address assigned to a computer that uses
the TCP/IP protocols. The sender must know the IP
address of the destination computer before sending a
packet.
This is like a phone number for the computer.
A program on one computer communicates with a
program on another computer, by connecting to its
IP address.
The 32-bit address is usually represented as four 8-
bit decimal numbers separated by periods.
Example: www.utm.edu’s IP address is 208.47.4.80
Intro to Computer Networks
IPv4 (Internet Protocol Version 4)
The version of IP currently used in the Internet.
IPv4 uses 32-bit addresses
Intro to Computer Networks
Dotted Decimal Notation
The syntactic notation used to express a 32-bit IPv4
address.
Each octet is written in decimal with a period
separating octets.
Example:
Mars.utm.edu’s IP address is 208.47.10.107
www.utm.edu’s IP address is 208.47.4.80
www.yahoo.com’s IP addresses are
64.58.76.229, 64.58.76.179, 64.58.76.177,
64.58.76.176, 64.58.76.223, 64.58.76.227,
64.58.76.225, 64.58.76.178, 64.58.76.224
Intro to Computer Networks
IP Numbers
Four groups of 8 bit numbers.
Each 8 bit range has 256 possibilities:
00000000 = 0
11111111 = 255
Therefore IP’s range from
0.0.0.0 to 255.255.255.255
There are about 4 billion possible addresses.
However, there are several reserved ranges.
Intro to Computer Networks
DNS (Domain Name System)
The automated system used to translate computer
names into equivalent IP addresses.
A DNS server responds to a query by looking up the
name and returning the address.
DNS is a global distributed database.
If you tell your web browser to connect to
www.utm.edu, the web browser will use the DNS
system to convert the host name (www.utm.edu)
into an IP address (208.47.4.80)
Intro to Computer Networks
Packet
A small, self-contained parcel of data sent across a
computer network.
Each packet contains a header that identifies the
sender and recipient, and a payload area that
contains the data being sent.
All messages sent on a network such as the Internet
are broken into small chucks called packets.
Intro to Computer Networks
Packets
For example, if I download a web page, my web browser sends
a message in a packet like this to the web server:
When the web server receives this request, it will send the web
page back to my computer by breaking it down into smaller
parts and sending each part in a packet:
To From Payload / Data
208.47.4.80:80 10.11.1.115 GET /index.html
Part 1 of web page
Part 2 of web page
Header
10.11.1.115 208.47.4.80
10.11.1.115 208.47.4.80
To From Payload / Data
Packet 1
Packet 2
Intro to Computer Networks
E-Mail Protocols
SMTP – Simple Mail Transfer Protocol
Used to transfer e-mail from one computer to
another across the Internet.
SMTP is part of the TCP/IP protocol suite.
POP3 – Post Office Protocol
A simple protocol used by a email client program
to download mail from a server.
IMAP - Internet Message Access Protocol
A more complicated protocol used by some email
clients to download and manage email
Intro to Computer Networks
Web Protocol and Language
HTTP – Hyper Text Transfer Protocol
The simple protocol used to transfer a World Wide Web
page from one computer to another.
A web client opens up a connection to a web server and
sends GET PAGENAME and then the web server sends back
the page text (usually HTML) over the connection.
HTML – Hyper Text Markup Language
The source form used for documents on the World Wide
Web. HTML embeds commands that determine formatting
along with the text to be displayed (e.g., to move to a new
line or indent text).
Intro to Computer Networks
Ethernet: Addressing
Since there can be many users on an ethernet network, everyone
has to have their own unique address.
This is called the Media Access Control (or MAC) address, or
sometimes ethernet address, physical address, adaptor address,
hardware addres, etc.
It’s a 12-digit (48 bit) hexadecimal address that is unique to that
ethernet adaptor and no other in the world. It can be written as
00:30:65:83:fc:0a or 0030.6583.fc0a or 003065:83fc0a or 00-30-
65-83-fc-0a but they all mean the same thing.
The first 6 digits are the Vendor code, (003065 belongs to Apple),
the last 6 are the individual inteface’s own. Like a car’s VIN. See
http://coffer.com/mac_find/ to look up some vendor codes.
Intro to Computer Networks
LAN (Local Area Network)
A network that uses technology designed to span a
small geographic area. For example, an Ethernet is
a LAN technology suitable for use in a single building.
LAN’s can be “bridged” together to allow multiple
buildings to be on the same LAN, but a LAN cannot
span for much more than a few thousand feet.
The University of Tennessee at Martin has a LAN that
connects all of the computers on its campus.
LAN’s have lower propagation delay than WANs.
Intro to Computer Networks
LAN
Hub
Computers
A LAN can consist of computers in the
same room or building that are hooked
together using a Hub/Switch type
device.
Intro to Computer Networks
LAN
Hub
Computers
Hub
Computers
Hub
A LAN can also allow
Computers on different floors or
even different buildings to be
bridged together.
Intro to Computer Networks
LAN
Hub
Computers
File
Server
Hub
Computers
Hub
A LAN can allow computers to
share resources such as printers,
disks or Internet connections. Internet
Gateway
Printer
Interne
t
Intro to Computer Networks
WAN (Wide Area Network)
A network that uses technology designed to span a
large geographic area. For example, a satellite
network is a WAN because a satellite can relay
communication across an entire continent. WANs
have higher propagation delay than LANs.
Intro to Computer Networks
Reference
Slides created by Bob Bradley, The University of
Tennessee at Martin
Most of these terms were taken from the Glossary of
Networking Terms and Abbreviations in the back of
the book Computer Networks and Internets with
Internet Applications Third Edition, Douglas E. Comer
Comments and notes added by Bob Bradley, The
University of Tennessee at Martin

