You are on page 1of 65

Unit 5

Communication and The Internet


Unit 5
• Network
• Network security
• The internet and the world wide web
Network
 A network is a collection of two or more computers or electronic devices that are connected together
for the purpose of sharing resources and data
 Many networks include servers , powerful computers that provides the networks with services such
as storing files or sending/receiving email.
 A small network might have one server whereas a large network could have tens or hundred of
servers

Advantages of network Disadvantages of network


 software and file sharing - users can share  cost - additional equipment is needed to allow
software and files with other users computers to communicate
 hardware sharing - users can share hardware,  management - larger networks require management
such as a printer by specialist staff such as a network manager
 communication - users can communicate via  spread of malware - viruses and other forms of
email, chat, or by video malware can easily spread across an improperly
 roaming access - users can sign in to any secured network
computer on the network and access their files  hacking - once a device is connected to another
device, it is possible that data may be accessed
without the device owner's permission
Different Types of Network
Local Area Network (LAN)
• A network that convers a relatively small
geographical area often a single site.
• Examples include networks employed by small
businesses, small organizations, schools,
colleges, universities and in homes.
• LANs are connected by a wired medium such
as cables, or by a wireless medium
• LANs are owned and maintained by the
organization.

Wireless Local Area Network (WLAN)


Local Area Network in which connected devices use high- frequency
wave to communicate
Different Types of Network
Wide Area Network (WAN)
• A network that convers a large geographical usually
across several sites of an organization
• It connect two or more LANs and usually under
shared ownership
• Organizations that have more than one office or
branch, such as banks, tend to use a WAN.
• Internet is the largest wide area network
Different Types of Network
Personal area network(PAN)
• A network used for data transmission over short
distance by computer devices, such as laptop,
mobile phones, tablets, speaker and printer.
• PAN may just connect the local device or allow them
to connect to internet
• The device usually communication wirelessly over
distance of up to 10 meters by using Bluetooth
Client-server and Peer to Peer Network
• There are two main model relating to computer networks: client-server and peer to peer
network
Client- Server
• In this network, there is a least one server, which is
powerful computer that provides services and control
the networks
• Typical server include file server, application server,
printer sever, web server and mail server
• Individual computers are referred to as client
computer that rely on server
• Clients do not usually store data and have control
over the network
• The server will authenticate the user and then give
the user access to file that he/she has been given
permission to user
• Client-server networks are best suited to situations
where many computers need access to the same
information.
Client-server and Peer to Peer Network
Peer to peer network
• Unlike the client-server, there are not a servers in a peer to
peer network
• Each computer can acts a both a client and a server
• Each computer in this network can provide service to other
computer and request service from other computer
• Peer-to-peer networks are best suited to smaller
organizations where fewer computers need access to the
same data.
Network Topology
• A network's topology is the arrangement, or pattern, in which all nodes(computer) on a
network are connected together.
• The major network topologies are:
• bus
• ring
• star
• mesh
Network Topology
Bus
• In a bus network all the devices are joined to
one cable - the bus.
• At each end of the cable, a terminator is fitted
to stop signals reflecting back down the bus.
• As a bus network only has one cable, only
one message can be send at any time
• A collision occurs when two or more network
devices send a message at the same time,
making all messages unreadable
• Carrier Sense Multiple Access with collision
detection is used
Network Topology (bus)
CSMD/CD sending algorithm working like The advantages of a bus topology are:
this:
1. Check if bus is busy  it is easy to install extra network devices
2. If not busy then send message, else go
to step 1  it is cheap to install as it doesn't require much
3. Listen to see if message received cable
correctly
4. If message not received correctly then The disadvantages of a bus topology are:
go to step 5, else go back to listening
for messages  if the main cable fails or gets damaged, the
5. Wait any amount of time, go to step 1 to whole network will fail
retry sending message.
 as more devices are connected, the performance
of the network will become slower because of
data collisions

 every node on the network receives all of the


data sent on the network - this is a security risk
Ring : Network Topology
• In a ring topology network each device is
connected to two other devices in a closed loop or
ring.
• Message sent on this network all travel in the same
direction and there are no collisions
• Data is passed from one device to the next around
the ring until it reaches its destination

