75
Introduction to Networks What is a computer Network? A network is any collection of independent computers that communicate with one another over a shared network medium. When these computers are joined in a network, people can share files and peripherals such as modems, printers, tape backup drives, or CD-ROM drives Every network includes: At least two computers Server or Client workstation. Networking Interface Card's (NIC) A connection medium, usually a wire or cable Network Operating system software, such as Microsoft Windows NT or 2000

Class_notes_InternetTechnology

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Class_notes_InternetTechnology

Introduction to Networks

What is a computer Network?

A network is any collection of independent computers that communicate with one another over a shared network medium. When these computers are joined in a network, people can share files and peripherals such as modems, printers, tape backup drives, or CD-ROM drives

Every network includes:

 At least two computers Server or Client workstation.Networking Interface Card's (NIC)A connection medium, usually a wire or cableNetwork Operating system software, such as Microsoft Windows NT or 2000

Page 2: Class_notes_InternetTechnology

Types of Networks

LANs (Local Area Networks)

LANs are networks usually confined to a geographic area, such as a single building or a college campus.

WANs (Wide Area Networks)

Wide area networking combines multiple LANs that are geographically separate

Internet

The Internet is a system of linked networks that are worldwide in scope and facilitate data communication services such as remote login, file transfer, electronic mail, the World Wide Web and newsgroups.

Intranet

An intranet is a private network utilizing Internet-type tools, but available only within that organization i.e. for large organizations.

MANs (Metropolitan area Networks)

This refers to a network of computers with in a City.

VPN (Virtual Private Network)

VPN uses a technique known as tunneling to transfer data securely on the Internet to a remote access server on your workplace network.

Page 3: Class_notes_InternetTechnology

OSI Reference Model

Seven layers of OSI Model:

The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization. It is a prescription of characterizing and standardizing the functions of a communications system in terms of abstraction layers

 

Page 4: Class_notes_InternetTechnology

ISO OSI Layering Architecture

ApplicationLayer

PresentationLayer

SessionLayer

TransportLayer

NetworkLayer

Data LinkLayer

PhysicalLayer

Application Protocol

Transport Protocol

Presentation Protocol

Session Protocol

Host A Host BApplication

Layer

PresentationLayer

SessionLayer

TransportLayer

NetworkLayer

Data LinkLayer

PhysicalLayer

NetworkLayer

Data LinkLayer

PhysicalLayer

NetworkLayer

Data LinkLayer

PhysicalLayer

Router Router

Page 5: Class_notes_InternetTechnology

Layer 1: Physical Layer

 

Functions:

Transmission of a raw bit streamForms the physical interface between devicesWhich modulation technique (bits to pulse)?How long will a bit last?Bit-serial or parallel transmission?Half- or Full-duplex transmission?How many pins does the network connector have?How is a connection set up or torn down?

Page 6: Class_notes_InternetTechnology

Layer 2: Data Link Layer

 

Functions:Provides reliable transfer of information between two adjacent nodesCreates frames from bits and vice versaProvides frame-level error controlProvides flow controlThe data link layer provides the network layer with what appears to be an error-free link for packets

 

Layer 3: Network Layer

 

Functions:Responsible for routing decisionsDynamic routingFixed routingPerforms congestion control

Page 7: Class_notes_InternetTechnology

Layer 4: Transport Layer

 

Functions:Hide the details of the network from the session layerProvides reliable end-to-end communicationPerform end-to-end flow controlPerform packet retransmission when packets are lost by the network

 

Layer 5: Session Layer

 May perform synchronization between several communicating applications

or logical transmissions Groups several user-level connections into a single “session”

Examples:

Banking session

Network meetings

Page 8: Class_notes_InternetTechnology

Layer 6: Presentation Layer

 

Performs specific functions that are requested regularly by applications

Examples:

encryption

ASCII to Unicode, Unicode to ASCII

LSB-first representations to MSB-first representations

 

Layer 7: Application Layer

 

Application layer protocols are application-dependent

Implements communication between two applications of the same type

Examples:

FTP

HTTP

SMTP (email)

Page 9: Class_notes_InternetTechnology

Overview of Layers:

Page 10: Class_notes_InternetTechnology

Introduction to TCP/IP Networks:

They are based on an open specification that is not controlled by any vendor.

