SlideShare a Scribd company logo
Chapter 4
Networking and
the Internet
© 2007 Pearson Addison-Wesley.
All rights reserved
© 2007 Pearson Addison-Wesley. All rights reserved 0-2
Chapter 4: Networking and the
Internet
• 4.1 Network Fundamentals
• 4.2 The Internet
• 4.3 The World Wide Web
• 4.4 Internet Protocols
• 4.5 Security
© 2007 Pearson Addison-Wesley. All rights reserved 0-3
Network Classifications
• Scope
– Local area network (LAN)
– Metropolitan area (MAN)
– Wide area network (WAN)
• Topology (configuration)
– Ring
– Bus
– Star
© 2007 Pearson Addison-Wesley. All rights reserved 0-4
Figure 4.1 Network topologies
© 2007 Pearson Addison-Wesley. All rights reserved 0-5
Figure 4.1 Network topologies
(continued)
© 2007 Pearson Addison-Wesley. All rights reserved 0-6
List of Problems (so far)
• Topologies
• Framing
• Error control
• Flow control
• Multiple access
– How to share a wire
© 2007 Pearson Addison-Wesley. All rights reserved 0-7
Protocols
• Token ring
– Popular in ring networks
– Possession of token provides right to introduce new
message
• CSMA/CD
– Used in Ethernet
– Silent bus provides right to introduce new message
© 2007 Pearson Addison-Wesley. All rights reserved 0-8
Figure 4.2 Communication over a
ring network
© 2007 Pearson Addison-Wesley. All rights reserved 0-9
Figure 4.3 Communication over a
bus network
© 2007 Pearson Addison-Wesley. All rights reserved 0-10
Connecting Networks
• Repeater: Extends a network
• Bridge: Connects two compatible networks
• Switch: Connect several compatible networks
• Router: Connects two incompatible networks
resulting in a network of networks called an
internet
© 2007 Pearson Addison-Wesley. All rights reserved 0-11
Figure 4.4 Building a large bus
network from smaller ones
© 2007 Pearson Addison-Wesley. All rights reserved 0-12
Figure 4.5 A router connecting a
bus network to a star network
© 2007 Pearson Addison-Wesley. All rights reserved 0-13
Inter-process Communication
• Client-server
– One server, many clients
– Server must execute continuously
– Client initiates communication
• Peer-to-peer (P2P)
– Two processes communicating as equals
– Peer processes can be short-lived
© 2007 Pearson Addison-Wesley. All rights reserved 0-14
Figure 4.6 The client/server model
compared to the peer-to-peer model
© 2007 Pearson Addison-Wesley. All rights reserved 0-15
Distributed Systems
• Systems with parts that run on different
computers
– Infrastructure can be provided by standardized
toolkits
• Example: Enterprise Java Beans from Sun Microsystems
• Example: .NET framework from Microsoft
© 2007 Pearson Addison-Wesley. All rights reserved 0-16
The Internet
• The Internet: An internet that spans the world
– Original goal was to develop a means of connecting
networks that would not be disrupted by local
disasters.
– Today it has shifted from an academic research
project to a commercial undertaking.
© 2007 Pearson Addison-Wesley. All rights reserved 0-17
Internet Architecture
• Domain: A portion of the Internet that
network or internet controlled by a single
authority
– Connected to the rest of the Internet (the cloud) by a
router called a gateway
• Internet Corporation for Assigned Names &
Numbers (ICANN): Oversees the registration
of domains
• Domain Name (www.cs.gsu.edu)
© 2007 Pearson Addison-Wesley. All rights reserved 0-18
Figure 4.7 A typical approach to
connecting to the Internet
© 2007 Pearson Addison-Wesley. All rights reserved 0-19
Strategies for connecting to the
Internet
• Internet Service Provider (ISP): Provides
connectivity to the Internet
• Popular means of connecting:
