Submit Search
Upload
chapter-1-business-data-networks-and-security-10-th-edition.pptx
•
Download as PPTX, PDF
•
0 likes
•
7 views
Mansoor Ahmed Khan
Follow
Presentation on Chapter No 1 of Data Networks and Security : Pank & Panko
Read less
Read more
Technology
Report
Share
Report
Share
1 of 94
Download now
Recommended
Ipv4 Vs Ipv6
Ipv4 Vs Ipv6
April Charlton
Networking
Networking
raj123singh
Routers and Routing Basic Module 1
Routers and Routing Basic Module 1
paolo374233
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
Vamsi Krishna Kalavala
Ccna presentation{complete]
Ccna presentation{complete]
Avijit Nath
Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)
ateeq85905
ccna presentation
ccna presentation
Yasser Mahfouz
The Network Ip Address Scheme
The Network Ip Address Scheme
Erin Rivera
Recommended
Ipv4 Vs Ipv6
Ipv4 Vs Ipv6
April Charlton
Networking
Networking
raj123singh
Routers and Routing Basic Module 1
Routers and Routing Basic Module 1
paolo374233
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
Vamsi Krishna Kalavala
Ccna presentation{complete]
Ccna presentation{complete]
Avijit Nath
Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)
ateeq85905
ccna presentation
ccna presentation
Yasser Mahfouz
The Network Ip Address Scheme
The Network Ip Address Scheme
Erin Rivera
Bvoc 106 internet TUTORIAL
Bvoc 106 internet TUTORIAL
iitechonline
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS .docx
dohertyjoetta
Why I should Model my Network
Why I should Model my Network
APNIC
Apoio doc tec - educationplb
Apoio doc tec - educationplb
Chris Valencia
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1
Lakeisha Jones
networking1.ppt
networking1.ppt
ChinmayWaingankar3
Wireshark - Basics
Wireshark - Basics
Yoram Orzach
3 Ways to Connect to the Oracle Cloud
3 Ways to Connect to the Oracle Cloud
Simon Haslam
Networking Basics - Ferdon
Networking Basics - Ferdon
Susan Ferdon
541ferdon networktutorial
541ferdon networktutorial
Susan Ferdon
Thesis Statement On Digital Security
Thesis Statement On Digital Security
Lindsey Jones
CN project 713711699701-5.pdf
CN project 713711699701-5.pdf
DakshBaveja
New world of Wireless
New world of Wireless
Mandar Pathrikar
ComputerNetworksAssignment
ComputerNetworksAssignment
Rebecca Patient
6.Copyright © 2016 Pearson Education, Inc. publishing as .docx
6.Copyright © 2016 Pearson Education, Inc. publishing as .docx
alinainglis
Bangladesh Computer Council Networking Project
Bangladesh Computer Council Networking Project
MDMusab
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
Đồng Quốc Vương
C C N A Day1
C C N A Day1
darulquthni
Ccna day1
Ccna day1
Nazmi Deligözoğlu
Ccna day1
Ccna day1
Sanjeev Jain
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
Deakin University
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
More Related Content
Similar to chapter-1-business-data-networks-and-security-10-th-edition.pptx
Bvoc 106 internet TUTORIAL
Bvoc 106 internet TUTORIAL
iitechonline
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS .docx
dohertyjoetta
Why I should Model my Network
Why I should Model my Network
APNIC
Apoio doc tec - educationplb
Apoio doc tec - educationplb
Chris Valencia
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1
Lakeisha Jones
networking1.ppt
networking1.ppt
ChinmayWaingankar3
Wireshark - Basics
Wireshark - Basics
Yoram Orzach
3 Ways to Connect to the Oracle Cloud
3 Ways to Connect to the Oracle Cloud
Simon Haslam
Networking Basics - Ferdon
Networking Basics - Ferdon
Susan Ferdon
541ferdon networktutorial
541ferdon networktutorial
Susan Ferdon
Thesis Statement On Digital Security
Thesis Statement On Digital Security
Lindsey Jones
CN project 713711699701-5.pdf
CN project 713711699701-5.pdf
DakshBaveja
New world of Wireless
New world of Wireless
Mandar Pathrikar
ComputerNetworksAssignment
ComputerNetworksAssignment
Rebecca Patient
6.Copyright © 2016 Pearson Education, Inc. publishing as .docx
6.Copyright © 2016 Pearson Education, Inc. publishing as .docx
alinainglis
Bangladesh Computer Council Networking Project
Bangladesh Computer Council Networking Project
MDMusab
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
Đồng Quốc Vương
C C N A Day1
C C N A Day1
darulquthni
Ccna day1
Ccna day1
