0% found this document useful (0 votes)
10 views

4 Network

This document discusses networking and the internet. It covers topics like network fundamentals, protocols, internet architecture, applications and the world wide web. Specifically, it describes network classifications based on scope, ownership and topology. It also explains protocols like CSMA/CD and CSMA/CA. The document outlines internet addressing and applications such as email, file transfer and voice over IP. It provides details on the world wide web including hypertext, browsers, URLs and markup languages like HTML and XML. Security measures for the internet are also summarized.

Uploaded by

coco fina
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

4 Network

This document discusses networking and the internet. It covers topics like network fundamentals, protocols, internet architecture, applications and the world wide web. Specifically, it describes network classifications based on scope, ownership and topology. It also explains protocols like CSMA/CD and CSMA/CA. The document outlines internet addressing and applications such as email, file transfer and voice over IP. It provides details on the world wide web including hypertext, browsers, URLs and markup languages like HTML and XML. Security measures for the internet are also summarized.

Uploaded by

coco fina
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 41

Networking and the Internet

Computer Science: An Overview


Tenth Edition

by
Kai-Lung Hua
Networking and the Internet

• 1 Network Fundamentals
• 2 The Internet
• 3 The World Wide Web
• 4 Internet Protocols
• 5 Security

4-2
Network Classifications

• Scope
– Local area network (LAN)
– Metropolitan area (MAN)
– Wide area network (WAN)
• Ownership
– Closed versus open
• Topology (configuration)
– Bus (Ethernet)
– Star (Wireless networks with central Access
Point)

4-3
Figure 4.1 Network topologies

4-4
Figure 4.1 Network topologies
(continued)

4-5
Protocols

• CSMA/CD
– Used in Ethernet
– Silent bus provides right to introduce new
message
• CSMA/CA
– Used in WiFi
– Hidden terminal problem

4-6
Figure 4.2 Communication over a
bus network

4-7
Figure 4.3 The hidden terminal
problem

4-8
Connecting Networks

• Repeater: Extends a network


• Bridge: Connects two compatible networks
• Switch: Connect several compatible networks
• Router: Connects two incompatible networks
resulting in a network of networks called an
internet

4-9
Figure 4.4 Building a large bus
network from smaller ones

4-10
Figure 4.5 Routers connecting two
WiFi networks and an Ethernet
network to form an internet

4-11
Inter-process Communication

• Client-server
– One server, many clients
– Server must execute continuously
– Client initiates communication
• Peer-to-peer (P2P)
– Two processes communicating as equals
– Peer processes can be short-lived

4-12
Figure 4.6 The client/server model
compared to the peer-to-peer model

4-13
Distributed Systems

• Systems with parts that run on different


computers
– Infrastructure can be provided by standardized
toolkits
• Example: Enterprise Java Beans from Sun
Microsystems
• Example: .NET framework from Microsoft

4-14
The Internet

• The Internet: An internet that spans the


world
– Original goal was to develop a means of
connecting networks that would not be
disrupted by local disasters.
– Today it has shifted from an academic
research project to a commercial undertaking.

4-15
Internet Architecture

• Internet Service Provider (ISP)


– Tier-1
– Tier-2
• Access ISP: Provides connectivity to the
Internet
– Traditional telephone (dial up connection)
– Cable connections
– DSL
– Wireless

4-16
Figure 4.7 Internet Composition

4-17
Internet Addressing

• IP address: pattern of 32 or 128 bits often


represented in dotted decimal notation
• Mnemonic address:
– Domain names
– Top-Level Domains
• Domain name system (DNS)
– Name servers
– DNS lookup

4-18
Internet Corporation for Assigned
Names & Numbers (ICANN)
• Allocates IP addresses to ISPs who then
assign those addresses within their regions.
• Oversees the registration of domains and
domain names.

4-19
Traditional Internet Applications

• Electronic Mail (email)


– Domain mail server collects incoming mail and
transmits outing mail
– Mail server delivers collected incoming mail to
clients via POP3 or IMAP
• File Transfer Protocol (FTP)
• Telnet and SSH

4-20
More Recent Applications

• Voice Over IP (VoIP)


• Internet Radio
– N-unicast
– Multicast

4-21
World Wide Web

• Hypertext and HTTP


• Browser gets documents from Web server
• Documents identified by URLs

4-22
Figure 4.8 A typical URL

4-23
Hypertext Document Format
• Encoded as text file
• Contains tags to communicate with browser
– Appearance
• <h1> to start a level one heading
• <p> to start a new paragraph
– Links to other documents and content
• <a href = . . . >
– Insert images
• <img src = . . . >
4-24
Figure 4.9 A simple Web page

4-25
Figure 4.9 A simple Web page
(continued)

4-26
Figure 4.10 An enhanced simple Web
page

4-27
Figure 4.10 An enhanced simple Web
page (continued)

4-28
Extensible Markup Language (XML)

• XML: A language for constructing markup


languages similar to HTML
– A descendant of SGML
– Opens door to a World Wide Semantic Web

4-29
Using XML

<staff clef = “treble”> <key>C minor</key>


<time> 2/4 </time>
<measure> < rest> egth </rest> <notes>
egth G,
egth G, egth G </notes></measure>
<measure> <notes> hlf E
</notes></measure>
</staff>

4-30
Figure 4.11 The first two bars of
Beethoven’s Fifth Symphony

4-31
Client Side Versus Server Side

• Client-side activities
– Examples: java applets, javascript,
Macromedia Flash
• Server-side activities
– Common Gateway Interface (CGI)
– Servlets
– PHP

4-32
Figure 4.12 Package-shipping
example

4-33
Internet Software Layers

• Application: Constructs message with


address
• Transport: Chops message into packets
• Network: Handles routing through the
Internet
• Link: Handles actual transmission of
packets

4-34
Figure 4.13 The Internet
software layers

4-35
Figure 4.14 Following a message
through the Internet

4-36
TCP/IP Protocol Suite

• Transport Layer
– TCP
– UDP
• Network Layer
– IP (IPv4 and IPv6)

4-37
Figure 4.15 Choosing between TCP
and UDP

4-38
Security

• Attacks
– Malware (viruses, worms, Trojan horses,
spyware, phishing software)
– Denial of service
– Spam
• Protection
– Firewalls
– Spam filters
– Proxy Servers
– Antivirus software

4-39
Encryption

• FTPS, HTTPS, SSL


• Public-key Encryption
– Public key: Used to encrypt messages
– Private key: Used to decrypt messages
• Certificates and Digital Signatures

4-40
Figure 4.16 Public-key encryption

4-41

You might also like