Chapter 10
Chapter 10
The Internet
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 2
© 2016. Cengage Learning. All Rights Reserved.
After reading this chapter,
you should be able to (continued):
• Identify the relationships between TCP/IP and
the protocols ICMP, UDP, ARP, DHCP, NAT,
and tunneling protocols
• Describe the responsibility of the Domain Name
System and how it converts a URL into a dotted
decimal IP address
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 3
© 2016. Cengage Learning. All Rights Reserved.
After reading this chapter,
you should be able to (continued):
• Describe the major Internet applications and
services
• Recognize that the Internet is constantly
evolving and that IPv6 and Internet2
demonstrate that evolution
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 4
© 2016. Cengage Learning. All Rights Reserved.
Introduction
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 6
© 2016. Cengage Learning. All Rights Reserved.
Internet Protocols
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 7
© 2016. Cengage Learning. All Rights Reserved.
Internet Protocols (continued)
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 8
© 2016. Cengage Learning. All Rights Reserved.
Internet Protocols (continued)
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 9
© 2016. Cengage Learning. All Rights Reserved.
The Internet Protocol (IP)
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 10
© 2016. Cengage Learning. All Rights Reserved.
The Internet Protocol (IP) (continued)
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 11
© 2016. Cengage Learning. All Rights Reserved.
The Internet Protocol (IP) (continued)
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 12
© 2016. Cengage Learning. All Rights Reserved.
IPv4
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 13
© 2016. Cengage Learning. All Rights Reserved.
The IPv4 Header/Datagram
Figure 10-4
Format of the
IPv4 datagram
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 14
© 2016. Cengage Learning. All Rights Reserved.
IPv4
• Fragmenting an IPv4 datagram is performed by
the Offset and More fields. Offset value is in
multiples of 8 bytes
Figure 10-5
Division of an IPv4
datagram into three
fragments
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 15
© 2016. Cengage Learning. All Rights Reserved.
IPv4 Addresses
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 16
© 2016. Cengage Learning. All Rights Reserved.
IPv4 Addresses (continued)
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 17
© 2016. Cengage Learning. All Rights Reserved.
IPv4 Addresses (continued)
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 18
© 2016. Cengage Learning. All Rights Reserved.
IPv4 Addresses (continued)
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 19
© 2016. Cengage Learning. All Rights Reserved.
IPv4 Addresses (continued)
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 20
© 2016. Cengage Learning. All Rights Reserved.
IPv4 Addresses (continued)
• IP subnet masking
– Sometimes you have a large number of IP
addresses to manage
– By using subnet masking, you can break the host
ID portion of the address into a subnet ID and
host ID
– Example – subnet mask 255.255.255.0 applied to
a class B address will break the host ID (normally
16 bits) into an 8-bit subnet ID and an 8-bit host
ID
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 21
© 2016. Cengage Learning. All Rights Reserved.
IPv4 Addresses (continued)
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 22
© 2016. Cengage Learning. All Rights Reserved.
IPv4 Addresses (continued)
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 23
© 2016. Cengage Learning. All Rights Reserved.
Classless IPv4 Addresses
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 24
© 2016. Cengage Learning. All Rights Reserved.
Classless IPv4 Addresses
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 25
© 2016. Cengage Learning. All Rights Reserved.
IPv6
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 26
© 2016. Cengage Learning. All Rights Reserved.
IPv6 (continued)
Figure 10-6
The fields in the
IPv6 header
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 27
© 2016. Cengage Learning. All Rights Reserved.
IPv6 Addresses
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 28
© 2016. Cengage Learning. All Rights Reserved.
IPv6 Addresses
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 29
© 2016. Cengage Learning. All Rights Reserved.
IPv6 Addresses
• can be abbreviated as
6A3E : BA91 : : 877B : FFEF
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 30
© 2016. Cengage Learning. All Rights Reserved.
The Transmission Control Protocol (TCP)
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 31
© 2016. Cengage Learning. All Rights Reserved.
The Transmission Control Protocol (TCP)
(continued)
• The TCP layer can ensure that the receiver is
not overrun with data (end-to-end flow control)
using the Window field
• TCP can perform end-to-end error correction
– Checksum
• TCP allows for the sending of high priority data
– Urgent Pointer
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 32
© 2016. Cengage Learning. All Rights Reserved.
The Transmission Control Protocol (TCP)
(continued)
Figure 10-7
The fields of
the TCP
header
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 33
© 2016. Cengage Learning. All Rights Reserved.
Internet Control Message Protocol (ICMP)
• ICMP
– Used by routers and nodes
– Performs error reporting for the Internet Protocol
• ICMP reports errors such as invalid IP address,
invalid port address, and the packet has hopped
too many times
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 34
© 2016. Cengage Learning. All Rights Reserved.
User Datagram Protocol (UDP)
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 35
© 2016. Cengage Learning. All Rights Reserved.
Multiprotocol Label Switching
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 36
© 2016. Cengage Learning. All Rights Reserved.
Multiprotocol Label Switching
Figure 10-8
Two MPLS
headers and
their four fields
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 37
© 2016. Cengage Learning. All Rights Reserved.
Address Resolution Protocol (ARP)
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 39
© 2016. Cengage Learning. All Rights Reserved.
Dynamic Host Configuration Protocol
(DHCP) (continued)
• The address assigned by DHCP server is
temporary
– Part of agreement includes specific period of time
• If no time period specified, the default is one hour
– DHCP clients may negotiate for a renewal before
the time period expires
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 40
© 2016. Cengage Learning. All Rights Reserved.
Network Address Translation (NAT)
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 41
© 2016. Cengage Learning. All Rights Reserved.