Nazmi Deligözoğlu
Ccna day1
Ccna day1
Sanjeev Jain
Similar to chapter-1-business-data-networks-and-security-10-th-edition.pptx
(20)
Bvoc 106 internet TUTORIAL
Bvoc 106 internet TUTORIAL
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS .docx
Why I should Model my Network
Why I should Model my Network
Apoio doc tec - educationplb
Apoio doc tec - educationplb
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1
networking1.ppt
networking1.ppt
Wireshark - Basics
Wireshark - Basics
3 Ways to Connect to the Oracle Cloud
3 Ways to Connect to the Oracle Cloud
Networking Basics - Ferdon
Networking Basics - Ferdon
541ferdon networktutorial
541ferdon networktutorial
Thesis Statement On Digital Security
Thesis Statement On Digital Security
CN project 713711699701-5.pdf
CN project 713711699701-5.pdf
New world of Wireless
New world of Wireless
ComputerNetworksAssignment
ComputerNetworksAssignment
6.Copyright © 2016 Pearson Education, Inc. publishing as .docx
6.Copyright © 2016 Pearson Education, Inc. publishing as .docx
Bangladesh Computer Council Networking Project
Bangladesh Computer Council Networking Project
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
C C N A Day1
C C N A Day1
Ccna day1
Ccna day1
Ccna day1
Ccna day1
Recently uploaded
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
Deakin University
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Memoori
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
HostedbyConfluent
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Hyundai Motor Group
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
2toLead Limited
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
BookNet Canada
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
OnBoard
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
ThousandEyes
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
null - The Open Security Community
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
comworks
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Neo4j
Recently uploaded
(20)
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Slack Application Development 101 Slides
Slack Application Development 101 Slides
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
chapter-1-business-data-networks-and-security-10-th-edition.pptx
1.
Chapter 1 o and
Panko ess Data Networks and Security, 9th Edition arson
2.
Today, we
are surrounded by networks. This book will help you learn the skills you will need to participate in this networking revolution. This chapter introduces basic network concepts and issues you will use throughout the book. 2 © 2013 Pearson
3.
Difficult Material Central
Concept (CEPT) Take it slowly, step by step. This will require some extra work. This is a central concept (CEPT) you need to understand really well. 3 © 2013 Pearson
4.
Into the Cloud Basic
Network Concepts Packet Switching Internetworking Layers Internet Standards A Small Home Network 4 © 2013 Pearson
5.
Works at
the First Bank of Paradise (FBP) in Hawai`i Develops new media marketing campaigns using Facebook, YouTube, e-mail lists, and the bank’s website 5 © 2013 Pearson
6.
Current project
is the AlohaSmart credit card smartcard ◦ Smartcards have chips as well as mag stripes 6 © 2013 Pearson
7.
In the
morning, opens his tablet to check e-mail containing remarks about his PowerPoint marketing plan Turns on his desktop computer and reworks the PowerPoint presentation Automatically uploaded “to the cloud” with BlueSynch Later available to his work notebook and to meeting participants 7 © 2013 Pearson
8.
The cloud imagery
indicates that the user does not have to understand how systems “inside the cloud” operate. 8 © 2013 Pearson
9.
PowerPoint is
installed on his desktop computer at home. For his work notebook computer and on his tablet, PowerPoint is stored in the cloud. ◦ He downloads it when he needs it. ◦ Pays for it by the month, as a service. ◦ It is called software as a service (SaaS). 9 © 2013 Pearson
10.
10 © 2013 Pearson
11.
On the
FBP networking staff Manages the headquarters building wireless LANs Walks around doing readings with her sniffer program Learns information about access points, their signal power, and their security 11 © 2013 Pearson
12.
12 © 2013 Pearson
13.
