chapter extension 7 how the internet works © 2008 prentice hall, experiencing mis, david kroenke

29
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

Post on 20-Dec-2015

218 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

Chapter Extension 7

How the Internet Works

© 2008 Prentice Hall, Experiencing MIS, David Kroenke

Page 2: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-2 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

Study Questions

How does e-mail travel? What is a communications protocol? What are the functions of the five TCP/IP OSI

layers? How does the Internet work? How does www.PrenHall.com become

192.52.0.34.65?

Page 3: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-3 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

How Does E-mail Travel?

Messages and attachments sent from first computer– Broken down into pieces– Pieces called packets

Routers determine the best way to move messages through Internet

System employed to ensure all pieces are received– Packets resent if necessary

Messages and attachments reassembled at recipient’s computer

Page 4: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-4 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

What Is a Communications Protocol?

Protocol– Standardized means– Used for coordinating activities– Sequence of ordered steps

Communications protocol– Means for coordinating activities between

communicating computers Computers agree on protocol to use

– Broken down into layers

Page 5: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-5 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

Layered Protocol Schemes

Protocol architectures– Reference Model for Open Systems

Interconnection (OSI) Developed by International Organization for

Standardization (ISO)

– Transmission Control Program/Internet Protocol (TCP/IP)

Developed by the Internet Engineering Task Force (IETF)

– TCP/IP-OSI architecture is blend

Page 6: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-6 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

TCP/IP-OSI Architecture

Figure CE7-3

Page 7: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-7 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

Terminology

Architecture– Arrangement of protocol layers

Each layer performs specific tasks

Protocol– Exist at each layer of architecture– Set of rules that accomplish tasks at that layer

Program– Specific computer product – Implements a protocol

Page 8: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-8 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

Layer 5

Protocols– Simple Mail Transfer Protocol (SMTP)

Standard e-mail protocol

– Hypertext Transfer Protocol (HTTP) Processes Web pages

– File Transfer Protocol (FTP) Used to copy files from one computer to another

Page 9: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-9 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

Layer 4

Transmission Control program (TCP)– Converts from one data representation to another– Breaks e-mail into segments

Adds identifying segments to beginning of pieces

– Provides reliability Checks to see if all packets are received

Page 10: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-10 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

Layer 3

Internet Protocol– Interacts with TCP in Layer 4– Routers send messages across Internet

Works through IP Special purpose computers

– Packages messages into packets Places IP data in front of TCP data

Page 11: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-11 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

Layers 1 and 2

Switches facilitate data communications Layer 2 protocols

– Program packages packets into frames

Basic computer connectivity accomplished at layers 1 and 2

Page 12: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-12 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

Network Addresses: MAC and IP

MAC addresses– Physical addresses– Implemented by programs that use Layer 2 protocols– Each NIC card given an address by manufacturer– Address only shared within network or segment

IP addresses– Logical addresses– Written as series of dotted decimals

192.68.2.28– Not permanently associated with hardware device

Can be reassigned as necessary

Page 13: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-13 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

IP Addresses

Two kinds of IP addresses:– Public

Used on Internet Assigned by ICANN Each address is unique

– Private Used within private networks Controlled by company operating network

Page 14: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-14 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

Dynamic Host Configuration Protocol

DHCP Distributes temporary IP address to

computers– Address loaned while computer connected to LAN– When computer disconnected, IP address made

available to others

Page 15: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-15 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

Private IP addresses

Assigned manually by network administrator Usually given to:

– Web servers– Shared devices

Most users are given addresses by DHCP

Page 16: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-16 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

Networks

Figure CE7-1

Page 17: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-17 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

Using TCP/IP-OSI Protocols Within the Hotel

Hotel has private Web server– IP address of server assigned by network administrator

Guest computer signs into Web server– Guest browser constructs request for server– Uses HTTP

TCP breaks request into segments, adds additional data

TCP program hands segments to program that implements IP

Page 18: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-18 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

Using TCP/IP-OSI Protocols Within the Hotel (continued)

IP program adds header into packet Passes on to program that implements

Ethernet Ethernet program translates IP address into

MAC address Ethernet wraps packet into frame

– Sends packet through switch

Page 19: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-19 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

Switches and Routers

Switches– Switch table

Table of data– Entries for every device on network– Work with frames in Layer 2– Use MAC addresses

Routers– Routing tables

Directs packet traffic on Internet Work with packets in Layer 3 Use IP addresses

Page 20: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-20 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

Accessing Hotel Web Server

Figure CE7-6

Page 21: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-21 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

Using TCP/IP-OSI Protocols Within the Hotel (continued)

Switch consults switch table Directs frame to router Ethernet unpacks frame, send packet to IP Router consults routing table, sends packet one hop

down Internet Ethernet determines MAC address needed

– Ethernet packages packet into frame addressed to appropriate MAC address

– Sends frame to switch

Page 22: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-22 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

Using TCP/IP-OSI Protocols Within the Hotel (continued)

Switch sends frame to destination Ethernet unpacks frame, send packet to IP program IP program strips off header Sends segment to program that implements TCP TCP sends acknowledgement back to guest

computer indicating receipt When both segments received, sent to Web server

program– Processes HTTP request

Page 23: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-23 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

Network Address Translation

Internet traffic uses public IP addresses– Assigned in blocks

Routers may have two IP addresses– Private one assigned by organization for local traffic– Public one assigned by ISP for Internet traffic

Network Address Translation– Process of changing public IP addresses into private

addresses and reverse– Routers receive packets on Internet and redirects them to

individual computers on local network

Page 24: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-24 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

Your E-mail

You enter e-mail address of recipient– E-mail program works at application layer

Implements SMTP to send email Uses domain name system to get public IP address

E-mail message sent to router– Sends message to TCP

Breaks into segments, placed in packets Sent to router

Packets sent to Ethernet program – Placed in frame– Sent to switch, sent to router

Page 25: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-25 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

Your E-mail (continued)

Packets arrive at router– Implements NAT– Replaces private IP address with public IP address

Router consults table, sends to gateway router of recipient

Segments unpacked from packets, sent to TCP program

Program waits for all segments, then sends to program that implements SMTP

Program operates at Layer 5, puts message in mailbox

Page 26: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-26 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

E-mail System

Figure CE7-7

Page 27: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-27 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

Domain Name System

DNS– Converts user-friendly names into public IP

address– Resolves domain name

ICANN manages resolution system

Domain name– Registered name

Uniform Resource Locator (URL)– Document’s Web address

Page 28: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-28 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

Domain Name Resolution

ICANN manages root servers– 13 computers across the world– Maintain lists of IP addresses of servers

Domain name resolvers– Cache name and IP address on local file– Used instead of going through entire resolution

process

Page 29: Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke

CE 7-29 © 2008 Prentice Hall, Experiencing MIS, David Kroenke

Active Review

How does e-mail travel? What is a communications protocol? What are the functions of the five TCP/IP OSI

layers? How does the Internet work? How does www.PrenHall.com become

192.52.0.34.65?