You are on page 1of 56

NETWORKING AND

THE INTERNET
DR. ZAHEERUDDIN ASIF
BASED ON BROOKSHEAR AND BRYLOW 12ED

1
NETWORKING

• The study of how computers can be linked


together to share information and resources

2
DISCUSSION TOPICS FOR
TODAY….

•Network Fundamentals
•The Internet
•The World Wide Web
•Internet Protocols
3
NETWORKS ARE…

The need to share information and resources


among different computers has led to linked
computer systems…called Networks…

….in which computers are connected so that data


can be transferred from machine to machine
4
NETWORKS ARE…

The need to share information and resources


among different computers has led to linked
computer systems…called Networks…

….in which computers are connected so that data


can be transferred from machine to machine
5
INTERNET AND THE INTERNET

• Two or more computers connected


together is a network

• Two or more networks connected together


is an internet
6
• Network Classifications

• Local area network (LAN):


NETWORK
FUNDAMENT
• Metropolitan area network (MAN):
ALS
• Wide area network (WAN):

• Personal area network (PAN)


7
8
NETWORK CLASSIFICATION

•Open Network
• In the Public domain
• Designs are freely circulated
• The Internet is an open system
• TCP/IP protocol suite
• no fees, no license agreements
9
NETWORK CLASSIFICATION
• Closed/ Propriety Network
• Innovations owned and controlled by a particular
entity such as an individual or a corporation

• A company such as Novell Inc. might develop


proprietary systems for which it chooses to maintain
ownership rights, allowing the company to draw
income from selling or leasing these products

10
TOPOLOGIES…

…..Patterns in which the machines are connected


• Bus Topology
• Machines are all connected to a common communication
line called a bus

• Star Topology
• One machine serves as a central focal point to which all
the others are connected
11
Computer Computer Computer
A B C

Computer Computer Computer


D E B

Computer Computer
A C
Computer
B

Computer Computer
Computer Computer E D
Computer
A C
F

Computer Computer
E D

12
TOPOLOGIES…

…..Patterns in which the machines are connected


• Ring Topology
• Machines are all connected in a form of a ring
• Mesh Topology
• Every machine is connected to every other machine

13
PROTOCOLS

For a network to function reliably, it is important to


establish rules by which activities are conducted…..
….Such rules are called protocols

14
COMBINING NETWORKS

• Sometimes it is necessary to connect existing networks to form an extended


communication system

• This can be done by connecting the networks to form a larger version of the
same “type” of network

• For example, in the case of bus networks based on the Ethernet protocols, it
is often possible to connect the buses to form a single long bus. This is done
by means of different devices known as repeaters, bridges, and switches

15
COMBINING NETWORKS

• Ethernet is a set of standards for implementing a LAN


with a bus topology
• Repeater
• Bridge
• Switch
• Router
16
COMBINING NETWORKS

• Switches
• A switch is essentially a bridge with multiple connections,
allowing it to connect several buses rather than just two
• A switch produces a network consisting of several buses
extending from the switch as spokes on a wheel
• As in the case of a bridge, a switch considers the destination
addresses of all messages and forwards only those messages
destined for other spokes

17
18
ROUTERS

• Special purpose computers used for forwarding


messages

• The task of a router is different from that of repeaters,


bridges, and switches in that routers provide links
between networks while allowing each network to
maintain its unique internal characteristics
19
20
METHODS OF PROCESS
COMMUNICATION
• Communication between processes is called interprocess
communication
• Client/ Server Model
• one process (the server) providing a service to numerous others
(clients)

• Peer to Peer Model (P2P)


• peer-to-peer model involves processes that provide service to and
receive service from each other
21
22
DISTRIBUTED SYSTEMS

• A distributed system is a software system in which


components located on networked computers
communicate and coordinate their actions by passing
messages

• They consist of software units that execute as processes


on different computers
23
DISTRIBUTED SYSTEMS

• Cluster Computing
• a distributed system in which many independent computers work closely
together to provide computation or services comparable to a much larger
machine
• provide :
• high-availability—because it is more likely that at least one member of the
cluster will be able to answer a request, even if other cluster members break
down or are unavailable
• load-balancing—because the workload can be shifted automatically from
members of the cluster that have too much to do to those that may have too little

24
DISTRIBUTED SYSTEMS
• Grid computing is the collection of computer resources
from multiple locations to reach a common goal

25
DISTRIBUTED SYSTEMS

• Cloud Computing
• huge pools of shared computers on the network can be allocated
for use by clients as needed