The advantages of a ring topology are: The disadvantages of a ring topology


are:
 it is easy to install extra network devices
 if the main cable fails or gets damaged,
 adding additional device doesn’t have an the whole network will fail
impact on the performance of the network  Every devices on the network receives
all of the data sent on the network - this
is a security risk
 it is more expensive than a bus network
as more cable is needed to join the final
and first nodes
Star : Network Topology
• In a star topology, each network device is
connected to a central point (hub or switch).
• This central hub receives and directs message to
the correct recipients.
• The star topology is the most widely used, but it
does require a lot of cabling
The advantages of a star topology are:

 Each node is separately connected. Therefore,


the failure of one node or its link, also known as
The disadvantages of a star topology are:
transmission media, does not affect any other
nodes.
 the whole network fails if the switch fails,
 New nodes can be added to the network simply
since no node can communicate
by connecting them to the switch.
 a wired star topology requires a lot of
 Star networks tend to have higher performance,
cable - in a large network this can be
since a message is passed on only to its intended
expensive
recipient.
Mesh : Network Topology
• There are two main types of mesh topology- fully
connected and partially connected.
• In a fully connected mesh network, every network
device is connected to every other network device
• In a partially connected mesh, not all device are
connected directly to each other.
• Each device will pass messages on to other
devices within the network.
• Wired mesh networks tend to be uncommon,
mainly because connecting all nodes to all other
nodes is expensive and impractical.
• However, wireless mesh networks are increasingly
being used since it is far simpler and cheaper to
connect using radio signals.
• The largest mesh network of all is the internet
Mesh : Network Topology
The advantages of a mesh topology are: The disadvantages of a mesh topology are:
 Very fault tolerant, especially in the case of  fully connected mesh networks can be
a fully connected mesh network if one impractical to set up because of the high number
device fails, message can be rerouted of connections needed

 messages can be received more quickly if  many connections require a lot of maintenance
the route to the intended recipient is short

 messages should always get through as


they have many possible routes they can
travel along

 multiple connections mean each node can


transmit to and receive from more than
one node at the same time

 new nodes can be added without


interruption or interfering with other nodes
Wire and Wireless connection
Wire Connection
 A wired connection uses copper cable or fiber optic cable to
form the connections between the networked devices .
 Copper cable carries electronical signals whereas fiber optic
cable carries light signal
 Fiber optic cables have a greater bandwidth so transfer speeds
are faster.

Wireless Connection
 Wireless connection tend to use radio signals as
communication medium but could use other wireless methods
such as infrared light.
 Thus Wireless connection does not require a physical
connection(cable) between devices
Wire and Wireless connection
Advantages of wire connection Disadvantages of wire connection
 Faster than wireless connection  Expensive and difficult to install and
 Connection and Connection speed to be reconfigure
more reliable  Require many cable at a premises
 Not easy to intercept or eavesdrop on data
 Less susceptible to interference than
wirelesses connection

Advantages of wireless connection Disadvantages of wireless connection


 No need for a cable to connect devices or to  Transmission speed can be slower than wire
the internet connection
 User can access the network from anywhere  Interference from other wireless devices can
within range affect performance
 A wider range of devices can communicate  Walls and other physical objects can affect
with each other because it is not dependent performance
on having the correct cable.  Data need to be encrypted to prevent
interception
Network Data Speed
Speed
• The transfer rate of data from source to destination,
measured in bit per second.
• Transmission speed is not constant and other factors
affect the speed of data transmission.
Bandwidth
• The maximum amount of data that can be carried from
one point to another on a network in a given period of
time, measured in bit per second
Latency
• Any kind of delay that data travelling through a network
might encounter.
• In a network, latency measures the time it takes for
some data to get to its destination across the network.
Network Speed

Name Symbols Size (bps) If you have a network connection


Kilo bit per second Kbps 103 = 1000 12Mbps and you want to download a 50
Megabit per Mbps 106 = 1000 * 1000 MB file, how long would it take?
second
Gigabit per Gbps 109 = 1000 * 1000 Convert the file size from MB to bits
second * 1000
50 * 1000 *1000 *8
Terabit per second Tbps 10 = 1000 * 1000
12

