0% found this document useful (0 votes)
15 views29 pages

Chapter 2 Part 2

THIS IS THE GOOD MATERIALS
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views29 pages

Chapter 2 Part 2

THIS IS THE GOOD MATERIALS
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

Chapter 4:

Networking and the Internet

Computer Science: An Overview


Eleventh Edition

by
J. Glenn Brookshear

Copyright © 2012 Pearson Education, Inc.


Chapter 4: Networking and the
Internet
 4.1 Network Fundamentals
 4.2 The Internet
 4.3 The World Wide Web
 4.4 Internet Protocols
 4.5 Security

0-2
Network Classifications
 Scope
◦ Local area network (LAN)
◦ Metropolitan area network (MAN)
◦ Wide area network (WAN)
 Ownership
◦ Closed versus open
 Topology (configuration)
◦ Bus and Ring(Ethernet)
◦ Star (Wireless networks with central Access Point)
◦ Irregular

0-3
Figure 4.1 Network topologies

0-4
Network topologies (continued)
 Ring

0-5
Figure 4.1 Network topologies
(continued)

0-6
Network topologies (continued)
• Irregular

0-7
Protocols
 Protocol – rules by which an activity is
conducted
 Carrier sense, multiple access with
collision detection (CSMA/CD)
◦ Nodes contend for the right to send a
message
◦ Used in Ethernet (Bus network)
◦ Silent bus provides right to introduce new
message

0-8
Protocols Cont.
 Carrier sense, multiple access with
collision avoidance (CSMA/CA)
◦ Used in WiFi
◦ Hidden terminal problem

0-9
Figure 4.3 The hidden terminal problem

0-10
Connecting Networks
• Repeater: Extends a network
• Bridge: Connects two compatible networks
• Switch: Connects several compatible networks
• Router: Connects two incompatible networks
resulting in a network of networks called an
internet

0-11
Figure 4.4 Building a large bus network
from smaller ones

0-12
Figure 4.5 Routers connection

0-13
Inter-process Communication
 Client-server
◦ One server, many clients
◦ Server must execute continuously
◦ Client initiates communication
 Peer-to-peer (P2P)
◦ Two processes communicating as equals
◦ Peer processes can be short-lived

0-14
Figure 4.6 The client/server model vs peer-to-
peer model

0-15
Figure 4.8 A typical URL

0-16
Figure 4.12 Package-shipping example

0-17
Internet Software Layers
• Application: Constructs message with
address
• Transport: Chops message into packets
• Network: Handles routing through the
Internet
• Link: Handles actual transmission of
packets

0-18
Figure 4.13 The Internet software layers

0-19
Figure 4.14 Following a message
through the Internet

0-20
Data communication channels
 Communication channel – passes
digital information from one location to
another
 Physical transmission medium
Wireless transmission medium

0-21
Physical transmission medium

 Twisted-pair wire – has two insulated


copper wire twisted around each other

0-22
Physical transmission medium Cont.
 Coaxial cable – constructed to permit
high-speed data transmission with less
distortion

0-23
Physical transmission medium Cont.
 Fibre optic cable – carries data as laser-
generated pulses of light

0-24
Wireless Communication
 Microwave signal or radio signal – signals
travel in a straight line

0-25
Wireless Communication Cont.
 Satellite – eliminate the line of sight
limitation

0-26
Security
 Attacks
◦ Malware (viruses, worms, Trojan horses, spyware,
phishing software)
◦ Denial of service
◦ Spam
 Protection
◦ Firewalls
◦ Spam filters
◦ Antivirus software

0-27
Encryption
 FTPS, HTTPS, SSL
 Public-key Encryption
◦ Public key: Used to encrypt messages
◦ Private key: Used to decrypt messages
 Certificates and Digital Signatures

0-28
Figure 4.16 Public-key encryption

0-29

You might also like