0% found this document useful (0 votes)
2 views

Lecture 4.1

Chapter 4 covers networking and the internet, detailing network fundamentals, classifications, protocols, and methods of communication. It discusses the architecture of the internet, including ISPs and addressing, as well as the World Wide Web and its technologies. Additionally, the chapter addresses cybersecurity threats and protective measures, including cryptography and secure internet access.

Uploaded by

kolasrin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Lecture 4.1

Chapter 4 covers networking and the internet, detailing network fundamentals, classifications, protocols, and methods of communication. It discusses the architecture of the internet, including ISPs and addressing, as well as the World Wide Web and its technologies. Additionally, the chapter addresses cybersecurity threats and protective measures, including cryptography and secure internet access.

Uploaded by

kolasrin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 33

CHAPTER 4

NETWORKING AND THE INTERNET

Presentation title 2
Chapter 4: Networking and the
Internet

Network
The World
Fundamental The Internet
Wide Web
s

Internet Simple Client


Security
Protocols Server

Presentation title 3
4.1 Network Fundamentals

• Network Software allows users to exchange information


and share resources
– Content
– Software
– Data storage facilities
• Network software has evolved into a network-wide
operating system
Presentation title 4
Network Classifications
Scope

• Personal Area Network (short-range)


• Local Area Network (building/campus)
• Metropolitan Area Network (community)
• Wide Area Network (greater distances)

Ownership

• Closed versus open

Topology (configuration)

• Bus (Ethernet)
• Star (Wireless networks with central Access Point)

Presentation title 5
Figure 4.1 Two popular network topologies
(1 of 2)

Presentation title 6
Protocols

• Rules by which activities are conducted on a network


– Example: Coordinating the transmission of
messages between computers
• Need to avoid all machines transmitting at the
same time
• Allows vendors to build products that are compatible
with products from other vendors
Presentation title 7
Protocols for Transmitting Messages

• CSMA/Collision Detection
– used in Ethernet
– both machines stop and wait for a independent, random
time
• CSMA/Collision Avoidance
– used in WiFi, where not all machines can hear each other
(hidden terminal problem)
– give advantage to the machine that has already been
Presentation title
waiting 8
Figure 4.2 Communication over a bus
network
Combining Networks

• Repeater: passes all messages across two busses


• Bridge: passes only messages that are destined for
computers on the other bus
• Switch: acts like a bridge, but with connections to
multiple busses
• Router: Connects two incompatible networks
resulting in a network of networks called an
internet
Presentation title 10
Methods of Process Communication

• Client-server
– Many clients, one server (executing continuously)
– Clients make requests of other processes
– Server satisfies requests made by clients
• Peer-to-peer (P2P)
– Two processes communicating as equals
– Processes execute on a temporary basis
Presentation title 11
Figure 4.6 The client/server model
compared to the peer-to-peer model

Presentation title 12
Distributed Systems

• Systems units that execute as processes on different computers


– Cluster computing
• Independent computers work closely together instead of a
single, much larger machine
– Grid computing
• Millions of home PCs (not connected to each other) work
on a complex problem
– Cloud computing
• Provide services, hide the details
Presentation title 13
4.2 The Internet

• The Internet is an internet that spans the world


– Original goal was to link a variety of networks into a
connected system unaffected by local disasters
– Today, it is a commercial undertaking that links a
worldwide combination of PANs, LANs, MANs, and
WANs involving millions of computers

Presentation title 14
Internet Architecture

• Internet Service Provider (ISP)


– Tier-1 (Internet backbone)
– Tier-2
• Access or Tier-3 ISP: Provides connectivity to the Internet
– Hot spot (wireless)
– Telephone lines
– Cellular
– Cable/Satellite systems
Presentation title 15
Internet Addressing

• IP address: pattern of 32 or 128 bits often represented in dotted


decimal notation
• Mnemonic address:
– Domain names (mu.edu)
– Top-Level Domains
• .org, .gov, .com, .mil, .net, .au, .ca, .biz, ….
• Domain name system (DNS)
– Name servers
– DNS lookup
Presentation title 16
Internet Corporation for Assigned
Names & Numbers (ICANN)

Allocates blocks of IP addresses to ISPs who then


assign those addresses within their regions.

Oversees the registration of domains and domain


names.

Presentation title 17
More Recent Applications

Voice Over IP (VoIP) Internet Multimedia


Streaming
N-unicast
Multicast
On-demand streaming
Content delivery networks (CDNs)

Presentation title 18
4.3 World Wide Web
Hypertext combines internet
Embeds hyperlinks to other
technology with concept of documents
linked-documents

Browsers present materials to the user

Webservers provide access to documents

Documents are identified by URLs and transferred using HTTP

Presentation title 19
Figure 4.8 A typical URL

Presentation title 20
Figure 4.9 A simple webpage

Presentation title 21
Extensible Markup Language (XML)

• XML: A language for constructing markup languages


similar to HTML
• A descendant of the Standard Generalized Markup
Language
• Opens door to a World Wide Semantic Web

Presentation title 22
Figure 4.11 The first two bars of
Beethoven’s Fifth Symphony

Presentation title 23
Client Side Versus Server Side
Client-side activities (browser)

• Javascript
• Java applets
• Macromedia Flash

Server-side activities (webserver)

• Common Gateway Interface (CGI)


• Servlets
• JavaServer Pages (JSP) / Active Server Pages (ASP)
• PHP

Presentation title 24
4.4 Internet Protocols

Control how messages are transferred over the


Internet

This software must reside on every computer in the


Internet

Accomplished by a multi-level hierarchy

Presentation title 25
Figure 4.12 Package-shipping example
Internet Software Layers
Application: Constructs message with address

Transport: Chops message into packets

Network: Handles routing through the Internet

Link: Handles actual transmission of packets

Presentation title 27
TCP/IP Protocol Suite

Transport Layer Network Layer


Transmission Control Protocol (TCP) Internet Protocol (IP)
User Datagram Protocol (UDP) • IPv4
• IPv6

Presentation title 28
Figure 4.15 Choosing between TCP
and UDP

Presentation title 29
4.5 Simple Client Server Program

• Socket: an abstraction for processes at the application


layer to connect to the network via the transport layer
– Needs to know
• Source Address name (localhost)
• Source Port number(1023…65535)
• Destination Address
• Destination Port number
Presentation title 30
4.6 Cybersecurity

• Forms of Attack
– Malware (viruses, worms, Trojan horses, spyware, phishing software)
– Denial of service (DoS)
– Spam (common medium for delivering malware)
• Protection and Cures
– Firewalls
– Spam filters
– Proxy Servers
– Antivirus software
Presentation title 31
Cryptography

HTTPS for secure Internet access

Public key: Used to encrypt


Public-key Encryption messages
(asymmetric) Private key: Used to decrypt
messages

Trusted to maintain lists of public


keys
Certificate Authorities Provide Certificates to clients
containing a party’s name and its
public key

Presentation title 32
Thank you

Dr AlRAWI​ musabalrawi@halic www.halic.edu.tr


.edu.tr

Presentation title 33

You might also like