More Related Content

Similar to Intro to Computer Networks Guide

How does internet works
How does internet worksHow does internet works
How does internet worksRamonNavarro46
 
Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the Internetcoastalgraphics
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To InternetMohit Dhankher
 
Exp2003 Int Ppt 01
Exp2003 Int Ppt 01Exp2003 Int Ppt 01
Exp2003 Int Ppt 01lonetree
 
Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLexume1
 
E-business Infrastructure and Security
E-business Infrastructure and SecurityE-business Infrastructure and Security
E-business Infrastructure and SecurityKimmy Chen
 
Introduction to the web
Introduction to the webIntroduction to the web
Introduction to the webSAMIR BHOGAYTA
 
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSbadri narayan
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...YonasBayu1
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Serious_SamSoul
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Serious_SamSoul
 
Questions On Protocol And Protocol
Questions On Protocol And ProtocolQuestions On Protocol And Protocol
Questions On Protocol And ProtocolMonique Jones
 
Pears
PearsPears
Pearsthips
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appliTheon Jum
 
Unit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptxUnit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptxsahilraturi
 
Cibm workshop2 chapter eight
Cibm  workshop2 chapter eightCibm  workshop2 chapter eight
Cibm workshop2 chapter eightShaheen Khan
 
2 internet essentials
2 internet essentials2 internet essentials
2 internet essentialschris30931
 
9781423903055 ppt ch02
9781423903055 ppt ch029781423903055 ppt ch02
9781423903055 ppt ch02临枫 盖
 

Similar to Intro to Computer Networks Guide (20)

How does internet works
How does internet worksHow does internet works
How does internet works
 
Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the Internet
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To Internet
 
Exp2003 Int Ppt 01
Exp2003 Int Ppt 01Exp2003 Int Ppt 01
Exp2003 Int Ppt 01
 
Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocols
 
E-business Infrastructure and Security
E-business Infrastructure and SecurityE-business Infrastructure and Security
E-business Infrastructure and Security
 
Internet
InternetInternet
Internet
 
Introduction to the web
Introduction to the webIntroduction to the web
Introduction to the web
 
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-
 
Questions On Protocol And Protocol
Questions On Protocol And ProtocolQuestions On Protocol And Protocol
Questions On Protocol And Protocol
 
Pears
PearsPears
Pears
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appli
 
Unit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptxUnit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptx
 
Cibm workshop2 chapter eight
Cibm  workshop2 chapter eightCibm  workshop2 chapter eight
Cibm workshop2 chapter eight
 
2 internet essentials
2 internet essentials2 internet essentials
2 internet essentials
 
9781423903055 ppt ch02
9781423903055 ppt ch029781423903055 ppt ch02
9781423903055 ppt ch02
 

More from ImXaib

ERD introduction in databases model.pptx
ERD introduction in databases model.pptxERD introduction in databases model.pptx
ERD introduction in databases model.pptxImXaib
 
SDA presentation the basics of computer science .pptx
SDA presentation the basics of computer science .pptxSDA presentation the basics of computer science .pptx
SDA presentation the basics of computer science .pptxImXaib
 
terminal a clear presentation on the topic.pptx
terminal a clear presentation on the topic.pptxterminal a clear presentation on the topic.pptx
terminal a clear presentation on the topic.pptxImXaib
 