– Traditional telephone (dial up connection)
– Cable connections
– DSL (Digital Subscriber Line )
– Wireless
© 2007 Pearson Addison-Wesley. All rights reserved 0-20
Internet Addressing: IP Addresses
• IP address: 32 bit identifier for a machine
(currently being expanded to a 128 bit system)
– Network identifier: Assigned by ICANN
– Host address: Assigned by domain administrator
• Dotted decimal notation: Common notation for
displaying IP addresses
– Example: 192.207.177.133
© 2007 Pearson Addison-Wesley. All rights reserved 0-21
Internet Addressing: Host Names
• Mnemonic address made up of two parts:
– Domain name
• Assigned by a registrar
• Example: gsu.edu
• Top level domain: Classification of domain owner
– By usage – Example: .com = commercial
– By country – Example: .au = Australia
– Subdomains and individual host names
• Assigned by domain owner
• Example: r2d2.compsci.nowhereu.edu
• Translation between mnemonic addresses and IP addresses
handled by name servers
.
© 2007 Pearson Addison-Wesley. All rights reserved 0-22
Traditional Internet Applications
• Electronic Mail (email)
– Domain mail server collects incoming mail and
transmits outing mail
– Mail server delivers collected incoming mail to
clients via POP3 or IMAP
• File Transfer Protocol (FTP)
• Telnet and SSH
© 2007 Pearson Addison-Wesley. All rights reserved 0-23
Internet Software Layers
• Application: Constructs message with address
• Transport: Chops message into packets
• Network: Handles routing through the Internet
• Link: Handles actual transmission of packets
© 2007 Pearson Addison-Wesley. All rights reserved 0-24
Figure 4.12 Package-shipping
example
© 2007 Pearson Addison-Wesley. All rights reserved 0-25
Figure 4.13 The Internet
software layers
© 2007 Pearson Addison-Wesley. All rights reserved 0-26
Figure 4.14 Following a message
through the Internet
© 2007 Pearson Addison-Wesley. All rights reserved 0-27
Layering: logical communication
application
transport
network
link
application
transport
network
link
application
transport
network
link
application
transport
network
link
network
link
physical
data
data
E.g.: transport
• take data from app
• add addressing,
reliability check
info to form
“datagram”
• send datagram to
peer
• wait for peer to
ack receipt
• analogy: post
office
data
transport
transport
ack
© 2007 Pearson Addison-Wesley. All rights reserved 0-28
Layering: physical communication
application
transport
network
link
application
transport
network
link
application
transport
network
link
application
transport
network
link
network
link
data
data
© 2007 Pearson Addison-Wesley. All rights reserved 0-29
Protocol layering and data
Each layer takes data from above
• adds header information to create new data unit
(“encapsulation”)
• passes new data unit to layer below
source destination
datagram
application
transport
network
link
application
transport
network
link
M
M
M
M
Ht
HtHn
HtHnHl
M
M
M
M
Ht
HtHn
HtHnHl
message
segment
frame
© 2007 Pearson Addison-Wesley. All rights reserved 0-30
Applications and app-layer protocols
Application: communicating, distributed
processes
– running in network hosts in “user
space”
– exchange messages to implement
app
– e.g., email, file transfer, the Web
Application-layer protocols
– one “piece” of an app
– define messages exchanged by
apps and actions taken
– user services provided by lower
layer protocols
application
transport
network
data link
application
transport
network
data link
application
transport
network
data link
© 2007 Pearson Addison-Wesley. All rights reserved 0-31
