0% found this document useful (0 votes)
292 views49 pages

Computer Science An Overview Chapter 4

The document discusses networking and the internet. It covers topics like network fundamentals, classifications, protocols, the internet architecture, addressing, applications, and the world wide web. Key protocols and standards like TCP/IP, HTTP, HTML, XML are explained.

Uploaded by

Furkan Yavuz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
292 views49 pages

Computer Science An Overview Chapter 4

The document discusses networking and the internet. It covers topics like network fundamentals, classifications, protocols, the internet architecture, addressing, applications, and the world wide web. Key protocols and standards like TCP/IP, HTTP, HTML, XML are explained.

Uploaded by

Furkan Yavuz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 49

Computer Science An Overview

13th Edition, Global Edition

Chapter 4
Networking and
the Internet

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Chapter 4: Networking and the Internet

• 4.1 Network Fundamentals


• 4.2 The Internet
• 4.3 The World Wide Web
• 4.4 Internet Protocols
• 4.5 Simple Client Server
• 4.6 Security

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


4.1 Network Fundamentals

• Network Software allows users to exchange information


and share resources
– Content
– Software
– Data storage facilities
• Network software has evolved into a network-wide
operating system

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Network Classifications

• Scope
– Personal Area Network (short-range)
– Local Area Network (building/campus)
– Metropolitan Area Network (community)
– Wide Area Network (greater distances)
• Ownership
– Closed versus open
• Topology (configuration)
– Bus (Ethernet)
– Star (Wireless networks with central Access Point)
Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.
Figure 4.1 Two popular network
topologies (1 of 2)

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Figure 4.1 Two popular network
topologies (2 of 2)

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Protocols

• Rules by which activities are conducted on a network


– Example: Coordinating the transmission of
messages between computers
▪ Need to avoid all machines transmitting at the
same time
• Allows vendors to build products that are compatible
with products from other vendors

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Protocols for Transmitting Messages

• CSMA/Collision Detection
– used in Ethernet
– both machines stop and wait for a independent,
random time
• CSMA/Collision Avoidance
– used in WiFi, where not all machines can hear each
other (hidden terminal problem)
– give advantage to the machine that has already
been waiting

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Figure 4.2 Communication over a bus
network

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Figure 4.3 The hidden terminal problem

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Combining Networks

• Repeater: passes all messages across two busses


• Bridge: passes only messages that are destined for
computers on the other bus
• Switch: acts like a bridge, but with connections to
multiple busses
• Router: Connects two incompatible networks
resulting in a network of networks called an internet

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Figure 4.4 Building a large bus network
from smaller ones

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Figure 4.5 Routers connecting two WiFi
networks and an Ethernet network to form
an internet

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Methods of Process Communication

• Client-server
– Many clients, one server (executing continuously)
– Clients make requests of other processes
– Server satisfies requests made by clients
• Peer-to-peer (P2P)
– Two processes communicating as equals
– Processes execute on a temporary basis

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Figure 4.6 The client/server model compared
to the peer-to-peer model

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Distributed Systems

• Systems units that execute as processes on different


computers
– Cluster computing
▪ Independent computers work closely together
instead of a single, much larger machine
– Grid computing
▪ Millions of home PCs (not connected to each
other) work on a complex problem
– Cloud computing
▪ Provide services, hide the details

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


4.2 The Internet

• The Internet is an internet that spans the world


– Original goal was to link a variety of networks into a
connected system unaffected by local disasters
– Today, it is a commercial undertaking that links a
worldwide combination of PANs, LANs, MANs, and
WANs involving millions of computers

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Internet Architecture

• Internet Service Provider (ISP)


– Tier-1 (Internet backbone)
– Tier-2
• Access or Tier-3 ISP: Provides connectivity to the
Internet
– Hot spot (wireless)
– Telephone lines
– Cellular
– Cable/Satellite systems

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Figure 4.7 Internet Composition

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Internet Addressing

• IP address: pattern of 32 or 128 bits often represented


in dotted decimal notation
• Mnemonic address:
– Domain names (mu.edu)
– Top-Level Domains
▪ .org, .gov, .com, .mil, .net, .au, .ca, .biz, ….
• Domain name system (DNS)
– Name servers
– DNS lookup

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Internet Corporation for Assigned Names
& Numbers (ICANN)

• Allocates blocks of IP addresses to ISPs who then


assign those addresses within their regions.
• Oversees the registration of domains and domain
names.