What Is TCP/IP?

TCP stands for Transmission Control Protocol and IP stands for Internet Protocol. The term TCP/IP is used to refer to a group of protocols related to the TCP and IP protocols such as the User Datagram Protocol (UDP), File Transfer Protocol (FTP), Terminal Emulation Protocol (TELNET), and so on.

TCP/IP Layering Architecture:

HostHost--toto--NetNet

Internet/NetworkInternet/Network

ApplicationApplication

TransportTransport

A simplified model The network layer:

Hosts drop packets into this layer, layer routes towards destination- only promise- try my best

The transport layer:reliable byte-oriented

stream

Page 11: Class_notes_InternetTechnology

TCP/IP Protocol Architecture:

Application Protocol

Transport Protocol (TCP)

ApplicationLayer

TransportLayer

NetworkLayer

Host-to-Net Layer

Host AApplication

Layer

TransportLayer

NetworkLayer

Host-to-Net Layer

Host A Host BApplication

Layer

TransportLayer

NetworkLayer

Host-to-Net Layer

NetworkLayer

Host-to-Net Layer

NetworkLayer

Host-to-Net Layer

IPIP IP

1) Physical layer:Physical interface between data transmission deviceCharacteristics of transmission mediumSignal levelsData rates

2) N/W Access Layer: Exchange of data between end system and networkDestination address provisionInvoking services like priority

3) Internet Layer (IP):Systems may be attached to

different networksRouting functions across

multiple networksImplemented in end systems and routers

Page 12: Class_notes_InternetTechnology

4) Transport Layer (TCP) Reliable delivery of dataOrdering of delivery

5) Application Layer Support for user applications

Ex. http, SMPT

Page 13: Class_notes_InternetTechnology

Local-Area Network

Connect computers within a limited physical area such as an office, classroom, or building

Page 14: Class_notes_InternetTechnology

Wide-Area NetworkWANs typically connect fewer computers than LANs and normally operate at lower speeds than LANs. WANs, however, provide the means for connecting single computers and many LANs over large distances.

Page 15: Class_notes_InternetTechnology

LAN Topologies

Many LAN technologies have been invented but how specific technologies are similar and how they differ. Each network is classified into a category according to its topology or general shape

The four basic topologies are:

1.Bus Topology

2. Ring Topology

3. Mesh Topology

4. Star Topology

Page 16: Class_notes_InternetTechnology

Bus Topology:

Bus topology usually consists of a single cable to which computers attach

The ends of a bus network must be terminated to prevent electrical signals from reflecting back along the bus.

Any computer attached to a bus can send on the cable and all computers receive the signal because all computers attach directly to the cable.

The computers attached to a bus network must coordinate to ensure that . only one computer sends a signal at any time

Page 17: Class_notes_InternetTechnology

Ring Topology:Ring topology arranges for computers to be connected in a closed loop

I. A cable connects the first computer to a second computer, another cable connects the second computer to a third, and so on, until a cable connects the final computer back to the first.