Network applications: some jargon
• A process is a program
that is running within a
host.
• Within the same host, two
processes communicate
with interprocess
communication defined
by the OS.
• Processes running in
different hosts
communicate with an
application-layer protocol
• A user agent is an
interface between the
user and the network
application.
– Web:browser
– E-mail: mail reader
– streaming audio/video:
media player
© 2007 Pearson Addison-Wesley. All rights reserved 0-32
Application-layer protocols
API: application
programming interface
• defines interface between
application and transport
layer
• socket: Internet API
– two processes
communicate by
sending data into
socket, reading data
out of socket
Q: how does a process
“identify” the other process
with which it wants to
communicate?
– IP address of host
running other process
– “port number” - allows
receiving host to
determine to which
local process the
message should be
delivered
© 2007 Pearson Addison-Wesley. All rights reserved 0-33
TCP/IP Protocol Suite
• Transport Layer
– TCP
– UDP
• Network Layer
– IP (IPv4 and IPv6)
© 2007 Pearson Addison-Wesley. All rights reserved 0-34
Figure 4.15 Choosing between
TCP and UDP
© 2007 Pearson Addison-Wesley. All rights reserved 0-35
Security
• Attacks
– Malware (viruses, worms, Trojan horses, spyware, phishing
software)
– Denial of service
– Spam
• Protection
– Firewalls
– Spam filters
– Proxy Servers
– Antivirus software
© 2007 Pearson Addison-Wesley. All rights reserved 0-36
Encryption
• FTPS, HTTPS, SSL
• Public-key Encryption
– Public key: Used to encrypt messages
– Private key: Used to decrypt messages
• Certificates and Digital Signatures
© 2007 Pearson Addison-Wesley. All rights reserved 0-37
Figure 4.16 Public-key encryption
© 2007 Pearson Addison-Wesley. All rights reserved 0-38
World Wide Web
• Hypertext and HTTP
• Browser gets documents from Web server
• Documents identified by URLs
© 2007 Pearson Addison-Wesley. All rights reserved 0-39
Figure 4.8 A typical URL
© 2007 Pearson Addison-Wesley. All rights reserved 0-40
Hypertext Document Format
• Entire document is printable characters
• Contains tags to communicate with browser
– Appearance
• <h1> to start a level one heading
• <p> to start a new paragraph
– Links to other documents and content
• <a href = . . . >
– Insert images
• <img src = . . . >
© 2007 Pearson Addison-Wesley. All rights reserved 0-41
Figure 4.9 A simple Web page
© 2007 Pearson Addison-Wesley. All rights reserved 0-42
Figure 4.9 A simple Web page
(continued)
© 2007 Pearson Addison-Wesley. All rights reserved 0-43
Figure 4.10 An enhanced simple
Web page
© 2007 Pearson Addison-Wesley. All rights reserved 0-44
Figure 4.10 An enhanced simple
Web page (continued)
© 2007 Pearson Addison-Wesley. All rights reserved 0-45
Extensible Markup Language
(XML)
• XML: A language for constructing markup
languages similar to HTML
– A descendant of SGML
– Opens door to a World Wide Semantic Web
© 2007 Pearson Addison-Wesley. All rights reserved 0-46
Using XML
<staff clef = “treble”> <key>C minor</key>
<time> 2/4 </time>
<measure> < rest> egth </rest> <notes> egth G,
egth G, egth G </notes></measure>
<measure> <notes> hlf E </notes></measure>
</staff>
© 2007 Pearson Addison-Wesley. All rights reserved 0-47
Figure 4.11 The first two bars of
Beethoven’s Fifth Symphony
© 2007 Pearson Addison-Wesley. All rights reserved 0-48
Client Side Versus Server Side
• Client-side activities
– Examples: java applets, javascript, Macromedia
Flash
• Server-side activities
– Common Gateway Interface (CGI)
– Servlets
– PHP