* 1000 * 1000 Convert transmission speed from Mbps to bps


12 * 1000 * 1000

50 * 1000 * 1000 * 8
Time =
12 * 1000 * 1000

= 33.33 second
Protocol
• Protocol is a set of rule that allow two device to communicate.
• Without protocol, difference computer and other hardware wouldn’t be able to
communicate with each other.
• A protocol might contain detail of:
• How each computer will be identified ( IP address)
• What route the data will be take to get to its destination
• How error will be found ( error checking)
• How the data is to be formatted and so on..
• Different type of protocols are used for different purpose.
Protocol
Email Protocol
 Email are sent and received using a standard set of protocols.
 There are three main email protocols in use

Protocol Description
SMTP Simple Mail Transfer Protocol
The protocol is used for sending email from client to sever
and then from server to server until it reach its destination
POP3 Post Office Protocol
 The protocol is used for retrieving email from a mail server
 All the email are downloaded when there is a connection
between client and server and the downloaded email are
removed from server
 Thus, Email can be read without connection
IMAP Internet Message Access Protocol
 Unlike POP, the messages do not have to be downloaded.
 The message can be read and stored on the server.
 This is better for users with many different devices
Protocol
Network Protocol
ETHERNET TCP
 ETHERNET is a family of protocols that are used in  The transmission Control Protocol provides a
wired LANS. reliable connection between computer.
 It cover the physical parts of a networks such as how  TCP does this by :
data is sent and checked for errors and the speed of  Specifying that the received computer sends
the data can be transmitted acknowledgements that the data sent has
been received
Wi- Fi  Using checksums to ensure that the data
 Wi-Fi is a digital communication protocol that set out received is accurate
how data is transmitted on wireless LANS.  Allowing the receiver to tell the sender to
slow down transmission
 Ensuring the data sent up to application
layer contains on duplicates and is in the
correct order.
Protocol
HTTP ( Hyper Text Transfer Protocol) File Transfer Protocol
• The rule to be followed by a web server and web  FTP is used to transfer files over a network
browser (client) when requesting and responding use the TCP protocol
information.
• HTTP is used for sending the request from web client
to web server and returning the web content (HTML)
from server to client.

HTTPS ( Secure Hyper Text Transfer Protocol) Internet Protocol ( IP)


• HTTPS allow for communication between server IP deals with:
and client to be secure.  The addressing system to identify individual
• It ensures that all communication between them computers on the network
is encrypted and authenticated  Splitting data into packets and adding the
packet header with the sender and receiver
• It used when sensitive data need to be address.
transmitted.
Protocol
TCP/ IP protocol
• The Transmission Control Protocol/Internet Protocol (TCP/IP) is a protocol stack used when
connecting a device to the internet.
• TCP/IP uses packet switching to send data across a network.
• In packet switching, messages are broken up into very small pieces, called packets. Each
packet consists of two parts:
• Header includes
 the sender's and recipient's IP addresses,
 the packet’s sequence number,
 the total number of packets the message
• payload - this is part of the message itself
• Once the receiver computer receives all the packets, it will use the information in the header
to reconstruct the data into its original format.
Protocol
TCP/ IP protocol
 There are four layer in TCP/IP model for providing
communication.
 All of these protocols are in the TCP/IP suite, arrange
in four layer
 Data to be transmitted(received) must pass through
the layers
Protocol
TCP/ IP four Layer

Layer Description Protocol


Application  This layer interact with user to provide the service and data HTTP, HTTPS,
Layer that is send/received over a network FTP, SMTP, POP,
 This layer is where web application such as web browser and IMAP
email client operate.
 The request is passed to the transport layer
Transport  This layer manage end to end communication over a network TCP, UDP
Layer  This layer set up the communicate between two device
 They agree settings such as language and packet size
 It then divide the data received from the application layer into
packets of correct size
 It also checks that the packets have arrived safely
 If the data is being received, It send the acknowledgement to
the sender computer
Protocol
TCP/ IP four Layer

