Professional Documents
Culture Documents
INTERNET
Contents
£ Network Fundamentals
£ The Internet
£ The World Wide Web
£ Internet Protocols
£ Security
£ About Networks and Telecommunications
Department
2
NETWORK FUNDAMENTALS
Networks
4
Network components
PC
q Thiết bị đầu cuối
server
v chạy ứng dụng mạng
wireless
laptop
cellular
handheld
6
Network components
£ USB wireless network adapter
p Plugs into a USB port
p Usually provides an intuitive graphical user interface
(GUI) for easy configuration
7
Connecting Networks
8
Network components
£ Server
p Computer or device with software that manages network
resources, such as files, e-mails, printers, databases
£ File server
p Most common type of server
p High-speed computer that provides program and data
files to network users
p Contains the network operating system (NOS)
¡ File directories for file and resource location on the LAN
¡ Automated distribution of software updates to desktop
computers on the WAN
¡ Internet services support
¡ Protection of services and data
¡ Access to connected hardware by authorized users
10
Network Classifications
£ Scope
p Personal area network (PAN)
p Local area network (LAN)
p Metropolitan area (MAN)
p Wide area network (WAN)
£ Ownership/Function
p Closed versus open
£ Topology (configuration)
p Bus (Ethernet)
p Star (Wireless networks with central Access Point)
p Ring
11
Network classification by scope
13
Network classification by scope
14
Network classification by scope
£ Metropolitan Area
Network (MAN)
p Designed for a city
p Larger than a
LAN, smaller than
a WAN
15
Network classification by scope
£ Campus Area Network (CAN)
p Several LANs located in various locations on a college or
business campus
p Smaller than a WAN
p Use devices such as switches, hubs, and routers
£ Personal Area Network (PAN)
p Network of an individual’s own personal devices
p Usually within a range of 32 feet
p Usually use wireless technology
16
Network classification by function
Peer to peer (P2P): The computers
have the same role.
£ Share files without a file server
£ Easy to set up
£ Best used for home or small offices
with no more than 10 computers
£ Do not require a network operating
system
£ Can be slow if there are too many
users
£ Security not strong
17
Network classification by function
Client/server:
£ Made up of one or more file
servers and clients (any type
of computer)
£ Client software enables
requests to be sent to the
server
£ Wired or wireless
connections
£ Do not slow down with
heavy use
18
Intranet
£ Intranet
p Password-protected
network controlled by the
company
p Accessed only by
employees
£ Virtual private network
p Operates over the Internet
p Accessible by authorized
users for quick access to
corporate information
p Uses secure, encrypted
connections and special
software
19
Network classification by topologies
£ Network topology
p Physical design of a LAN
£ Topology resolves contention—conflict that occurs
when two or more computers on the network
attempt to transmit at the same time
£ Contention sometimes results in collisions—
corruption of network data caused when two
computers transmit at the same time
20
Network classification by topologies
£ Bus topology
p Practical for home or small office
p One node transmits at a time
p Terminators signify the end of the circuit
p Uses contention management—technique that specifies
what happens when a collision occurs
£ Star topology
p For office buildings, computer labs, and WANs
p Easy to add users
£ Ring topology
p For a division of a company or one floor
p Not in common use today
p Node can transmit only when it has the token—special
unit of data that travels around the ring
21
Bus topology
22
Star topology
23
Ring topologies
24
Network Fundamentals
£ Network administrator
p Also called network
engineer
p Installs, maintains,
supports computer
networks
p Interact with users
p Handle security
p Troubleshoot
problems
25
Advantages - Disadvantages
Advantages disadvantages
p Reduced hardware p Loss of autonomy
costs p Lack of privacy
p Application sharing p Security threats
p Sharing information p Loss of productivity
resources
p Data management
centralization
p Connecting people
28
Internet Architecture
29
Internet Composition
30
Internet Addressing
£ IP address: pattern of 32 or 128 bits often
represented in dotted decimal notation
Example: private IP: 192.168.1.1
public IP: 8.8.8.8
£ Mnemonic address:
p Domain names
p Top-Level Domains
£ Domain name system (DNS)
p Name servers
p DNS lookup
31
ICANN
32
Early Internet Applications
£ Network News Transfer Protocol (NNTP)
£ File Transfer Protocol (FTP)
£ Telnet and SSH (Secured Shell)
£ Hypertext Transfer Protocol (HTTP)
£ Electronic Mail (email)
p Domain mail server collects incoming mail and
transmits outing mail
p Mail server delivers collected incoming mail to clients
via POP3 (Post Office Protocol version 3) or IMAP
(Internet Mail Access Protocol)
33
More Recent Applications
34
WORLD WIDE WEB
Word Wide Web
£ Hypertext combines internet technology with concept of
linked-documents. Embeds hyperlinks to other
documents.