II. name ring arises because one can imagine the computers and the cables connecting them arranged in a circle.

III. In practice, the cables in a ring network do not form a circle.

Ring topology requires a computer to connect to a small device that forms the ring

I. this is needed for the ring to continue operation even if some of the computers are disconnected

Page 18: Class_notes_InternetTechnology

Mesh Topology:

A network that uses a mesh topology provides a direct connection between each pair of computers

The chief disadvantage of a mesh arises from the cost: •A mesh network connecting n computers requires:

•The important point is that the number of connections needed for a mesh network grows faster than the number of computers

Page 19: Class_notes_InternetTechnology

Star Topology:

In star topology, all computers attach to a central pointThe center of a star network is often called a hubA typical hub consists of an electronic device

• That accepts data from a sending computer and delivers it to the appropriate destination

In practice, star networks seldom have a symmetric shape (hub is located an equal distance from all computers)

• Instead, a hub often resides in a location separate from the computers attached to it

Page 20: Class_notes_InternetTechnology

Network Interface Card

A Network Interface Card (NIC) is a device that plugs into a motherboard

and provides ports for the network cable connections. It is the computer's

interface with the LAN.

Page 21: Class_notes_InternetTechnology

Protocol:

In networking and Communications, the formal specification that defines the procedures to be followed when transmitting and receiving data.

Protocols define the format, timing, sequence and error checking used on the network.

HTTP- Hypertext Transfer Protocol is the stateless protocol used for data transfer within WWW.

Page 22: Class_notes_InternetTechnology

IP Address:

A 32-bit address assigned to a computer that uses the TCP/IP protocols. The sender must know the IP address of the destination computer before sending a packet.

This is like a phone number for the computer.

A program on one computer communicates with a program on another computer, by connecting to its IP address.

The 32-bit address is usually represented as four 8-bit decimal numbers separated by periods.

Example: www.utm.edu (IP address is 208.47.4.80)

Page 23: Class_notes_InternetTechnology

Communication Technologies

Communication Hardware…

Communication Network…

Page 24: Class_notes_InternetTechnology

Communications Networks:

Activity associated with distributing or exchanging information.

Telecommunications –

Technology of communications at a distance that permits information to be created any where and used everywhere with little delay

It involves

– Data: digital and analog– Voice: spoken word– Video: telecommunication imaging

Page 25: Class_notes_InternetTechnology

Essentials for Communications:

Must have a message Message must have a transmitter Message must have a medium Message must be understood Message must have some level of security

(Flow Diagram)

Source Transmitter Transmission Receiver Destination

Source System Destination System

Workstation/PC Workstation/PCMedium

Page 26: Class_notes_InternetTechnology

Network:point to point or point to multiple point connected mediaA network is a group of computers connected together.low cost, reliable, and efficient means of communicating at a distance.

Node:Anything connected to the networkUsually a computerA printer or a scanner

Segment: Any portion of a network that is separated by a switch, bridge or a router from another part of a network.

Backbone: The main cabling of a network that all of the segment connect to.Backbone is capable of carrying more information than the individual segments.

Page 27: Class_notes_InternetTechnology

Simplex: Information flows in only one direction

Half-duplex: Information flows in two directions, but only in one direction at a time.

Full-duplex: Information flows in two directions at the same time

Page 28: Class_notes_InternetTechnology

Basic Signal Terminologies

Bit- binary digit, either 0 or 1

Baud- one electronic state change per second

Bit rate- a method for measuring data transmission speed (bits/second)

Mbps- millions of bits per second (data speed; measure of bandwidth = total information flow over a given time) on a telecommunication medium

8 bits = 1 byte

Mb- million bits (quantity of data)

MB- million bytes (quantity of data)

Gbps- Billion bits per second (data speed)

Teraflops- trillion operations per second

Page 29: Class_notes_InternetTechnology

Data rate- bits per second

Bandwidth- bandwidth or signal in cycles per second or hertz

Noise- Average level of noise over the communication path.

Error rate- rate at which errors occur where error in 1 or 0 bit occurs

Page 30: Class_notes_InternetTechnology

Communication Hardware:

Transmission medium-

Guided Medium: waves are guided along a solid medium path (twisted pair, coaxial cable, and optical fiber).

Unguided medium: waves are propagated through the atmosphere and inner/outer space (satellite, laser, and wireless transmissions)

Conductive: twisted pairs and coaxial cables

Electromagnetic: microwave

Light: lasers and optical fibers (need clear line of sight)

Wireless – inner/outer space, satellite (Omni directional)

Page 31: Class_notes_InternetTechnology

Hubs:

A place where data converges from one or more directions and is forwarded out in one or more directions.