Layer Description Protocol


Network Layer  The layer deal with sending data across multiple networks IP
(Internet from the source network to the destination network
Layer)  It add the source (sender) and destination (receiver) IP
address to the data packet.
 It then routes data packets to the receiver computer
Data Link  This layer is concerned with transmitting the data through the ETHERNET
Layer local network using the protocols of the specific network such
( Network as ETHERNET
Access Layer)  This is where the network interface card and the device
drivers of the operating system are located

yehtetaung.jack@gmail.com
Protocol
TCP/IP Layer
• Network technologies are separated into layers, each one
containing specific hardware and software protocols.
• The benefits of TCP/IP Layer are:
 One layer can be developed or changed without affecting the
other layer
 It makes easier to identify networking errors and problems
 It makes easier to understand the overall model by dividing
it into functional part
 The different layer can be combined in different ways
Mobile or cellular network
• A Cellular network or Mobile network is a wireless network distributed
through cells where each cell served by at least one fixed-location transceiver,
known as a cell site or base station.
• These cell together provide wireless coverage over a large geographical area.
• When a user moves out of ranges, the signal falls and the base station makes
a request to transfer control to other base station that is receiving the strongest
signals without notifying the user. This is called hangover
 2G : enabled text message to be sent and introduced a multimedia
messaging service
 3G: increased data transmission speed to 2Mbps and gave wireless
access to internet that enabled video calls and downloading and
streaming
 4G: provided much higher speed , gave rise to the popularity of mobile
gaming and provided a much higher capacity
 3G and 4G use IP based protocol for data but 4G also use IP for voice call
 5G: is smarter , more efficient ,faster and lower latency than 4G. 5G will be
able to handle current devices and emerging technologies, such as
driverless car and connected home product
Cellular or Mobile network
Advantages of cellular or mobile network
 Cover a large area
 Less power usage
 Use anywhere:
 Large capacity

Disadvantages of cellular or mobile network


 inconsistent connection due to interference
 speed of uploading/downloading large files;
may be slower than other networks •
 the cost of uploading/downloading large
files may be prohibitive
 there is a significant difference in upload
and download speeds
 there is some concern about the health risks
of heavy use of wireless technologies
(magnetic waves)
Network Security
Network security and its important
Network security is a set of policies, process and configuration designed to protect
confidentiality, correctness (integrity) and availability of computer network and data
using both software and hardware technologies
Confidentiality
 Data or information can be accessed by only authorized user
 Confidentiality of data can be protected by ensuring only
authorized user can access the parts of networks and its
resources, stopping misuse and encrypting data

Availability
Integrity
 Data should be readily available when it is
 Data is useless unless it is correct
needed
 Data cannot be modified /changed
 Network is useless if data cannot be accessed
without authorization
when it is needed
 Virus and Dos attack can affect availability of
data
Network security and its important
The important of network security
• The data stored on the network could be private and confidential, financially valuable and
required for the running of organization
The Way to Secure a Network
Authentication and Validation
 Authentication is the process of checking the identity of a user of a computer or network using
username and password
 This is done by validating a username and password against the stored on a central server.
As the password have many weakness, the security need to be improved using
Two factor authentication is a security system that requires two distinct forms of identification :
in order to access something. The first factor is a password and the second commonly includes
a text with a code sent to your smartphone (secure token, SMS), or biometrics using your
fingerprint, face, or retina.
Biometric Authentication uses the unique physical characteristics of an individual to verify their
identity. Biometric authentication can include:
• Fingerprints scan
• Facial recognition
• Retina or Iris patterns scan
• Voice recognition
The Way to Secure a Network
Access Control
• is the method that controls whether a particular user will gain access to a particular files
• Decides if the use gets:
 Read-only access : user can open the file and read its content(data)
 Read and write access (modify access) : user can read the file and alter the contents
and then save the changes
• In the full control access, user can delete the file
• are used to prevent unauthorized access to system resources.
• are set up by system administrators according to the management ‘s requirement
The Way to Secure a Network
Firewall
• are security systems designed to prevent unauthorized access to or from
your computer or private network.
• can be implemented in hardware, software or a combination of both
• sits between the user’s computer and an external network (e.g. the internet)
and filters information in and out of the computer
carried out the following task:
• examining the ‘traffic’ between the user’s computer and a public network
• The checks are to ensure that traffic (data) meets a given set of criteria (rules).
• if the data fails the criteria, the firewall will block the ‘traffic’ and give the user a
warning that there may be a security issue
• logging all incoming and outgoing ‘traffic’
• helping to prevent viruses or hackers entering the user’s computer
• warning the user if some software is trying to access an external data source
• criteria (rule) can be set to prevent access to certain undesirable sites and to
stop certain protocol from being used
The Way to Secure a Network
Physical security
• Ensures the critical part of the network can be only be physically accessed by authorized
people (network technicians and administrator)
• Include installing burglar alarm, security tagging and physically locking down equipment
etc.
• Servers should be kept in a locked, secure room that can only be accessed by authorized
people, such as the network manager.
• This is important as anyone with physical access to a server could remove or access the
hard disks containing private and confidential information and install malware.
Cloud storage and security
Many advantages of cloud storage relate to Cloud storage has security disadvantages
securing availability. • User are relying on third-party storage provider
• The cloud service provider ensure that the data is to keep his/her organization running
accessible and that they maintain the hardware • Data stored anywhere accessible via the
and software needed to make data availability
internet carries the risk of other people gaining
• The amount of storage available can be easily access to it.
changed as and when required – the cloud
• User of cloud storage have to assume that the
provider can make extra storage available in
cloud provider is trustworthy, and that their data
minute
is being held safely and securely
• Having data stored off-site mean that it is
• The cloud storage provider might have its
protected from loss due to fire, theft of computers,
electrical failure and so on servers located in different countries.