26
27
2. THE INTERNET

• The Internet: An internet that spans the world


• Original goal was to develop a means of connecting networks
that would not be disrupted by local disasters

• Today it has shifted from an academic research project to a


commercial undertaking

28
INTERNET ARCHITECTURE

• Internet Service Provider (ISP)


• Tier-1
• Tier-2

• Access ISP: Provides connectivity to the Internet


• Traditional telephone (dial up connection)
• Cable connections
• DSL
• Wireless
29
30
INTERNET ADDRESSING

• IP address: pattern of 32 or 128 bits often represented in


dotted decimal notation
• Mnemonic address:
• Domain names
• Top-Level Domains
• Domain name system (DNS)
• Name servers
• DNS lookup
31
INTERNET CORPORATION FOR
ASSIGNED
NAMES & NUMBERS (ICANN)
• Allocates IP addresses to ISPs who then assign those
addresses within their regions

• Oversees the registration of domains and domain names

32
TRADITIONAL INTERNET
APPLICATIONS

• Electronic Mail (email)


• Domain mail server collects incoming mail and transmits outing
mail
• Mail server delivers collected incoming mail to clients via
POP3 or IMAP

• File Transfer Protocol ( FTP)


• Telnet and SSH
33
MORE RECENT APPLICATIONS

• Voice Over IP (VoIP)


• Internet Radio
• N-unicast
• Multicast

34
3. THE WORLD WIDE WEB

• Hypertext and HTTP


• Browser gets documents from Web server
• Documents identified by URLs

35
A TYPICAL URL

36
OTHER EXAMPLES OF URL

• ftp://ftp.funet.fi/pub/standards/RFC/rfc959.txt
• telnet 192.168.0.10 25

37
HYPERTEXT DOCUMENT
FORMAT
• Encoded as text file
• Contains tags to communicate with browser
• Appearance
• <h1> to start a level one heading
• <p> to start a new paragraph
• Links to other documents and content
• <a href = . . . >
• Insert images
• <img src = . . . >

38
A SIMPLE WEB PAGE

39
A SIMPLE WEB PAGE

40
AN ENHANCED SIMPLE WEB
PAGE

41
AN ENHANCED SIMPLE WEB
PAGE

42
EXTENSIBLE MARKUP
LANGUAGE (XML)

• XML: A language for constructing markup languages


similar to HTML
• A descendant of SGML
• Opens door to a World Wide Semantic Web

43
USING XML

<staff clef = “treble”> <key>C minor</key>


<time> 2/4 </time>
<measure> < rest> egth </rest> <notes>
egth G, egth G, egth G
</notes></measure>
<measure> <notes> hlf E
</notes></measure>
</staff>
44
THE FIRST TWO BARS OF
BEETHOVEN’S FIFTH SYMPHONY

45
CLIENT SIDE VS SERVER SIDE

• Client-side activities
• Examples: java applets, javascript, Macromedia Flash
• Server-side activities
• Common Gateway Interface (CGI)
• Servlets
• PHP

46
4. INTERNET PROTOCOLS

• Package Shipping Example

47
INTERNET SOFTWARE LAYERS

• Application: Constructs message with address


• Transport: Chops message into packets
• Network: Handles routing through the Internet
• Link: Handles actual transmission of packets

48
THE INTERNET SOFTWARE
LAYERS

49
FOLLOWING A MESSAGE
THROUGH THE INTERNET

50
TCP/IP PROTOCOL SUITE

• Transport Layer
• TCP
• UDP
• Network Layer
• IP (IPv4 and IPv6)

51
CHOOSING BETWEEN TCP AND
UDP

52
5. SECURITY

• Attacks
• Malware (viruses, worms, Trojan horses, spyware, phishing software)
• Denial of service
• Spam
• Protection
• Firewalls
• Spam filters
• Proxy Servers
• Antivirus software
53
ENCRYPTION

• FTPS, HTTPS, SSL


• Public-key Encryption
• Public key: Used to encrypt messages
• Private key: Used to decrypt messages

• Certificates and Digital Signatures

54
PUBLIC KEY ENCRYPTION

55
REFERENCES….

• Following are some useful sites you can study from


• http://study.com/academy/lesson/types-of-networks-lan-wan-wlan-
man-san-pan-epn-vpn.html

• http://www.iifa.fr/reseaux
• http://computer.howstuffworks.com/grid-computing.htm
• http://www.hcltech.com/blogs/transformation-through-technology/r
ise-cloud

• Following is the link to the video about network security


• http://electronics.howstuffworks.com/7376-wireless-internet-securi
ty-video.htm 56

You might also like