More Related Content

What's hot

Fundamental Internet Concept
Fundamental Internet ConceptFundamental Internet Concept
Fundamental Internet Concept
j093760
 
basic it presentation........
basic it presentation........basic it presentation........
basic it presentation........
vlsaroj
 
Web Technology UPTU UNIT 1
Web Technology UPTU UNIT 1 Web Technology UPTU UNIT 1
Web Technology UPTU UNIT 1
Abhishek Kesharwani
 
Comp 111 cep ii
Comp 111 cep iiComp 111 cep ii
Comp 111 cep ii
Bala Ganesh
 
Chapter03
Chapter03Chapter03
Chapter03
pittore44
 
The basic concept of internet connection
The basic concept of internet connectionThe basic concept of internet connection
The basic concept of internet connection
JGrace Johnny
 
The Internet & WWW - Basic Understanding
The Internet & WWW - Basic Understanding The Internet & WWW - Basic Understanding
Networks
NetworksNetworks
Networks
AyuMohamad
 
Chap1 Internet Fundamental
Chap1 Internet FundamentalChap1 Internet Fundamental
Chap1 Internet Fundamental
nizamhusen
 
Internet and the world wide web
Internet and the world wide webInternet and the world wide web
Internet and the world wide web
Noha Mohamad
 
How does the internet work
How does the internet workHow does the internet work
How does the internet work
mraheel205
 
Internet
InternetInternet
Internet
Ahsan Azhar
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10
APSU
 
Basic of it definations
Basic of it definationsBasic of it definations
Basic of it definations
tangemjoy
 
Isd&d networks
Isd&d networksIsd&d networks
Isd&d networks
slidersharer14
 
Internet and intranet
Internet and intranetInternet and intranet
Internet and intranet
Anil Pokhrel
 
Cibm workshop2 chapter eight
Cibm  workshop2 chapter eightCibm  workshop2 chapter eight
Cibm workshop2 chapter eight
Shaheen Khan
 
Computer network coe351- part1- final
Computer network coe351- part1- finalComputer network coe351- part1- final
Computer network coe351- part1- final
Taymoor Nazmy
 
Internet
InternetInternet
Internet
amansinghalddn
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appli
Theon Jum
 

What's hot (20)

Fundamental Internet Concept
Fundamental Internet ConceptFundamental Internet Concept
Fundamental Internet Concept
 
basic it presentation........
basic it presentation........basic it presentation........
basic it presentation........
 
Web Technology UPTU UNIT 1
Web Technology UPTU UNIT 1 Web Technology UPTU UNIT 1
Web Technology UPTU UNIT 1
 
Comp 111 cep ii
Comp 111 cep iiComp 111 cep ii
Comp 111 cep ii
 
Chapter03
Chapter03Chapter03
Chapter03
 
The basic concept of internet connection
The basic concept of internet connectionThe basic concept of internet connection
The basic concept of internet connection
 
The Internet & WWW - Basic Understanding
The Internet & WWW - Basic Understanding The Internet & WWW - Basic Understanding
The Internet & WWW - Basic Understanding
 
Networks
NetworksNetworks
Networks
 
Chap1 Internet Fundamental
Chap1 Internet FundamentalChap1 Internet Fundamental
Chap1 Internet Fundamental
 
Internet and the world wide web
Internet and the world wide webInternet and the world wide web
Internet and the world wide web
 
How does the internet work
How does the internet workHow does the internet work
How does the internet work
 
Internet
InternetInternet
Internet
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10
 
Basic of it definations
Basic of it definationsBasic of it definations
Basic of it definations
 
Isd&d networks
Isd&d networksIsd&d networks
Isd&d networks
 
Internet and intranet
Internet and intranetInternet and intranet
Internet and intranet
 
Cibm workshop2 chapter eight
Cibm  workshop2 chapter eightCibm  workshop2 chapter eight
Cibm workshop2 chapter eight
 
Computer network coe351- part1- final
Computer network coe351- part1- finalComputer network coe351- part1- final
Computer network coe351- part1- final
 
Internet
InternetInternet
Internet
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appli
 

Similar to Cs ch04

Lesson+3 v2.0 slide_show [autosaved]
Lesson+3 v2.0 slide_show [autosaved]Lesson+3 v2.0 slide_show [autosaved]
Lesson+3 v2.0 slide_show [autosaved]
gmidavis
 
Web server administration
Web server administrationWeb server administration
Web server administration
sawsan slii
 
Iso model
Iso modelIso model
Iso model
Aileen Ereño
 
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Abdelkhalik Mosa
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
nnmaurya
 
Week_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.pptWeek_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.ppt
home107
 
NME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdfNME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdf
SeethaDinesh
 
Sept 2017 network standards and models
Sept 2017   network standards and modelsSept 2017   network standards and models
Sept 2017 network standards and models
shahin raj
 
Lecture 01 {Introduction}.pptx
Lecture 01 {Introduction}.pptxLecture 01 {Introduction}.pptx
Lecture 01 {Introduction}.pptx
SurendraBasnet6
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
Michael Lamont
 
MUSIC.pptx
MUSIC.pptxMUSIC.pptx
MUSIC.pptx
waqasjavaid26
 
Introduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptxIntroduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptx
hishamousl
 
6. Chapter_2_1_newversion1.pptxasasasdasdasda
6. Chapter_2_1_newversion1.pptxasasasdasdasda6. Chapter_2_1_newversion1.pptxasasasdasdasda
6. Chapter_2_1_newversion1.pptxasasasdasdasda
UsamaMushtaq15
 