• Many cloud storage system also manage the • Access to control storage is dependent on
back-up of data having reliable, high- speed internet connection
Cloud storage and security
The security risk can be reduced by the following factors

Cloud user Cloud Provider

• Choose strong authentication • Infrastructure (e.g. firewall/servers)


credentials(username/password) must be secure from unauthorized
access
• Not sharing his credentials
• Keeping their security software up to
• Not having automatic login to cloud / date
leaving his machine unattended
• Policy and procedures effective in
• Changing password regularly preventing an insider attack / a data
• Encrypting data breach
• Data protection laws in the resident
country must be obeyed
• Backup and restore procedures
• Encrypting data
Network attached storage (NAS) and security
• NAS is hardware device that are connected to network that allow file
storage and retrieval data for any device connected to that network.
• NAS consists of a single hard drive or many hard drive and
associated network hardware
• NAS devices are designed for ease of use rather than being secure
NAS storage has security disadvantages The security risk of NAS can be reduced by

Once NAS connect to network, some  Removing any default password


NAS Devices are being exploited By  Appling the software updates (patches)
remote hackers as a result of
 Not changing a device’s default
password
 Not updating the software running on
the NAS
USB storage and security
• USB flash drives are easy to transport, relatively cheap for amount
of storage available and very convenient to use

USB storage has security disadvantages The security risk of USB can be reduced/
overcome by
 This drive can be lost easily
 Anyone can find a lost flash drive  Use encrypted USB flash drives.
and access the information
Cyber Attack
• Is any of electronic attack on a computer, server, network or IT device.
• These attack might be designed to
• Gain access to data contained within the system
• Delete or modify information
• Make the system unavailable for use
• Physically damage a device connected to the network
Cyber Attack
• Most cyber attacks can be classed as exploiting either human behavior or technical
weakness
Social Engineering
• Attack that rely on exploiting human behavior are often referred to as social engineering
• There are three form of social engineering
• Phishing
• Pharming
• Shouldering surfing
Social Engineering
Phishing Attack
• Attempting to get confidential information by sending a user a message that appear
to come from trustworthy person or organization
• The creator send out a legitimate email, as soon as receiver click on email or
attachment, the user is sent to a fake website.
• When user enter his or her login detail, they are passed to attacker, who will financial
gain
Method to remove Phishing
 Many ISPs filter out phishing emails
 The user should always be cautions when opening emails or attachments
Social Engineering
Pharming Attack
• Malicious code installed on user’s hard drive or webserver that redirect the user to a
fake/bogus website without their consent in order to obtain personal data
• Malware can also infect the DNS server, so that everybody is directed to the bogus site.
To prevent Pharming Attack
• Check that the http address of the site that is intended to visit
• Check that there is a secure connection
• Check the site’s security certificate
• Install the latest security update
• Install antivirus software
Social Engineering
Shoulder surfing
• Shoulder surfing mean gaining access to confidential information ( username/ password
or PIN) by directly observing a user, possibly looking over their shoulder.
• Shoulder surfing often happens in busy places.
Eavesdropping
• Eavesdropping means intercepting data being sent to/form another computer system
• Eavesdropping on a network is simply reading data without copying or stealing it
• The owner of data might not know the data has been read until it is used by the criminal
Technical Weakness (Vulnerabilities)
Unpatched software
• Software that hasn’t had the latest security updates applied to it, making it vulnerable to attack
• The maker of the software will normally provide updates (patches) to fix the security issues as
they are found
• Some people will attack unpatched software to gain unauthorized access to information
• The patches to fix the security issues often have to be manually installed by a technician