SSID FBP FBP
FBP BSSID A1-B2-C3-D4-E5- F6 BB-D5-33-D4-6B- DD 19-FF-AE-D4-EC- 63 Signal -85 dBm -60 dBm -60 dBm Mode 802.11g 802.11n 802.11n Channel 11 48 44 Encryption AES-CCMP AES-CCMP AES-CCMP Authentication WPA2/PEAP WPA2/PEAP WPA2/PEAP Vendor Cisco Cisco Cisco 13 © 2013 Pearson
14.
Currently, must
walk around at least daily. ◦ Even then, cannot find intermittent problems. FBP is installing a centralized wireless management system. ◦ Will be able to manage all access points centrally. ◦ She can constantly monitor the network for problems. ◦ The network will alert her to problems. ◦ The system can even make adjustments automatically. 14 © 2013 Pearson
15.
In charge
of wireless security at FBP BYOD (Bring Your Own Device) Problem ◦ Number of smartphones and tablets is exploding ◦ Owned by the employees but used partially for business purposes ◦ Great diversity in smartphone and tablet operating systems ◦ Device security is improving but limited 15 © 2013 Pearsonl
16.
Claire Lorek
found a rogue access point in one of her walkarounds. She and John Lee visited Albert Gomes who installed the unauthorized access point. Albert thought that the access point was secure in stealth mode. However, Claire’s and hackers’ software could find it. 16 © 2013 Pearson
17.
Rather than
punish Albert Gomes, they worked to help him. His department did need more capacity. Claire would install another access point, one with strong security. John and Claire had developed an ally. 17 © 2013 Pearson
18.
Into the Cloud Basic
Network Concepts Packet Switching Internetworking Layers Internet Standards A Small Home Network 18 © 2013 Pearson
19.
Working Definition 19 © 2013
Pearson
20.
20 © 2013 Pearson
21.
21 © 2013 Pearson
22.
22 © 2013 Pearson
23.
The client and
the server share processing work. 23 © 2013 Pearson
24.
P2P Processing can
be done without a network (as shown) or with a network. No servers are needed. 24 © 2013 Pearson
25.
Transmission Speed Measurements Bits
per second (bps) Usually not bytes per second (Bps) Metric Suffixes Kilobits per second kbps (lowercase k) 1,000 bits per second (not 1,024) Megabits per second Mbps 1,000 kbps Gigabits per second Gbps 1,000 Mbps Terabits per second Tbps 1,000 Gbps 25 © 2013 Pearson
26.
File Downloads 100 kbps 1
Mbps 5 Mbps 10 Mbps 100 Mbps 1 Gbps E-mail message (250 words) .15 s 0 s 0 s 0 s 0 s 0 s Photograph (5 MB) 8 m 1 m 10 s 5 s 1 s 0.1 s 1 Hr HTDV Video (10 Mbps) 4 d 10 h 2 h 1 h 6 m 36 s Backup Synch (10 GB) 12 d 28 h 6 h 3 h 17 m 2 m 26 © 2013 Pearson
27.
Live or Streaming Media 100 kbps 1 Mbps
5 Mbps 10 Mbps 100 Mbps 1 Gbps MP3 Song (10 kbps) OK OK OK OK OK OK Standard Quality TV (2 Mbps) OK OK OK OK HDTV (10 Mbps) OK OK OK Three HDTV Channels OK OK 27 © 2013 Pearson
28.
Into the Cloud Basic
Network Concepts Packet Switching Internetworking Layers Internet Standards A Small Home Network 28 © 2013 Pearson
29.
29 © 2013 Pearson
30.
30 © 2013 Pearson
31.
31 © 2013 Pearson
32.
32 © 2013 Pearson
33.
33 © 2013 Pearson
34.
34 © 2013 Pearson
35.
35 © 2013 Pearson
36.
36 © 2013 Pearson
37.
Each switch
along the way forwards the packet out a port to another switch (or to the destination host). Individual packet switches have no knowledge of the entire path taken by the packet. We will see how this works in detail in later chapters. 37 © 2013 Pearson
38.
38 © 2013 Pearson
39.
39 © 2013 Pearson
40.
Forerunner of
the Internet Funded by Larry Roberts at the Advanced Research Projects Agency (ARPA) ◦ Now the Defense Advanced Research Projects Agency (DARPA) To explore packet switching To give researchers access to ARPA-funded software on host computers in distant cities First four nodes began operation in 1969 40 © 2013 Pearson
41.
41 © 2013 Pearson
42.
42 © 2013 Pearson
43.