Powering the digital frontier with web technologies.
Powering the digital frontier with web technologies.Powering the digital frontier with web technologies.
Powering the digital frontier with web technologies.
daniel2004durango
 
Itmg360 chapter one_v05
Itmg360 chapter one_v05Itmg360 chapter one_v05
Itmg360 chapter one_v05
raj_rohit
 
chapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdf
chapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdfchapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdf
chapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdf
AliMurat5
 
Chapter 7 telecommunications the internet and wireless technology
Chapter 7 telecommunications the internet and wireless technologyChapter 7 telecommunications the internet and wireless technology
Chapter 7 telecommunications the internet and wireless technology
Van Chau
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Works
sumit kumar
 
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless TechnologyMIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
Sukanya Ben
 
Computer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptxComputer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptx
SmithaV19
 

Similar to Cs ch04 (20)

Lesson+3 v2.0 slide_show [autosaved]
Lesson+3 v2.0 slide_show [autosaved]Lesson+3 v2.0 slide_show [autosaved]
Lesson+3 v2.0 slide_show [autosaved]
 
Web server administration
Web server administrationWeb server administration
Web server administration
 
Iso model
Iso modelIso model
Iso model
 
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
 
Week_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.pptWeek_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.ppt
 
NME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdfNME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdf
 
Sept 2017 network standards and models
Sept 2017   network standards and modelsSept 2017   network standards and models
Sept 2017 network standards and models
 
Lecture 01 {Introduction}.pptx
Lecture 01 {Introduction}.pptxLecture 01 {Introduction}.pptx
Lecture 01 {Introduction}.pptx
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
MUSIC.pptx
MUSIC.pptxMUSIC.pptx
MUSIC.pptx
 
Introduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptxIntroduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptx
 
6. Chapter_2_1_newversion1.pptxasasasdasdasda
6. Chapter_2_1_newversion1.pptxasasasdasdasda6. Chapter_2_1_newversion1.pptxasasasdasdasda
6. Chapter_2_1_newversion1.pptxasasasdasdasda
 
Powering the digital frontier with web technologies.
Powering the digital frontier with web technologies.Powering the digital frontier with web technologies.
Powering the digital frontier with web technologies.
 
Itmg360 chapter one_v05
Itmg360 chapter one_v05Itmg360 chapter one_v05
Itmg360 chapter one_v05
 
chapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdf
chapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdfchapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdf
chapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdf
 
Chapter 7 telecommunications the internet and wireless technology
Chapter 7 telecommunications the internet and wireless technologyChapter 7 telecommunications the internet and wireless technology
Chapter 7 telecommunications the internet and wireless technology
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Works
 
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless TechnologyMIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
 
Computer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptxComputer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptx
 

More from -

Introduction to computer (shaheen)
Introduction to computer (shaheen)Introduction to computer (shaheen)
Introduction to computer (shaheen)
-
 
Introduction to computer (boys scout)
Introduction to computer (boys scout)Introduction to computer (boys scout)
Introduction to computer (boys scout)
-
 
Hci with emotional intelligence
Hci with emotional intelligenceHci with emotional intelligence
Hci with emotional intelligence
-
 
Surf smart
Surf smartSurf smart
Surf smart
-
 
Planning presentation
Planning presentationPlanning presentation
Planning presentation
-
 
Cultural enviroment
Cultural enviromentCultural enviroment
Cultural enviroment
-
 
Quantitative approach
Quantitative approachQuantitative approach
Quantitative approach
-
 
Project vlm (al halal meat factory)
Project vlm (al halal meat factory)Project vlm (al halal meat factory)
Project vlm (al halal meat factory)
-
 
Cs ch08
Cs ch08Cs ch08
Cs ch08
-
 
Cs ch06
Cs ch06Cs ch06
Cs ch06
-
 
Cs ch03
Cs ch03Cs ch03
Cs ch03
-
 
Cs ch02
Cs ch02Cs ch02
Cs ch02
-
 
Cs ch01
Cs ch01Cs ch01
Cs ch01
-
 
Cs ch00
Cs ch00Cs ch00
Cs ch00
-
 

More from - (14)