What is Machine Learning_updated documents.pptx
What is Machine Learning_updated documents.pptxWhat is Machine Learning_updated documents.pptx
What is Machine Learning_updated documents.pptxImXaib
 
Grid Computing and it's applications.PPTX
Grid Computing and it's applications.PPTXGrid Computing and it's applications.PPTX
Grid Computing and it's applications.PPTXImXaib
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdfImXaib
 
4966709.ppt
4966709.ppt4966709.ppt
4966709.pptImXaib
 
lecture2.ppt
lecture2.pptlecture2.ppt
lecture2.pptImXaib
 
Tools.pptx
Tools.pptxTools.pptx
Tools.pptxImXaib
 
lec3_10.ppt
lec3_10.pptlec3_10.ppt
lec3_10.pptImXaib
 
ch12.ppt
ch12.pptch12.ppt
ch12.pptImXaib
 
Fullandparavirtualization.ppt
Fullandparavirtualization.pptFullandparavirtualization.ppt
Fullandparavirtualization.pptImXaib
 
mis9_ch08_ppt.ppt
mis9_ch08_ppt.pptmis9_ch08_ppt.ppt
mis9_ch08_ppt.pptImXaib
 
rooster-ipsecindepth.ppt
rooster-ipsecindepth.pptrooster-ipsecindepth.ppt
rooster-ipsecindepth.pptImXaib
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.pptImXaib
 
Database schema architecture.ppt
Database schema architecture.pptDatabase schema architecture.ppt
Database schema architecture.pptImXaib
 
Transport layer security.ppt
Transport layer security.pptTransport layer security.ppt
Transport layer security.pptImXaib
 
Trends in DM.pptx
Trends in DM.pptxTrends in DM.pptx
Trends in DM.pptxImXaib
 
AleksandrDoroninSlides.ppt
AleksandrDoroninSlides.pptAleksandrDoroninSlides.ppt
AleksandrDoroninSlides.pptImXaib
 
dm15-visualization-data-mining.ppt
dm15-visualization-data-mining.pptdm15-visualization-data-mining.ppt
dm15-visualization-data-mining.pptImXaib
 

More from ImXaib (20)

ERD introduction in databases model.pptx
ERD introduction in databases model.pptxERD introduction in databases model.pptx
ERD introduction in databases model.pptx
 
SDA presentation the basics of computer science .pptx
SDA presentation the basics of computer science .pptxSDA presentation the basics of computer science .pptx
SDA presentation the basics of computer science .pptx
 
terminal a clear presentation on the topic.pptx
terminal a clear presentation on the topic.pptxterminal a clear presentation on the topic.pptx
terminal a clear presentation on the topic.pptx
 
What is Machine Learning_updated documents.pptx
What is Machine Learning_updated documents.pptxWhat is Machine Learning_updated documents.pptx
What is Machine Learning_updated documents.pptx
 
Grid Computing and it's applications.PPTX
Grid Computing and it's applications.PPTXGrid Computing and it's applications.PPTX
Grid Computing and it's applications.PPTX
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
4966709.ppt
4966709.ppt4966709.ppt
4966709.ppt
 
lecture2.ppt
lecture2.pptlecture2.ppt
lecture2.ppt
 
Tools.pptx
Tools.pptxTools.pptx
Tools.pptx
 
lec3_10.ppt
lec3_10.pptlec3_10.ppt
lec3_10.ppt
 
ch12.ppt
ch12.pptch12.ppt
ch12.ppt
 
Fullandparavirtualization.ppt
Fullandparavirtualization.pptFullandparavirtualization.ppt
Fullandparavirtualization.ppt
 
mis9_ch08_ppt.ppt
mis9_ch08_ppt.pptmis9_ch08_ppt.ppt
mis9_ch08_ppt.ppt
 
rooster-ipsecindepth.ppt
rooster-ipsecindepth.pptrooster-ipsecindepth.ppt
rooster-ipsecindepth.ppt
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
 
Database schema architecture.ppt
Database schema architecture.pptDatabase schema architecture.ppt
Database schema architecture.ppt
 
Transport layer security.ppt
Transport layer security.pptTransport layer security.ppt
Transport layer security.ppt
 
Trends in DM.pptx
Trends in DM.pptxTrends in DM.pptx
Trends in DM.pptx
 
AleksandrDoroninSlides.ppt
AleksandrDoroninSlides.pptAleksandrDoroninSlides.ppt
AleksandrDoroninSlides.ppt
 
dm15-visualization-data-mining.ppt
dm15-visualization-data-mining.pptdm15-visualization-data-mining.ppt
dm15-visualization-data-mining.ppt
 