Into the Cloud Basic
Network Concepts Packet Switching Internetworking Layers Internet Standards A Small Home Network 43 © 2013 Pearson
44.
Bob Kahn
at DARPA needed a way for researchers on one network to use resources on another network. Packets would have to travel across multiple networks. Kahn and Vint Cerf came up with the idea of connecting multiple networks by devices called routers. ◦ The original name was gateways. Generically, networks of networks are internets. Kahn created the global Internet (Capital I). 44 © 2013 Pearson
45.
45 © 2013 Pearson
46.
Capitalization of
“internet” ◦ With an uppercase “I,” Internet means the global Internet we use every day. ◦ With a lowercase “i”, internet means any internet or the internet layer. 46 © 2013 Pearson
47.
Basically, Kahn
and Cerf created a second layer of networking on top of single networks. This required the creation of a parallel set of concepts for single networks and internets. Single networks and internets use similar concepts but give these concepts different names. It is important for you to get this clear in your head. 47 © 2013 Pearson
48.
Component Generic Terminology Single Networks
Internets Addresses Vary by network technology 32-bit IPv4 Addresses and 128-bit IPv6 Addresses Packets are called Packets Frames Packets Packet switches are called Switches Switches Routers End-to-end routes are called Data links Routes 48 © 2013 Pearson
49.
Component Generic Terminology Single Networks
Internets Addresses Vary by network technology 32-bit IPv4 Addresses and 128-bit IPv6 Addresses Packets are called Packets Frames Packets Packet switches are called Switches Switches Routers End-to-end routes are called Data links Routes 49 © 2013 Pearson
50.
Into the Cloud Basic
Network Concepts Packet Switching Internetworking Layers Internet Standards A Small Home Network 50 © 2013 Pearson
51.
Networks can
be described at several layers of detail. Each layer provides services to the layer above it. ◦ The road provides service to the car tires. ◦ The car tires provide service to the car. ◦ The car provides service to the driver. ◦ A commercial driver provides service to the goods being delivered. 51 © 2013 Pearson
52.
1. Physical links are connections
between adjacent pairs of devices 2. The data link is the packet’s path through the network In this case: X-A-B-D-F-Y 52 © 2013 Pearson
53.
How many data
links does the packet pass through? How many physical links does the packet pass through? Name them. 53 © 2013 Pearson
54.
Formed by
graduate students to create standards for the ARPANET. Called their standards Requests for Comment (RFCs). ◦ Did not feel that they had the authority to create standards, so they used the weaker term RFC. The NWG evolved into today’s standards body for the Internet, the Internet Engineering Task Force (IETF). Internet standards today are still called RFCs. 54 © 2013 Pearson
55.
Basically, Kahn
and Cerf created a second layer of networking on top of single networks. This required the creation of a parallel set of concepts for single networks and internets. Single networks and internets use similar concepts but give these concepts different names. It is important for you to get this clear in your head. 55 © 2013 Pearson
56.
56 Dashed line shows the
path of a packet © 2013 Pearson
57.
57 How many physical links
are there between the two hosts? Physical links connect adjacent devices, as noted earlier. © 2013 Pearson
58.
58 A data link
is the path of a frame through a single network, as noted earlier. There is one data link per network. How many data links are in the figure? © 2013 Pearson
59.
59 A route is
a packet’s path through an internet. Added for internets. How many routes are there in the figure? © 2013 Pearson
60.
Host P
transmits a packet to Host Q. There are seven networks between the hosts. 1. How many packets will there be along the way? 2. How many frames will there be along the way? 3. How many routes will there be along the way? 4. How many data links will there be along the way? 60 © 2013 Pearson
61.
61 © 2013 Pearson
62.
62 © 2013 Pearson
63.
Layer Name Broad
Purpose Specific Purpose 5 Application 4 Transport 3 Internet 2 Data Link Single-network transmission (switched or wireless) Connection across a single network, Frame formats and switch operation 1 Physical Physical connections between adjacent devices 63 © 2013 Pearson
64.
Layer Name Broad
Purpose Specific Purpose 5 Application 4 Transport Internet Transmission Application message fragmentation, error correction, congestion reduction, etc. 3 Internet Transmission of packet across an internet, Packet formats, router operation 2 Data Link 1 Physical 64 © 2013 Pearson
65.