Introduction to computer (shaheen)
Introduction to computer (shaheen)Introduction to computer (shaheen)
Introduction to computer (shaheen)
 
Introduction to computer (boys scout)
Introduction to computer (boys scout)Introduction to computer (boys scout)
Introduction to computer (boys scout)
 
Hci with emotional intelligence
Hci with emotional intelligenceHci with emotional intelligence
Hci with emotional intelligence
 
Surf smart
Surf smartSurf smart
Surf smart
 
Planning presentation
Planning presentationPlanning presentation
Planning presentation
 
Cultural enviroment
Cultural enviromentCultural enviroment
Cultural enviroment
 
Quantitative approach
Quantitative approachQuantitative approach
Quantitative approach
 
Project vlm (al halal meat factory)
Project vlm (al halal meat factory)Project vlm (al halal meat factory)
Project vlm (al halal meat factory)
 
Cs ch08
Cs ch08Cs ch08
Cs ch08
 
Cs ch06
Cs ch06Cs ch06
Cs ch06
 
Cs ch03
Cs ch03Cs ch03
Cs ch03
 
Cs ch02
Cs ch02Cs ch02
Cs ch02
 
Cs ch01
Cs ch01Cs ch01
Cs ch01
 
Cs ch00
Cs ch00Cs ch00
Cs ch00
 

Recently uploaded

Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 

Recently uploaded (20)

Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 

Cs ch04

  • 1. Chapter 4 Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved
  • 2. © 2007 Pearson Addison-Wesley. All rights reserved 0-2 Chapter 4: Networking and the Internet • 4.1 Network Fundamentals • 4.2 The Internet • 4.3 The World Wide Web • 4.4 Internet Protocols • 4.5 Security
  • 3. © 2007 Pearson Addison-Wesley. All rights reserved 0-3 Network Classifications • Scope – Local area network (LAN) – Metropolitan area (MAN) – Wide area network (WAN) • Topology (configuration) – Ring – Bus – Star
  • 4. © 2007 Pearson Addison-Wesley. All rights reserved 0-4 Figure 4.1 Network topologies
  • 5. © 2007 Pearson Addison-Wesley. All rights reserved 0-5 Figure 4.1 Network topologies (continued)
  • 6. © 2007 Pearson Addison-Wesley. All rights reserved 0-6 List of Problems (so far) • Topologies • Framing • Error control • Flow control • Multiple access – How to share a wire
  • 7. © 2007 Pearson Addison-Wesley. All rights reserved 0-7 Protocols • Token ring – Popular in ring networks – Possession of token provides right to introduce new message • CSMA/CD – Used in Ethernet – Silent bus provides right to introduce new message
  • 8. © 2007 Pearson Addison-Wesley. All rights reserved 0-8 Figure 4.2 Communication over a ring network
  • 9. © 2007 Pearson Addison-Wesley. All rights reserved 0-9 Figure 4.3 Communication over a bus network
  • 10. © 2007 Pearson Addison-Wesley. All rights reserved 0-10 Connecting Networks • Repeater: Extends a network • Bridge: Connects two compatible networks • Switch: Connect several compatible networks • Router: Connects two incompatible networks resulting in a network of networks called an internet
  • 11. © 2007 Pearson Addison-Wesley. All rights reserved 0-11 Figure 4.4 Building a large bus network from smaller ones
  • 12. © 2007 Pearson Addison-Wesley. All rights reserved 0-12 Figure 4.5 A router connecting a bus network to a star network
  • 13. © 2007 Pearson Addison-Wesley. All rights reserved 0-13 Inter-process Communication • Client-server – One server, many clients – Server must execute continuously – Client initiates communication • Peer-to-peer (P2P) – Two processes communicating as equals – Peer processes can be short-lived
  • 14. © 2007 Pearson Addison-Wesley. All rights reserved 0-14 Figure 4.6 The client/server model compared to the peer-to-peer model
  • 15. © 2007 Pearson Addison-Wesley. All rights reserved 0-15 Distributed Systems • Systems with parts that run on different computers – Infrastructure can be provided by standardized toolkits • Example: Enterprise Java Beans from Sun Microsystems • Example: .NET framework from Microsoft
  • 16. © 2007 Pearson Addison-Wesley. All rights reserved 0-16 The Internet • The Internet: An internet that spans the world – Original goal was to develop a means of connecting networks that would not be disrupted by local disasters. – Today it has shifted from an academic research project to a commercial undertaking.
  • 17. © 2007 Pearson Addison-Wesley. All rights reserved 0-17 Internet Architecture • Domain: A portion of the Internet that network or internet controlled by a single authority – Connected to the rest of the Internet (the cloud) by a router called a gateway • Internet Corporation for Assigned Names & Numbers (ICANN): Oversees the registration of domains • Domain Name (www.cs.gsu.edu)
  • 18. © 2007 Pearson Addison-Wesley. All rights reserved 0-18 Figure 4.7 A typical approach to connecting to the Internet
  • 19. © 2007 Pearson Addison-Wesley. All rights reserved 0-19 Strategies for connecting to the Internet • Internet Service Provider (ISP): Provides connectivity to the Internet • Popular means of connecting: – Traditional telephone (dial up connection) – Cable connections – DSL (Digital Subscriber Line ) – Wireless
  • 20. © 2007 Pearson Addison-Wesley. All rights reserved 0-20 Internet Addressing: IP Addresses • IP address: 32 bit identifier for a machine (currently being expanded to a 128 bit system) – Network identifier: Assigned by ICANN – Host address: Assigned by domain administrator • Dotted decimal notation: Common notation for displaying IP addresses – Example: 192.207.177.133
  • 21. © 2007 Pearson Addison-Wesley. All rights reserved 0-21 Internet Addressing: Host Names • Mnemonic address made up of two parts: – Domain name • Assigned by a registrar • Example: gsu.edu • Top level domain: Classification of domain owner – By usage – Example: .com = commercial – By country – Example: .au = Australia – Subdomains and individual host names • Assigned by domain owner • Example: r2d2.compsci.nowhereu.edu • Translation between mnemonic addresses and IP addresses handled by name servers .
  • 22. © 2007 Pearson Addison-Wesley. All rights reserved 0-22 Traditional Internet Applications • Electronic Mail (email) – Domain mail server collects incoming mail and transmits outing mail – Mail server delivers collected incoming mail to clients via POP3 or IMAP • File Transfer Protocol (FTP) • Telnet and SSH
  • 23. © 2007 Pearson Addison-Wesley. All rights reserved 0-23 Internet Software Layers • Application: Constructs message with address • Transport: Chops message into packets • Network: Handles routing through the Internet • Link: Handles actual transmission of packets
  • 24. © 2007 Pearson Addison-Wesley. All rights reserved 0-24 Figure 4.12 Package-shipping example
  • 25. © 2007 Pearson Addison-Wesley. All rights reserved 0-25 Figure 4.13 The Internet software layers
  • 26. © 2007 Pearson Addison-Wesley. All rights reserved 0-26 Figure 4.14 Following a message through the Internet