USB device
• This device can potentially be a security thread because it might contain malware that could be
transferred data to the attacker via the internet
• The security weakness such unpatched software or USB device might allow malware to be
installed on the network that allows an eavesdropping attack to be carried out
Protecting against security weakness
• There are many way to strength computer system and network from attacks, starting from
when the software is designed and written, to deciding what kind of OS should be used
and how network security will be implemented.
Design and Implementation of software
• Security must be considered at the system design stage
 The software and system engineer will need to consider the following
 What kind of authentication is needed
 Do difference users need different level of access to the stored data within the system
 Should warning be issued before allowing users to carry out risky operation
 Does stored data need to be encrypted
 What threats will the software face?
Protecting against security weakness
• Once the designer have considered security, they need to look at the implementation phase
• The major issue at this point is guarding against bad programming practice
• Another major issue is that some method used in programming might lead to code vulnerabilities.
This issues can be minimized by having regular code reviews
There are two type of code review
Review by another programmer who is more An automated review : The software is used to
senior and has more experience of writing secure examine the code
code The software will highlight
They will check to see if  The vulnerabilities in the programming
 Any bad programming practices have been used language
 Any code vulnerabilities are present  The bad programming practice
 This is labor intensive and expensive  This software cannot find every issue and is
also fairly expensive
Module Testing
• Testing each block of code as it is completed to ensure the code work as expected
• This testing is important to security because if small problem remain, they might be used by hacker to gain
access to the system or the data
Protecting against security weakness
Other security measure to protect from cyber attacks
Use an audit trail
 Audit trail is a record of activities that have taken place on a computer system
 This record is generated automatically and will record what has happened and who or what made the
change
 This allow technician to figure out what happened during a cyber attack : if the attack was successful;
what section of the system and data were accessed

Use secure operating system


 Some OS are designed with security in mind and these are likely to be much harder to attack.
 When implementing a system that will contain sensitive data, the choice of OS must be carefully

Provide effective network security


 Keeping network security requires effective management, monitoring and training of its user
Identifying Vulnerabilities
Penetration Testing
• Penetration testing (pen testing) is where the IT systems of organization are deliberately
attacked to find any weakness.
• These attack are authorized by the organization and these are legal
• The pen tester ( white hacker) is likely to gain access to all the system that organization
has and the attacks will often include looking for technical weakness and trying social
engineering methods
• Once the pen testing has been completed, a report is usually presented to a senior
manager explaining what issue were found and what impact of them

Ethical hacking is a process of detecting vulnerabilities in an application, system,


or organization’s infrastructure that an attacker can use to exploit an individual or
organization. They use this process to prevent cyberattacks and security
breaches by lawfully hacking into the systems and looking for weak points.
Identifying Vulnerabilities
Commercial Analysis Tool
• Software tool are used to scan vulnerabilities.
• These tool can only identify already known vulnerabilities and must be keep up to date to
be effective
• They can be scan the network from within (internally) or from outside (externally)
• The internal scan can show up issue that could be exploited by a rogue employees
• The external scan can show up vulnerabilities that a hacker could exploit from outside the
company network
• These tool are not really restricted in terms of who cannot purchase them, so that a
hacker can use this tool to find security vulnerabilities
Identifying Vulnerabilities
Review of Network and User policies
• All network should be have written the The user policy is likely to contain detail of
policies that document:  What use of the network is allowed or not
 Who is authorized to carry out various activities allowed
on the network  What will happen to the user if they do
 How and when patches to software should be something unacceptable
applied  How to report faults, problem and security
 Access control issues
 Password requirements, including how  Security information, such as good practice
complex password should be and they should when choosing and using passwords
be changed
 How security is set up and maintained on the
network
 What data audit trails should be collect and
how long they should be kept for
The Internet and World Wide Web
The Internet
What is Internet ?
 Internet is the global system of interconnected computer networks that
uses the Internet protocol suite (TCP/IP) to communicate between
networks and devices.

How the Internet Works?