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Early Internet Applications

• Network News Transfer Protocol (NNTP)


• File Transfer Protocol (FTP)
• Telnet and Secure Shell (SSH)
• Hypertext Transfer Protocol (HTTP)
• Electronic Mail (email)
– Domain mail server collects incoming mail and
transmits outing mail
– Mail server delivers collected incoming mail to
clients via POP3 or IMAP

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


SMTP Simple Mail Transfer Protocol
220 mail.tardis.edu SMTP Sendmail Gallifrey-1.0; Fri, 23 Aug 2413
14:34:10
HELO mail.skaro.gov
250 mail.tardis.edu Hello mail.skaro.gov, pleased to meet you
MAIL From: [email protected]
250 2.1.0 [email protected]... Sender ok
RCPT To: [email protected]
250 2.1.5 [email protected]... Recipient ok
DATA
354 Enter mail, end with "." on a line by itself
Subject: Extermination.

EXTERMINATE!
Regards, Dalek
.
250 2.0.0 r7NJYAEl028071 Message accepted for delivery
QUIT
221 2.0.0 mail.tardis.edu closing connection
Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.
More Recent Applications

• Voice Over IP (VoIP)


• Internet Multimedia Streaming
– N-unicast
– Multicast
– On-demand streaming
– Content delivery networks (CDNs)

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


4.3 World Wide Web

• Hypertext combines internet technology with concept


of linked-documents
– Embeds hyperlinks to other documents
• Browsers present materials to the user
• Webservers provide access to documents
• Documents are identified by URLs and transferred
using HTTP

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Figure 4.8 A typical URL

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Hypertext Markup Language (HTML)

• Encoded as text file


• Contains tags to communicate with browser
– Appearance
▪ <h1> to start a level one heading
▪ <p> to start a new paragraph
– Links to other documents and content
▪ <a href = . . . >
– Insert images
▪ <img src = . . . >

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Figure 4.9 A simple webpage

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Figure 4.9 A simple webpage (continued)

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Figure 4.10 An enhanced simple webpage

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Figure 4.10 An enhanced simple Web page
(continued)

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Extensible Markup Language (XML)

• XML: A language for constructing markup languages


similar to HTML
– A descendant of the Standard Generalized Markup
Language
– Opens door to a World Wide Semantic Web

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Using XML to encode music
<staff clef = “treble”> <key>C minor</key>
<time> 2/4 </time>
<measure> < rest> egth </rest> <notes> egth G,
egth G, egth G </notes></measure>
<measure> <notes> hlf E </notes></measure>
</staff>

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Figure 4.11 The first two bars of
Beethoven’s Fifth Symphony

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Client Side Versus Server Side

• Client-side activities (browser)


– Javascript
– Java applets
– Macromedia Flash
• Server-side activities (webserver)
– Common Gateway Interface (CGI)
– Servlets
– JavaServer Pages (JSP) / Active Server Pages
(ASP)
– PHP

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


4.4 Internet Protocols
• Control how messages are transferred over the Internet
• This software must reside on every computer in the
Internet
• Accomplished by a multi-level hierarchy

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Figure 4.12 Package-shipping example

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Internet Software Layers

• Application: Constructs message with address


• Transport: Chops message into packets
• Network: Handles routing through the Internet
• Link: Handles actual transmission of packets

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Figure 4.13 The Internet
software layers

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Figure 4.14 Following a message through
the Internet

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


TCP/IP Protocol Suite

• Transport Layer
– Transmission Control Protocol (TCP)
– User Datagram Protocol (UDP)
• Network Layer
– Internet Protocol (IP)
▪ IPv4
▪ IPv6

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Figure 4.15 Choosing between TCP and
UDP

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


4.5 Simple Client Server Program

• Socket: an abstraction for processes at the application


layer to connect to the network via the transport layer
– Needs to know
▪ Source Address name (localhost)
▪ Source Port number(1023…65535)
▪ Destination Address
▪ Destination Port number

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Client Script in Python

import socket
Sock = socket.socket()
Server_address

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Server Script in Python

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


4.6 Cybersecurity

• Forms of Attack
– Malware (viruses, worms, Trojan horses, spyware,
phishing software)
– Denial of service (DoS)
– Spam (common medium for delivering malware)
• Protection and Cures
– Firewalls
– Spam filters
– Proxy Servers
– Antivirus software

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Cryptography

• HTTPS for secure Internet access


• Public-key Encryption (asymmetric)
– Public key: Used to encrypt messages
– Private key: Used to decrypt messages
• Certificate Authorities
– Trusted to maintain lists of public keys
– Provide Certificates to clients containing a party’s
name and its public key

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Figure 4.16 Public key encryption

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.


Legal Approaches to Network Security

• Computer Fraud and Abuse Act


• Electronic Communication Privacy Act
• USA PATRIOT Act
• Communications Assistance for Law Enforcement Act
• Anticybersquatting Consumer Protection Act

Copyright © 2019 Pearson Education, Ltd. All Rights Reserved.

You might also like