  • 27. © 2007 Pearson Addison-Wesley. All rights reserved 0-27 Layering: logical communication application transport network link application transport network link application transport network link application transport network link network link physical data data E.g.: transport • take data from app • add addressing, reliability check info to form “datagram” • send datagram to peer • wait for peer to ack receipt • analogy: post office data transport transport ack
  • 28. © 2007 Pearson Addison-Wesley. All rights reserved 0-28 Layering: physical communication application transport network link application transport network link application transport network link application transport network link network link data data
  • 29. © 2007 Pearson Addison-Wesley. All rights reserved 0-29 Protocol layering and data Each layer takes data from above • adds header information to create new data unit (“encapsulation”) • passes new data unit to layer below source destination datagram application transport network link application transport network link M M M M Ht HtHn HtHnHl M M M M Ht HtHn HtHnHl message segment frame
  • 30. © 2007 Pearson Addison-Wesley. All rights reserved 0-30 Applications and app-layer protocols Application: communicating, distributed processes – running in network hosts in “user space” – exchange messages to implement app – e.g., email, file transfer, the Web Application-layer protocols – one “piece” of an app – define messages exchanged by apps and actions taken – user services provided by lower layer protocols application transport network data link application transport network data link application transport network data link
  • 31. © 2007 Pearson Addison-Wesley. All rights reserved 0-31 Network applications: some jargon • A process is a program that is running within a host. • Within the same host, two processes communicate with interprocess communication defined by the OS. • Processes running in different hosts communicate with an application-layer protocol • A user agent is an interface between the user and the network application. – Web:browser – E-mail: mail reader – streaming audio/video: media player
  • 32. © 2007 Pearson Addison-Wesley. All rights reserved 0-32 Application-layer protocols API: application programming interface • defines interface between application and transport layer • socket: Internet API – two processes communicate by sending data into socket, reading data out of socket Q: how does a process “identify” the other process with which it wants to communicate? – IP address of host running other process – “port number” - allows receiving host to determine to which local process the message should be delivered
  • 33. © 2007 Pearson Addison-Wesley. All rights reserved 0-33 TCP/IP Protocol Suite • Transport Layer – TCP – UDP • Network Layer – IP (IPv4 and IPv6)
  • 34. © 2007 Pearson Addison-Wesley. All rights reserved 0-34 Figure 4.15 Choosing between TCP and UDP
  • 35. © 2007 Pearson Addison-Wesley. All rights reserved 0-35 Security • Attacks – Malware (viruses, worms, Trojan horses, spyware, phishing software) – Denial of service – Spam • Protection – Firewalls – Spam filters – Proxy Servers – Antivirus software
  • 36. © 2007 Pearson Addison-Wesley. All rights reserved 0-36 Encryption • FTPS, HTTPS, SSL • Public-key Encryption – Public key: Used to encrypt messages – Private key: Used to decrypt messages • Certificates and Digital Signatures
  • 37. © 2007 Pearson Addison-Wesley. All rights reserved 0-37 Figure 4.16 Public-key encryption
  • 38. © 2007 Pearson Addison-Wesley. All rights reserved 0-38 World Wide Web • Hypertext and HTTP • Browser gets documents from Web server • Documents identified by URLs
  • 39. © 2007 Pearson Addison-Wesley. All rights reserved 0-39 Figure 4.8 A typical URL
  • 40. © 2007 Pearson Addison-Wesley. All rights reserved 0-40 Hypertext Document Format • Entire document is printable characters • Contains tags to communicate with browser – Appearance • <h1> to start a level one heading • <p> to start a new paragraph – Links to other documents and content • <a href = . . . > – Insert images • <img src = . . . >
  • 41. © 2007 Pearson Addison-Wesley. All rights reserved 0-41 Figure 4.9 A simple Web page
  • 42. © 2007 Pearson Addison-Wesley. All rights reserved 0-42 Figure 4.9 A simple Web page (continued)
  • 43. © 2007 Pearson Addison-Wesley. All rights reserved 0-43 Figure 4.10 An enhanced simple Web page
  • 44. © 2007 Pearson Addison-Wesley. All rights reserved 0-44 Figure 4.10 An enhanced simple Web page (continued)
  • 45. © 2007 Pearson Addison-Wesley. All rights reserved 0-45 Extensible Markup Language (XML) • XML: A language for constructing markup languages similar to HTML – A descendant of SGML – Opens door to a World Wide Semantic Web
  • 46. © 2007 Pearson Addison-Wesley. All rights reserved 0-46 Using XML <staff clef = “treble”> <key>C minor</key> <time> 2/4 </time> <measure> < rest> egth </rest> <notes> egth G, egth G, egth G </notes></measure> <measure> <notes> hlf E </notes></measure> </staff>
  • 47. © 2007 Pearson Addison-Wesley. All rights reserved 0-47 Figure 4.11 The first two bars of Beethoven’s Fifth Symphony
  • 48. © 2007 Pearson Addison-Wesley. All rights reserved 0-48 Client Side Versus Server Side • Client-side activities – Examples: java applets, javascript, Macromedia Flash • Server-side activities – Common Gateway Interface (CGI) – Servlets – PHP

Editor's Notes

  1. ISP construct and maintain the Internet infrastructure ; provide a significant portion of the computing resources such as data storage and data processing services
  2. Network identifier Host address