Domain Name
 This is the part of URL for a resource on the internet. http://www.google.com
 Domain name are used to identify one or more IP address
 Domain name are more convenient to use and easier to remember
than IP address
 When domain name is used, it will be converted to the correct IP
address by the domain name server

Domain Name : bbb.co.uk = IP address: 212.58.244.27


How the Internet Works
Domain Name Service
 This is an internet service that translates
domain names into IP address.
 Every time a user enters a domain name,
a domain name service (DNS) must
translate the name into IP address
 The DNS system is a network of servers
 If one DNS server does not translate
domain name, it ask another one until the
correct IP address is returned to the user
How the Internet Works
Internet Service Provider (ISP)
 Computer or network is likely to connected to the internet using an Internet Service
Provider
 An ISP is an organization that provides internet connection through copper cable -
often using existing phone lines - or fiber optic cable.
 An ISP may also provide other services such as email addresses or web space.

TCP/IP Protocol
 The internet uses the TCP/IP protocol stack to allow communication between all the
different networks.
 The internet protocol(IP) provide each device or network to connected to the internet
with a unique address to send data to/from.
 Two version of IP ,IPv4 and IPv6 are currently in use.
How the Internet Works
Router
 The network that are part of internet are linked together using router.
 A router is a piece of networking hardware that forwards packets between networks
 A router has a routing table that is essentially a list of rules stating where to send packets
for different destinations
 When router receive the packets it looks in the packet header for the destination address
and then uses the rules in the routing table to decide where to send it.
 The packets will need to be forwarded between several routers before it reaches its
destination
How the Internet Works
When the internet connected computer wants to send data to another:
 The sending computer splits the data into packets
 Each packet’s header contains the addresses of send and destination, the current
packet number and the total number of packets
 Each packet is sent to ISP
 ISP will have a router. The router will inspect the packet header and decide where to
send the packet depending on its destination IP address
 The packets will need to be forwarded between several routers before it reaches its
destination
 Once the packet reaches its destination, the receiving computer will put the data back
together from the packets. Depending on the protocol being used, the packets might
arrive in the wrong order and have to be put back in order using the information in the
packet header.
Word Wide Web (WWW)
• WWW is a service that runs on the Internet
• It provide access to a web page which are linked together using a hypertext system
• WWW are accessed using a web browser.
• The web browser is used to convert the data received from a web server to a human-
readable format
• When user accesses a website using the client-server system
How the WWW Works
The www uses the internet to transfer data from one computer to another
1. The user of a computer enters the URL(uniform resource locator) he or she
wants to look at.
2. The computer use DNS to find the IP address of the required web server
3. The web browser connects to the web server using the IP address and
requests the relevant web pages
4. The web page is transferred from one computer to another using HTTP or
HTTPS
5. Data sent from a web server to web browser is in HTML format. The web
browser displays the web page

Hyper Text Markup Language is used when writing and developing web pages.
The need for IP Addressing Standards
• An IP address is a set of numbers that are used to identify on particular computer
• It allow internet data and message to be sent to the correct computer.
• IPv4 consists of four-8 bit numbers , for example 216.27.61.137.
• This contain 32 bit binary number and 28 * 28 * 28 * 28 = 4 billion unique address

216 *
• IPv6 was introduced so that more addresses would be available.
• IPv6 used 128 binary bits to create a single unique address
• IPv6 address is expressed by eight groups of hexadecimal numbers separated by colons
• 2001:cdba:0000:0000:0000:0000:3257:9652
• 216 *216 *216 *216 *216 *216 *216 *216 = 3.4 * 1038 unique address
Components Needed to Access Internet
Devices are needed to connect to a local area network
(LAN) and that LAN to a wide area network such as the
internet.

Switch
 is a devices that receives incoming data packets and
redirects them to their destination on a local area
network because it build up a table of all addresses on
the network
 This cut down on network traffic

Wireless Access Point (WAP)


 A device that is used to connect one or more
computer wirelessly to an existing wired network
 It convert data received through cable into wireless
signal and vice versa
 They are similar to switches but cannot directed
message to particular devices
Components Needed to Access Internet
Router
 Router are similar to switches because they read the address information but they
transmit the message between networks
 A switch does within a single network, but router does this across several networks
 The router links the home network to the internet
 The router can both cable and WI-FI connection

Modem
 Modem is needed to convert the signals in LAN into the signals that can be
transmitted along the cables provided by ISP.
 The type of modem required will depend on the type of cable to the ISP

You might also like