Number Name Broad
Purpose Specific Purpose 5 Application Communication between applications Same 4 Transport 3 Internet 2 Data Link 1 Physical 65 © 2013 Pearson
66.
Into the Cloud Basic
Network Concepts Packet Switching Internetworking Layers Internet Standards A Small Home Network 66 © 2013 Pearson
67.
IP ◦ Internet
layer protocol ◦ Unreliable best-effort internet layer operation 67 © 2013 Pearson
68.
TCP ◦ Transport
layer protocol ◦ TCP messages are called segments ◦ Provides transport layer functionality to fix problems ◦ Error correction, and so on UDP ◦ The other transport layer protocol ◦ Messages are called datagrams ◦ Unreliable, so used when reliability is not desired 68 © 2013 Pearson
69.
Layer Standard(s) Transport Layer
Transmission Control Protocol (TCP) Fragmentation Error Correction Congestion control User Datagram Protocol (UDP) No Fragmentation No Error Correction No Congestion Control Internet Layer Internet Protocol (IP) IPv4 and IPv6 69 © 2013 Pearson
70.
1977 ◦ First
experimental connection of three networks ◦ (Two wireless and the ARPANET) 1980s ◦ Internet opened to outside network for e-mail exchanges 70 © 2013 Pearson
71.
TCP/IP standards
evolved in the 1980s ◦ Hosts could run either TCP/IP or NCP standards. 1983 ◦ All hosts were required to run TCP/IP. NSFNET ◦ In the 1980s, the NSFNET funded by NSF was the core of the Internet. ◦ NSF had an Acceptable Use Policy barring commercial activity such as e-commerce. 71 © 2013 Pearson
72.
1995 ◦ NSFNET
replaced by commercial ISPs. ◦ E-commerce was no longer forbidden. ◦ The e-commerce revolution began. ◦ The World Wide Web became popular just before that. 72 © 2013 Pearson
73.
To use the
Internet, you need an Internet service provider and an access line to your ISP. Your ISP gives you access and carries your packets. Organizations also need ISPs. 73 © 2013 Pearson
74.
ISPs collectively comprise
the Internet backbone. They interconnect at Network Access Points (NAPs) to exchange packets. 74 © 2013 Pearson
75.
Trace the path
packets take from the User PC to the Webserver. 75 © 2013 Pearson
76.
IP, TCP,
and UDP are standards for delivery packets. TCP/IP also has supervisory protocols: ◦ To handle things beyond packet delivery. ◦ Managing IP addresses. ◦ Error handling, and so on. ◦ We will look at two supervisory protocols in this chapter. ◦ We will look at many more in Chapter 10. 76 © 2013 Pearson
77.
77 © 2013 Pearson
78.
78 © 2013 Pearson
79.
79 © 2013 Pearson
80.
80 © 2013 Pearson
81.
81 © 2013 Pearson
82.
82 © 2013 Pearson
83.
83 © 2013 Pearson
84.
Into the Cloud Basic
Network Concepts Packet Switching Internetworking Layers Internet Standard A Small Home Network 84 © 2013 Pearson
85.
85 © 2013 Pearson
86.
86 © 2013 Pearson
87.
87 © 2013 Pearson
88.
The IP gives
the home one IP address. The home network has multiple devices that need IP addresses. 88 © 2013 Pearson
89.
The access router
DHCP circuit gives private IP addresses to other devices. 89 © 2013 Pearson
90.
NAT allows multiple
internal hosts to share a single external IP address. External sniffers cannot learn internal addresses. 90 © 2013 Pearson
91.
Into the Cloud Basic
Network Concepts Packet Switching Internetworking Layers Internet Standard A Small Home Network 91 © 2013 Pearson
92.
This is
the first of four introductory chapters. ◦ The others deal with standards, security, and network and security management. Chapter 1 introduces basic network concepts and issues. ◦ Presented historically because some aspects of networking only make sense if you understand the development of internetworking. ◦ Specifically, single-network versus internet concepts and terminology (two of everything). 92 © 2013 Pearson
93.
Chapter 2
looks at standards in more depth. ◦ It will look at major characteristics of standards, such as the syntax of messages. ◦ It will focus on the data link, internet, transport, and application layers, which work by sending structured messages. 93 © 2013 Pearson
94.
© 2013 Pearson
Download now