Recently uploaded

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 

Intro to Computer Networks Guide

  • 1. Intro to Computer Networks Basic Concepts of Networking
  • 2. Intro to Computer Networks The Internet The global collection of connected networks that use TCP/IP protocols. The Internet was created from research done by the U.S. Department of Defense Advanced Research Projects Agency (ARPA) in the late 1960s – early 1970s. The Internet became a commercial success in the 1990s. No one group or country owns or “runs” the Internet, because it is a collection of networks.
  • 3. Intro to Computer Networks Growth of the Internet The Internet has experienced exponential growth over two decades. It has been doubling in size every nine to twelve months. (only recently has this growth rate started to slow) In 2001, there were over 100 Million computers attached to the Internet. In 2002, there were over 160 Million computer and nearly 800 Million Internet users. In 2003, the number is approaching 200 Million computers. Click here to see the real-time Internet growth charts http://www.netsizer.com/ (may not work) See Internet growth at: http://www.isc.org/ds/
  • 4. Intro to Computer Networks World Wide Web The hypermedia system used on the Internet in which a page of information can contain text, images, audio or video clips, and references to other pages. The main protocol of the Web is HTTP and the main information format is HTML. Information on the web is identified by a URL. Invented by Dr. Tim Berners-Lee who donated his work to the world for free!!!! http://www.w3.org/People/Berners-Lee/Overview.html
  • 5. Intro to Computer Networks URL (Uniform Resource Locator) A syntactic form used to identify a page of information on the World Wide Web. Example: http://www.utm.edu/~bbradley Consists of a protocol :// hostname / page name URLs are universal and unique. The URL to a page can be used to identify and access it from anywhere in the world on the Internet. Can be on T-Shirts, on bill-boards, in magazines.
  • 6. Intro to Computer Networks TCP/IP Transmission Control Protocol / Internet Protocol The protocol suite used in the Internet. Allows all the computers on the internet to communicate with each other. The common language of the Internet A computer must be able to “speak” TCP/IP before it can talk on the Internet.
  • 7. Intro to Computer Networks Protocol Protocols are sets of rules. What do you want to do? (Application) Where are you going? (Addressing) How do you get there? (Media types) Did you get there? (Acknowledgments, Error checking)
  • 8. Intro to Computer Networks Protocol Suite A set of protocols that work together to provide a seamless communication system. Each protocol handles a subset of all possible details. The Internet uses the TCP/IP protocol suite. Includes: HTTP, SMTP, POP, IMAP, FTP.
  • 9. Intro to Computer Networks RFC (Requests For Comments) Most of the Internet standards and protocols are fully described in documents called RFCs. See http://www.rfc-editor.org/ The Requests for Comments (RFC) document series is a set of technical and organizational notes about the Internet. Memos in the RFC series discuss many aspects of computer networking, including protocols, procedures, programs, and concepts, as well as meeting notes, opinions, and sometimes humor.
  • 10. Intro to Computer Networks Example RFCs The following protocols are described by the indicated RFC documents: SMTP (RFC 821) POP (RFC 1725) IMAP (RFC 1730) DNS (RFC 1034, RFC 1035)
  • 11. Intro to Computer Networks IP Address A 32-bit address assigned to a computer that uses the TCP/IP protocols. The sender must know the IP address of the destination computer before sending a packet. This is like a phone number for the computer. A program on one computer communicates with a program on another computer, by connecting to its IP address. The 32-bit address is usually represented as four 8- bit decimal numbers separated by periods. Example: www.utm.edu’s IP address is 208.47.4.80
  • 12. Intro to Computer Networks IPv4 (Internet Protocol Version 4) The version of IP currently used in the Internet. IPv4 uses 32-bit addresses
  • 13. Intro to Computer Networks Dotted Decimal Notation The syntactic notation used to express a 32-bit IPv4 address. Each octet is written in decimal with a period separating octets. Example: Mars.utm.edu’s IP address is 208.47.10.107 www.utm.edu’s IP address is 208.47.4.80 www.yahoo.com’s IP addresses are 64.58.76.229, 64.58.76.179, 64.58.76.177, 64.58.76.176, 64.58.76.223, 64.58.76.227, 64.58.76.225, 64.58.76.178, 64.58.76.224
  • 14. Intro to Computer Networks IP Numbers Four groups of 8 bit numbers. Each 8 bit range has 256 possibilities: 00000000 = 0 11111111 = 255 Therefore IP’s range from 0.0.0.0 to 255.255.255.255 There are about 4 billion possible addresses. However, there are several reserved ranges.
