C6107 Information Technology in Construction
C6107 Information Technology in Construction
TABLE OF CONTENTS
Page
Introduction 1
Internetworking Technology 1
History of Internet 1
Framework of Internet 4
Server-Client Environment 4
Local Area Network (LAN) Types 4
Wiring Standards for Network Communications 5
Network Transmission 6
Circuit Switching 6
Packet Switching 7
Message Switching 8
Intranet and Extranet 8
TCP/IP 8
IP Address Classes 9
Subnet Masks 11
Internet Applications 13
Electronic Mail (E-mail) 13
Newsgroups 13
File Transfer – FTP 14
Remote Login – rlogin / telnet 16
World Wide Web – HTTP 17
Advanced Knowledge 19
Internet Protocol Stack 19
Network Security 20
INTRODUCTION
Internetworking Technology
The Internet technology hides the details of network hardware, and permits
computers to communicate independently of their physical network
connections.
The Internet technology is an example of open system interconnection. It is
called open because, unlike proprietary communication system available from
one specific vendor, the specifications are publicly available. Anyone can
build the software needed to communicate across the Internet.
“Internet” specially refers to the global Internet, while “internet” refers to
private internets that use TCP/IP technology.
History of Internet
(Source: http://www.zakon.org/robert/internet/timeline/)
1965: TX-2 at MIT Lincoln Lab and AN/FSQ-32 at System Development
Corporation (Santa Monica, CA) were directly linked (without packet switches
or routers) via a dedicated 1200 bps phone line.
#2 #4
SRI Utah
PDP-10
#3
IBM 360
UCSB
#1
UCLA
Sigma 7
FRAMEWORK OF INTERNET
Server-Client Environment
Servers store application programs and information; clients retrieve needed
information or execute programs from servers.
Advantages: efficiency, effectiveness, high accessibility, easy management
Disadvantages: once the server(s) down, the whole system down
Remedies: regular maintenance, backup server(s)
Star
Linear
Bus / Multidrop
Hybrid
Ring
Point-to-Point
Gateway
Network Transmission
Circuit Switching: In circuit-switched networks, the resources needed along a
path (buffers, link bandwidth) to provide for communication between the end
systems are reserved for the duration of the session. When two hosts desire to
communicate, the network establishes a dedicated end-to-end circuit between
two hosts. Example: telephone networks. Opponents to circuit switching have
argued that circuit switching is wasteful because the dedicated circuits are idle
during silent periods.
FDM: 4 KHz
bandwidth
4 KHz
TDM:
1 2 3 4 1 2 3 4 1 2 3 4 bandwidth
Slot Frame
Host A C
F Host B
In the above figure, the sequence of packets from A and B does not follow
any periodic ordering; the ordering is random or statistical because packets
are transmitted whenever they appear at the link. Thus, it is often said that
the packet switching employs statistical multiplexing.
Message Switching: A packet-switched network performs message switching
if the message to be transmitted is not segmented (and transmitted as a whole).
TCP/IP
TCP provides a connection-oriented service to its applications. The service
includes guaranteed delivery of application-layer messages to the destination
and flow control (i.e., sender/receiver speed matching). TCP also segments
long messages into shorter segments and provides a congestion control
mechanism, so that a source throttles its transmission rate when the network is
congested.
IP Address Classes
A Class A address allocates 8 bits to the network portion of the address and 24
bits to the host portion of the address. A Class A address has a first octet value
between 1 and 126. (The value 0 cannot be used as a network ID and the value
127 is reserved for loopback functions.) These numbers are represented in
binary by patterns that resemble 0#######. This allows for 126 distinct
octet value between 240 and 255. This is represented in binary with values that
match the pattern 1111####.
General guidelines for IP addressing:
All hosts on the same physical network segment should have the same
network ID. (Example: Computers in NTU have IPs of the form
155.69.xxx.xxx, where “155” indicates the Class B addressing.)
A network ID can never be 127. This value has been reserved for
loopback functions.
A network ID cannot be all 1s. This represents a broadcast address.
Neither can a host address be all 1s.
A network ID cannot be all 0s. This represents the local network.
Neither can a host address be all 0s. It is customary to represent a
network using the network portion of the ID with a host ID set to all
0s. This cannot be allocated to an individual host.
Subnet Masks
Subnet masks designate which bits of an IP address represent the network
portion and which bits represent the host portion. Default subnet masks are
used with Class A, Class B, and Class C IP addresses, as follows:
Class A – 255.0.0.0
Class B – 255.255.0.0
Class C – 255.255.255.0
INTERNET APPLICATIONS
Newsgroups
Newsgroups provide mail-like messages and discussions to a large group of
users.
Users have to subscribe to a newsgroup before they can read and submit
messages from and to the newsgroup.
Currently over 5000 newsgroups have been established, which cover a wide
variety of different topics.
ADVANCED KNOWLEDGE
Layer 5 Application
Layer 4 Transport
Layer 3 Network
Layer 2 Link
Layer 1 Physical
The job of the physical layer is to move the individual bits within the frame
from one node to the next, while the job of the link layer is to move entire
frames from one network element to an adjacent network element. For
instance, Ethernet has many physical layer protocols: one for twisted-pair
copper wires, another for coaxial cable, another for fiber, and so forth. In each
case, a bit is moved across the link in a different way.
Network Security
Three steps of hacking:
Footpring: Footprint is the fine art of gathering target information,
such as IP, domain name, TCP/UDP services executed in the target
machine, etc.
Port Scanning: To identify listening TCP and UDP ports on the target
system and to determine the type of operating system are the two major
objectives of port scanning.
Enumeration: Enumeration is a process of extracting valid accounts
and sharing resources information. Once a valid username or share is
enumerated, it is usually a matter of time for hackers to break in the
system.
Turn off unnecessary server applications (FTP server, web server, etc.), which
may provide hackers channels to break in your system.
FTP 21
Telnet 23
SMTP 25
Finger 79
HTTP 80
POP3 110
A port scan detector prevents most of the port scanning events and ensures
network security.