Network Address Translation (NAT)
(continued)
• Since the outside world cannot see into LAN,
you do not need to use registered IP addresses
on inside LAN
• We can use the following blocks of addresses
for private use:
– 10.0.0.0 – 10.255.255.255
– 172.16.0.0 – 172.31.255.255
– 192.168.0.0 – 192.168.255.255
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 42
© 2016. Cengage Learning. All Rights Reserved.
Network Address Translation (NAT)
(continued)
• When a user on inside sends packet to outside,
the NAT interface changes the user’s inside
address to global IP address
– This change is stored in a cache
• When the response comes back, the NAT looks
in cache and switches the addresses back
– If not the packet is dropped
• Unless NAT has a service table of fixed IP address
mappings
– This service table allows packets to originate from
the outside
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 43
© 2016. Cengage Learning. All Rights Reserved.
Tunneling Protocols and Virtual Private
Networks (VPNs)
• The Internet is not normally a secure system
• If person wants to use Internet to access
corporate computer system, how can a secure
connection be created?
– One possible technique is by creating a virtual
private network (VPN)
• VPN creates a secure connection through the
Internet by using a tunneling protocol
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 44
© 2016. Cengage Learning. All Rights Reserved.
The World Wide Web
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 45
© 2016. Cengage Learning. All Rights Reserved.
Locating a Document on the Internet
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 46
© 2016. Cengage Learning. All Rights Reserved.
Locating a Document on the Internet
(continued)
Figure 10-9
The parts of a
Uniform Resource
Locator (URL) for
HTTP (a) and FTP
(b)
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 47
© 2016. Cengage Learning. All Rights Reserved.
Locating a Document on the Internet
(continued)
• When a user, running a Web browser, enters a URL, how
is URL translated into an IP address?
– Domain Name System (DNS) – large, distributed
database of URLs and IP addresses
• The first operation performed by DNS is to query a local
database for URL/IP address information
– If local server does not recognize address, the server at next
level will be queried
– Eventually root server for URL/IP addresses will be queried
» If root server has answer, results are returned
» If root server recognizes domain name but not extension in
front of domain name, root server will query server at
domain name’s location
» When domain’s server returns results, they are passed back
through chain of servers (and their caches)
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 48
© 2016. Cengage Learning. All Rights Reserved.
Internet Services
• The Internet provides many types of services, including
several very common ones:
– Electronic mail (e-mail)
– File transfer protocol (FTP)
– Remote login (Telnet)
– VoIP (Voice over IP)
– Listservs
– Streaming audio and video
– Instant Messaging, Tweets, and Blogs
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 49
© 2016. Cengage Learning. All Rights Reserved.
Electronic Mail (e-mail)
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 51
© 2016. Cengage Learning. All Rights Reserved.
Remote Login (Telnet)
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 52
© 2016. Cengage Learning. All Rights Reserved.
Voice Over IP (VoIP)
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 53
© 2016. Cengage Learning. All Rights Reserved.
Voice Over IP (continued)
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 54
© 2016. Cengage Learning. All Rights Reserved.
Voice Over IP (continued)
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 55
© 2016. Cengage Learning. All Rights Reserved.
Voice Over IP (continued)
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 56
© 2016. Cengage Learning. All Rights Reserved.
Voice Over IP (continued)
• ENUM
– A protocol that supports VoIP
– Converts telephone numbers to fully qualified
domain name addresses
– Example – telephone number (312) 555-1212 will
be converted to 2.1.2.1.5.5.5.2.1.3.1.e164.arpa
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 57
© 2016. Cengage Learning. All Rights Reserved.
Listservs
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 58
© 2016. Cengage Learning. All Rights Reserved.
Streaming Audio and Video
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 59
© 2016. Cengage Learning. All Rights Reserved.
Instant Messaging, Tweets, and Blogs
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 60
© 2016. Cengage Learning. All Rights Reserved.
The Internet and Business
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 61
© 2016. Cengage Learning. All Rights Reserved.
Cookies and State Information
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 62
© 2016. Cengage Learning. All Rights Reserved.
Intranets and Extranets
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 63
© 2016. Cengage Learning. All Rights Reserved.
The Future of the Internet
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 64
© 2016. Cengage Learning. All Rights Reserved.
Internet2
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 65
© 2016. Cengage Learning. All Rights Reserved.
The Internet In Action: A Company Creates
a VPN
• A fictitious company wants to allow 3500 of its
workers to work from home
• If all 3500 users used a dial-in service, the
telephone costs would be very high
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 66
© 2016. Cengage Learning. All Rights Reserved.
The Internet In Action: A Company Creates
a VPN (continued)
Figure 10-10
CompuCom
employees
dialing directly
into the
corporate
computing
center
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 67
© 2016. Cengage Learning. All Rights Reserved.
The Internet In Action: A Company Creates
a VPN (continued)
• Instead, the company will require each user to
access the Internet via their local Internet
service provider
– This local access will help keep telephone costs
low
– Then, once on Internet, company will provide
software to support virtual private networks
– The virtual private networks will create secure
connections from the users’ homes into the
corporate computer system
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 68
© 2016. Cengage Learning. All Rights Reserved.
The Internet In Action: A Company Creates
a VPN (continued)
Figure 10-11
CompuCom’s
employees
using a tunnel
across the
Internet into
the corporate
computing
center
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 69
© 2016. Cengage Learning. All Rights Reserved.
Summary
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 70
© 2016. Cengage Learning. All Rights Reserved.
Summary (continued)
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 71
© 2016. Cengage Learning. All Rights Reserved.
Summary (continued)
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 72
© 2016. Cengage Learning. All Rights Reserved.
Summary (continued)
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 73
© 2016. Cengage Learning. All Rights Reserved.
Summary (continued)
Data Communications and Computer Networks: A Business User's Approach, Eighth Edition 74
© 2016. Cengage Learning. All Rights Reserved.