  • 15. Intro to Computer Networks DNS (Domain Name System) The automated system used to translate computer names into equivalent IP addresses. A DNS server responds to a query by looking up the name and returning the address. DNS is a global distributed database. If you tell your web browser to connect to www.utm.edu, the web browser will use the DNS system to convert the host name (www.utm.edu) into an IP address (208.47.4.80)
  • 16. Intro to Computer Networks Packet A small, self-contained parcel of data sent across a computer network. Each packet contains a header that identifies the sender and recipient, and a payload area that contains the data being sent. All messages sent on a network such as the Internet are broken into small chucks called packets.
  • 17. Intro to Computer Networks Packets For example, if I download a web page, my web browser sends a message in a packet like this to the web server: When the web server receives this request, it will send the web page back to my computer by breaking it down into smaller parts and sending each part in a packet: To From Payload / Data 208.47.4.80:80 10.11.1.115 GET /index.html Part 1 of web page Part 2 of web page Header 10.11.1.115 208.47.4.80 10.11.1.115 208.47.4.80 To From Payload / Data Packet 1 Packet 2
  • 18. Intro to Computer Networks E-Mail Protocols SMTP – Simple Mail Transfer Protocol Used to transfer e-mail from one computer to another across the Internet. SMTP is part of the TCP/IP protocol suite. POP3 – Post Office Protocol A simple protocol used by a email client program to download mail from a server. IMAP - Internet Message Access Protocol A more complicated protocol used by some email clients to download and manage email
  • 19. Intro to Computer Networks Web Protocol and Language HTTP – Hyper Text Transfer Protocol The simple protocol used to transfer a World Wide Web page from one computer to another. A web client opens up a connection to a web server and sends GET PAGENAME and then the web server sends back the page text (usually HTML) over the connection. HTML – Hyper Text Markup Language The source form used for documents on the World Wide Web. HTML embeds commands that determine formatting along with the text to be displayed (e.g., to move to a new line or indent text).
  • 20. Intro to Computer Networks Ethernet: Addressing Since there can be many users on an ethernet network, everyone has to have their own unique address. This is called the Media Access Control (or MAC) address, or sometimes ethernet address, physical address, adaptor address, hardware addres, etc. It’s a 12-digit (48 bit) hexadecimal address that is unique to that ethernet adaptor and no other in the world. It can be written as 00:30:65:83:fc:0a or 0030.6583.fc0a or 003065:83fc0a or 00-30- 65-83-fc-0a but they all mean the same thing. The first 6 digits are the Vendor code, (003065 belongs to Apple), the last 6 are the individual inteface’s own. Like a car’s VIN. See http://coffer.com/mac_find/ to look up some vendor codes.
  • 21. Intro to Computer Networks LAN (Local Area Network) A network that uses technology designed to span a small geographic area. For example, an Ethernet is a LAN technology suitable for use in a single building. LAN’s can be “bridged” together to allow multiple buildings to be on the same LAN, but a LAN cannot span for much more than a few thousand feet. The University of Tennessee at Martin has a LAN that connects all of the computers on its campus. LAN’s have lower propagation delay than WANs.
  • 22. Intro to Computer Networks LAN Hub Computers A LAN can consist of computers in the same room or building that are hooked together using a Hub/Switch type device.
  • 23. Intro to Computer Networks LAN Hub Computers Hub Computers Hub A LAN can also allow Computers on different floors or even different buildings to be bridged together.
  • 24. Intro to Computer Networks LAN Hub Computers File Server Hub Computers Hub A LAN can allow computers to share resources such as printers, disks or Internet connections. Internet Gateway Printer Interne t
  • 25. Intro to Computer Networks WAN (Wide Area Network) A network that uses technology designed to span a large geographic area. For example, a satellite network is a WAN because a satellite can relay communication across an entire continent. WANs have higher propagation delay than LANs.
  • 26. Intro to Computer Networks Reference Slides created by Bob Bradley, The University of Tennessee at Martin Most of these terms were taken from the Glossary of Networking Terms and Abbreviations in the back of the book Computer Networks and Internets with Internet Applications Third Edition, Douglas E. Comer Comments and notes added by Bob Bradley, The University of Tennessee at Martin