£ Hypertext is written in the HTML (hypertext markup
language).
£ Each hypertext is referred to by the term "web page”.
36
Word Wide Web
£ Website: A collection of many webpages located on a
computer on the network and assigned a domain name.
£ WWW hay Web: a service that allows the transfer of
hypertext between computers on a network.
£ Trình duyệt (web browser): Program to display
hypertext: Edge, FireFox, Google Chrome...
£ Hypertext Transfer Protocol (HTTP)
p Is a transfer protocol between browser and web
server.
£ Uniform Resource Locator (URL)
p Is the only address of a document on the web
37
A typical URL
38
Hypertext Markup Language
(HTML)
£ Encoded as text file
£ Contains tags to communicate with
browser
p Appearance
¡ <h1> to start a level one heading
¡ <p> to start a new paragraph
p Links to other documents and content
¡ <a href = . . . >
p Insert images
¡ <img src = . . . >
39
A simple webpage
40
A simple webpage
41
Extensible Markup Language
(XML)
42
SECURITY
Security
£ Attacks
p Malware (viruses, worms, Trojan horses,
spyware, phishing software)
p Denial of service (DoS)
p Spam
£ Protection
p Firewalls
p Spam filters
p Proxy Servers
p Antivirus software
44
Encryption
45
Public-key encryption
46
Types of computer crime
£ Identify theft—criminal access to personal information in order to
impersonate someone
47
Types of computer crime
£ Malware (short for malicious software)—programs that
intentionally harm a computer system or allow individuals to
gain access without permission
p Tips to protect yourself from malware:
¡ Know who you are dealing with
¡ Keep your Web browser and operating system up to
date
¡ Back up important files
¡ Protect children online
¡ Use security software tools and keep them up to date
¡ Use strong passwords
¡ Learn what to do if something goes wrong
48
Types of computer crime
49
Types of computer crime
£ Computer virus—code concealed inside a program that can
harm or destroy files
p Many spread through e-mail attachments
p File infectors—attach themselves to files
p Payload—refers to the dangerous actions a virus
performs.
p Macro viruses—attach to data files and take advantage of
application macros
p Boot sector viruses—execute each time you start the
computer
p SPIM—spam text message sent via a cell phone or
instant messaging service
50
Computer Crime and Cybercrime
51
Types of computer crime
£ Rogue programs
p Logic bomb—hidden computer code that sits
dormant on a system until triggered
p Time bomb—virus program that remains
dormant on a computer system until
activated
p Worm—similar to a virus but does not need
action of a user to execute
52
Types of computer crime
£ Denial of service (DoS) attack—assaults an Internet
server with so many requests it can’t function
p Distributed denial of service (DDoS)—attack involves
multiple computer systems
¡ Commandeered computers form a botnet (robot
network)
¡ Bot (short for robot)—connects individual
computers to the controller, usually a server under
the control of the botnet controller
¡ The individual computers are called zombies.
53
Computer Crime and Cybercrime
£ More rogue programs (con’t.)
p Syn flooding—form of denial of service attack in which
synchronization packets are repeatedly sent to every port
on the server
¡ Uses up all available network connections
¡ Locks them until they time out
p Rootkit—malicious program that is disguised as a useful
program
¡ Enables attacker to gain administrator level access
¡ Allows attacker to have repeated and undetected
access
p Trojan horse—normal-looking program that includes
concealed instructions to cause harm
54
COMPUTER CRIME
55
Computer Crime
£ cyber crime, e-crime, electronic crime, or hi-tech
crime.
56
Computer crime
£ Child pornography - Making or distributing child pornography.
£ Copyright violation - Stealing or using another person's
copyrighted material without permission.
£ Cracking - Breaking or deciphering codes that are being used to
protect data.
£ Cyber terrorism - Hacking, threats, and blackmailing towards a
business or person.
