networking and internet

30
Networking and Internet Tian-Li Yu [email protected] Department of Electrical Engineering National Taiwan University

Upload: susantai89

Post on 12-May-2015

486 views

Category:

Technology


2 download

DESCRIPTION

internet

TRANSCRIPT

Page 1: Networking And Internet

Networking and Internet

Tian-Li [email protected]

Department of Electrical EngineeringNational Taiwan University

Page 2: Networking And Internet

Network classifications

• Scope– LAN: local area network– MAN: metropolitan area network– WAN: wide area network

• Ownership– Closed– Open

• Topology

2

Page 3: Networking And Internet

Network topology

3

Ring

Bus

Star

hub

Page 4: Networking And Internet

Protocols

• Token ring– Popular in ring topology.– Token and messages are passed in one direction.– Only the machine that gets the token can transmit its

own message.

• CSMA/CD– Carrier sense, multiple access with collision detection.– Popular in bus topology (Ethernet).– Broadcasting.– When collision, both machines wait for a brief random

time before trying again.

4

Page 5: Networking And Internet

Dilbert on token ring

5

Dilbert, Scott Adams

Page 6: Networking And Internet

Connecting compatible networks

• Repeater– Simply passing through messages.– Connecting two compatible networks.

• Bridge– Only passing those messages addressed to the other side.– Connecting two compatible networks more efficiently.

• Switch– A bridge with multiple connections.– Connecting several compatible networks more efficiently.

6

Page 7: Networking And Internet

Repeater, bridge, and switch

7Textbook, Figure 4.4

Page 8: Networking And Internet

Connecting incompatible networks

• Router– Building a network of networks, known as an internet.

8

Textbook, Figure 4.5

Page 9: Networking And Internet

Interprocess communication

• Server-client– One server, several clients.– Clients initiate communications by sending requests.– Server serves.

• P2P (peer-to-peer)– Two processes communicating as equals.– The most popular distribution mode nowadays.

9

Page 10: Networking And Internet

Interprocess communication (contd.)

10Textbook, Figure 4.6

Page 11: Networking And Internet

Distributed systems

• Infrastructure can be provided by standardized toolkits.– Enterprise Java Beans by Sun Microsytems– .NET framework by Microsoft

11

Page 12: Networking And Internet

The Internet

• The most notable example of an internet is the Internet.

• Original goal was to prevent disruptions caused by local disaster.

• Now it’s a commercial undertaking.

12

Page 13: Networking And Internet

Internet architecture

• Domain– a network or an internet controlled by one single

authority.

• ICANN (Internet corporation for assigned names and numbers)– Oversee the registration of domains.– Registrar

• Gateway– A router that connects a domain to the rest of the

Internet (the Internet cloud). 13

Page 14: Networking And Internet

Domains, gateway, and the Internet

14Textbook, Figure 4.7

Page 15: Networking And Internet

Connecting to the Internet

• ISP (Internet service provider)– Allow customers to connect their domain to the ISP’s

equipment or join the domain already established by the ISP.

• Different means– Telephone (dial-up)– Cable– DSL– Wireless

15

Page 16: Networking And Internet

IP addresses

• IP (Internet protocol) addresses– 32 bit in IPv4– 128 in IPv6

• Network identifier (by ICANN)• Host address (domain administrator)

• Dotted decimal– 140.112.18.33

16

Page 17: Networking And Internet

Host names

• Mnemonic address made up of two parts

• Domain name– Assigned by a registrar – edu.tw– Top-level domain

• By usage: .edu = education• By country: .tw = Taiwan

• Subdomains and individual host names– Assigned by domain owner– www.ee.ntu.edu.tw

• Name server & domain name server (DNS)– www.ee.ntu.edu.tw 140.112.18.33

17

Page 18: Networking And Internet

Internet applications

• VoIP (voice over Internet protocol)

• email (electronic mail)

• FTP (file transfer protocol)

• telnet & ssh (secure shell)

• p2p: bittorrent, edonkey, emule…

18

Page 19: Networking And Internet

World wide web

• www, w3, web

• hypertext, hyperlink, hypermedia.

• Web page: hypertext document

• Website: a collection of closely related web pages.

19

Page 20: Networking And Internet

Browsers

• Presenting the web pages downloaded from the Internet.• HTTP (hypertext transfer protocol)• URL (uniform resource locator)

20Textbook, Figure 4.8

Page 21: Networking And Internet

Hypertext markup language

21Textbook, Figure 4.10

Page 22: Networking And Internet

eXtensible markup language

• XML• Standard style to represent data as text.• Restricted mapping each opening to each ending.• <x property=“yyy”> …… </x>• XHTML

– HTML that follows XML format.

22

<name code=“ISO-8859-1”> Tian-Li Yu </name><name code=“Big5”> 于天立 </name><education>

<BS> NTUEE, 1997</BS><MS> UIUCCS, 2003 </MS><PhD> UIUCCS, 2006 </PhD>

</education>

Page 23: Networking And Internet

Client-side & server-side

• Client-side– Java applets– Java scripts– Flash

• Server-side– CGI– Servlets (jsp, asp)– PHP (Personal Home Page, PHP Hypertext Processor)

23

Page 24: Networking And Internet

Internet protocol

• Layers– Application: constructs message with address– Transport: chops message into packets– Network: handles routing through the Internet– Link: handles actual transmission of packets

• Port (not the I/O port)

24

Page 25: Networking And Internet

Layers

25

TextbookFigure 4.14

Page 26: Networking And Internet

TCP/IP suite

• TCP and IP are two protocols, TCP/IP refers to a collection of protocols more than just TCP and IP.

• TCP (transmission control protocol)

• UDP (user datagram protocol)– No notification before sending message, no retransmission

service, no acknowledge of receiving message.

• TCP: more reliable, less efficient• UDP: more efficient, less reliable

26

Page 27: Networking And Internet

Security

• Attacks– Malware (malicious software)

• Virus, worm, Trojan horse, spyware, phishing)

– Denial of service– Spam

• Protections– Firewall– Spam filter– Proxy– Antivirus, antispyware

27

Page 28: Networking And Internet

Encryption

• sftp (ftps as in the textbook), https, ssh, ssl• Public/private keys

– Public key encryption– Private key decryption

28

TextbookFigure 4.16

Page 29: Networking And Internet

Public/private key issues

• Certificate authority– Ensure the public key is given by the trusted one.

• Authentication– Make sure the author of a message is, in fact, the party

it claims to be.– Use private key to encrypt; public key to decrypt.

29

Page 30: Networking And Internet

Exercises

• Chapter 4: 1, 7, 8, 12, 20, 26, 27, 35, 37, 39, 40, 43, 46.

30