0% found this document useful (0 votes)
83 views24 pages

CS 108 Week 11 Computer Networks

This document summarizes a lecture on computer networks. It discusses [1] hardware connections within local and wide area networks, [2] how different networks interconnect through devices like modems, and [3] the software protocols that allow computers to communicate through common languages like packets and protocols. It also covers topics like spoofing, sniffing, phishing, streaming media, and some social effects of the internet.

Uploaded by

Farshad yazdi
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
83 views24 pages

CS 108 Week 11 Computer Networks

This document summarizes a lecture on computer networks. It discusses [1] hardware connections within local and wide area networks, [2] how different networks interconnect through devices like modems, and [3] the software protocols that allow computers to communicate through common languages like packets and protocols. It also covers topics like spoofing, sniffing, phishing, streaming media, and some social effects of the internet.

Uploaded by

Farshad yazdi
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

CS 108 Week 11

Computer Networks

Lee Jae-Shin
Announcements
 Project plan due today
 URL posting: replying starts tomorrow. 3rd
posting starts next week.
 Feedback today: Quiz next week (from
today’s or next week’s lecture).
 Spyware remover available to download
 Book pages: 1-34, 92-99, 137-171, 182-
187, 207-end
Last Week
 HTML: Text only. Media files are linked to HTML
 Flat vs. hierarchical structure
 HCI: human factors
 Iterative design
 User feedback: find good test users first
 Usability and eye-tracking
 Trends: Convergence to the Web
 Security and privacy issues
From a PC to the Net
 PC + PC = LAN (Local Area Network)
 Sometimes called “Ethernet”
 Home & office network: wire vs. wireless
 LAN + LAN = WAN (Wide Area Networks)
 Telephone network is an analog WAN
 WAN + WAN = Internet
1. Hardware Connections
 LAN (Local Area Network)
 Small area connections (office, school, and home)

RJ-45
Cables
WAN (Wide Area Network)
 Telephone network is an analog WAN.
 Internet is a digital WAN.
 Usually, the telephone network and Internet are
linked together (via modem).
Interconnecting Home Office
Different Networks
Analog voice network
(telephone network)

 How do we
interconnect ?
two different
networks?:
Modem Digital data
network

Internet LAN
Broadband Network Connections
a. Coaxial cable: cable modem
b. Telephone lines: DSL (Digital Subscriber Line)
c. Fiber optic cable: used for backbones
d. Satellite: transponder for receiving signals

a. Coaxial Cable
b. DSL (Digital Subscriber Line)
 A DSL modem on your
phone line splits your
single phone line into two
frequencies - one for data
and one for voice/fax.
 This allows you to make
and receive phone/fax
calls without interrupting
your Internet connection.
c. Fiber Optic Cable
 Sending light signals through
the cable
 Light has to remain inside the
cable
d. Satellites Orbiting the Earth
Satellite Network
Connects physically
separate networks
Iridium: Connection from Anywhere in the World

By Motorola. Too costly. Eventually failed and stopped after a few years of service.
2. Software connections
• How do they talk to each
other?
• They need a common
language with certain sets
of words.

• How computers talk to each other?


• Common language or rule: Protocol
• Word: Packet (Unit of information)
What is a Packet?
 A packet is the unit of data that is routed
between an origin and a destination on the
Internet or any other packet-switched
network.
 A packet is composed of actual data and
other auxiliary information regarding the
origin, destination, error correction, etc.

Actual data
Packet Structure (an example)
What is a Protocol?
 A special set of rules that end points in a
telecommunication connection use when
they communicate.
 Various protocols exist at several levels in
a telecommunication connection.
 Basically, a protocol is a rule for delivering
a packet to another end point.
Address, error correction, etc.

Packet

Actual data Protocol Information


Why So Many Protocols?
 Think a packet as a gift that you want to send to
your friend in another country.
 Protocols are the rules that you have to follow for
your gift to arrive safely to your friend.
 In this case, you have rules for wrapping the gift,
writing your friend’s address, postage stamps, etc.
 These different rules are similar to various
protocols used for packet exchange in
telecommunication networks.
 Different types of communication connection can
have different protocols.
Spoofing and Sniffing
 Spoofing is the creation of packets using
somebody else's IP (Internet Protocol) address.
 ex) assigning hacker’s IP to someone else’s packet
and redirecting from the original host to the hacker's
host
 A packet sniffer is a wire-tap devices that plugs
into computer networks and eavesdrops on the
network traffic.
 ex) Automatic sifting of clear-text passwords and
usernames from the network. Used hackers/crackers
in order to break into systems.
Phishing
 The act of sending an e-mail to a user falsely claiming to be an
established legitimate enterprise in an attempt to scam the user into
surrendering private information that will be used for identity theft.
The e-mail directs the user to visit a Web site where they are asked
to update personal information, such as passwords and credit card,
social security, and bank account numbers, that the legitimate
organization already has. The Web site, however, is bogus and set
up only to steal the user’s information.

Which is real? ⇒ Check the URL!!


Internet Address System
 URL: Uniform Resource Locator
 http://www.ntu.edu.sg
 http://www.ntu.edu.sg/index.htm
File Name
Server IP Address

Protocol
Each server has its
own IP number.

ftp://132.236.225.125/myfile.zip
mms://movie.cinema.com/dance.asf
Streaming
 Servers send continuous stream of short files to
users for near-real time playback.
 Users can play part of music/video files not
waiting for the entire file to arrive.
 Files usually compressed to speed up transfer.
 Requires specially designed protocols.
• ex) mms://movie.cinema.com/dance.asf
Microsoft Media Server protocol

• ex) rtsp://video.realaudio.com/real.ra
Used be for RealAudio but now supported by MS
Reason for Different Standards
 War on Standards
 Standard means money
 RealAudio vs. Microsoft
 ICQ, Yahoo, and MSN Messenger
 What about monopoly?
 Is universal standard always good?
 compatibility vs. security
 ex) virus attack to MS Windows
Antisocial Effects of the Internet

 Easy access to adult content


 Computer anxiety: Fear of computers. High for
women and people with low mathematical skills.
 Addiction: Addicted to games or web surfing. Not
a serious threat yet. Increasing concerns about
children addicted to games.
- Check out your computer addiction:
http://courses.cs.vt.edu/professionalism/Workpla
ce/Addiction.test.html

You might also like