£ Cyberbully or Cyberstalking - Harassing or stalking others online.
£ Cybersquatting - Setting up a domain of another person or
company with the sole intentions of selling it to them later at a
premium price.
£ Creating Malware - Writing, creating, or distributing malware (e.g.,
viruses and spyware.)
£ Denial of Service attack - Overloading a system with so many
requests it cannot serve normal requests.
£ Espionage - Spying on a person or business.
57
Computer crime
£ Fraud - Manipulating data, e.g., changing banking records to
transfer money to an account or participating in credit card fraud.
£ Harvesting - Collect account or other account related information
on other people.
£ Human trafficking - Participating in the illegal act of buying or
selling other humans.
£ Identity theft - Pretending to be someone you are not.
£ Illegal sales - Buying or selling illicit goods online including drugs,
guns, and psychotropic substances.
£ Intellectual property theft - Stealing practical or conceptual
information developed by another person or company.
£ IPR violation - An intellectual property rights violation is any
infringement of another's copyright, patent, or trademark.
£ Phishing - Deceiving individuals to gain private or personal
information about that person.
58
Computer crime
£ Salami slicing - Stealing tiny amounts of money from each
transaction.
£ Scam - Tricking people into believing something that is not true.
£ Slander - Posting libel or slander against another person or
company.
£ Software piracy - Copying, distributing, or using software that is
copyrighted that you did not purchase.
£ Spamming - Distributed unsolicited e-mail to dozens or hundreds of
different addresses.
£ Spoofing - Deceiving a system into thinking you are someone you
really are not.
£ Typosquatting - Setting up a domain that is a misspelling of
another domain.
£ Unauthorized access - Gaining access to systems you have no
permission to access.
£ Wiretapping - Connecting a device to a phone line to listen to
conversations.
59
Cyberbully
60
Spyware
£ Spyware or snoopware
p a software program that is intentionally
installed on a computer by to monitor what
other users of the same computer are doing.
61
Computer fraud
£ Computer fraud
p any act using computers, the Internet,
Internet devices, and Internet services to
defraud people, companies, or government
agencies of money, revenue, or Internet
access.
63
Phishing
64
DEPARTMENT OF NETWORKS
AND TELECOMMUNICATIONS
65
Overview
£ Since 1998
£ Room: I.74
£ Tel: (028) 38.324.467 (ext: 711)
£ Head: Prof. Tran Trung Dung
£ Vice Head: Msc. Huynh Thuy Bao Tran
66
GOALs
67
GOALs
68
Career orientation- Future career
69
Required courses
Students accumulate at least 5 courses
70
Optional courses
Students accumulate at least 5 courses, which contain at
least 2 courses (8 credits) of CN&T department
STT MÃ SỐ TÊN HỌC PHẦN TC LT TH
11 CTT124 Kiến tập nghề nghiệp 2 15 30
12 CTT125 Khởi nghiệp 3 30 30
13 CTT621 An ninh mạng 4 45 30
14 CTT622 An ninh mạng nâng cao 4 45 30
15 CTT623 Chuyên đề Hệ điều hành Linux 4 45 30
16 CTT624 Kiến trúc máy tính nâng cao 4 45 30
17 CTT625 Mạng cảm ứng không dây 4 45 30
18 CTT626 Mô hình hóa và mô phỏng mạng 4 45 30
19 CTT627 Seminar mạng máy tính 4 45 30
20 CTT628 Thiết kế mạng 4 45 30
71
Optional courses
72
Courses & Career orientation
73
Courses & Career orientation
Mã MH Tên môn học Môn học trước QTM TK Tư PM NC &
M vấn M GD
CTT625 Mạng cảm ứng không dây MMT * * *
CTT626 Mô hình hóa và mô XS thống kê B, * * **
phỏng mạng MMT NC
CTT627 Seminar mạng máy tính MMT nâng cao * * * * *
CTT628 Thiết kế mạng MMT nâng cao * ** * *
CTT629 Thực tập HĐH mạng HĐH ** * * * *
CTT630 Thực tập HT viễn thông HĐH, HT VT ** *
CTT631 Truyền thông không dây MMT ** * * * *
CTT632 Tr.thông kỹ thuật quang MMT * ** *
CTT633 Truyền thông kỹ thuật số MMT * * ** *
CTT634 Xử lý và tính toán s.song MMT * ** *
74
Q&A
75