Seen in local area networks

Page 32: Class_notes_InternetTechnology

Gateways:A gateway is a network point that acts as an entrance to another network. In terms of routing, the network consists of gateway nodes and host nodes. Host nodes are computer of network users and the computers that serve contents (such as Web pages).Gateway nodes are computers that control traffic within your company’s network or at your local internet service provider (ISP)

Routers:A router is a device or a software in a computer that determines the next network point to which a packet should be forwarded toward its destination.Allow different networks to communicate with each otherA router creates and maintain a table of the available routes and their conditions and uses this information along with distance and cost algorithms to determine the best route for a given packet.A packet will travel through a number of network points with routers before arriving at its destination.

Page 33: Class_notes_InternetTechnology

Bridge:A bridge is a product that connects a local area network (LAN) to another local area network that uses the same protocol (for example, Ethernet or token ring).A bridge examines each message on a LAN, "passing" those known to be within the same LAN, and forwarding those known to be on the other interconnected LAN (or LANs).

Difference between (Bridge, Router, Gateway):Bridge: device to interconnect two LANs that use the SAME logical link control protocol but may use different medium access control protocols.Router: device to interconnect SIMILAR networks, e.g. similar protocols and

workstations and servers.

Gateway: device to interconnect DISSIMILAR protocols and servers, and Macintosh and IBM LANs and equipment

Page 34: Class_notes_InternetTechnology

(Bridge Diagram)

Page 35: Class_notes_InternetTechnology

Switches:

Allow different nodes of a network to communicate directly with each other.Allow several users to send information over a network at the same time

without slowing each other down.

Page 36: Class_notes_InternetTechnology

Modulation:

In a modem, the MODULATION process involves the conversion of the digital computer signals (high/low, on/off or logic 1 and 0 states) to audio-frequency tones.

Demodulation:The DEMODULATION process converts the audio tones back into digital signals that a computer can understand directly.

Page 37: Class_notes_InternetTechnology

Internet Technology:Internet technology refer-

ArchitectureServices

Architecture-wise:

Page 38: Class_notes_InternetTechnology

Service-wise (applications):

Electronic mailRemote terminalFile transferNewsgroupsFile sharingResource distributionWorld Wide WebVideo conferencingGames

Page 39: Class_notes_InternetTechnology

Packet:A small, self-contained parcel of data sent across a computer network.Each packet contains a header that identifies the sender and recipient, and a payload area that contains the data being sent.All messages sent on a network such as the Internet are broken into small chucks called packets.

To From Payload / Data

208.47.4.80:80 10.11.1.115 GET /index.html

Header

Packet:A small, self-contained parcel of data sent across a computer network.Each packet contains a header that identifies the sender and recipient, and a payload area that contains the data being sent.All messages sent on a network such as the Internet are broken into small chucks called packets.

To From

Packet:A small, self-contained parcel of data sent across a computer network.Each packet contains a header that identifies the sender and recipient, and a payload area that contains the data being sent.All messages sent on a network such as the Internet are broken into small chucks called packets.

To

Packet:A small, self-contained parcel of data sent across a computer network.Each packet contains a header that identifies the sender and recipient, and a payload area that contains the data being sent.All messages sent on a network such as the Internet are broken into small chucks called packets.

From

Packet:A small, self-contained parcel of data sent across a computer network.Each packet contains a header that identifies the sender and recipient, and a payload area that contains the data being sent.All messages sent on a network such as the Internet are broken into small chucks called packets.

To Payload / Data

Packet:A small, self-contained parcel of data sent across a computer network.Each packet contains a header that identifies the sender and recipient, and a payload area that contains the data being sent.All messages sent on a network such as the Internet are broken into small chucks called packets.

From

Packet:A small, self-contained parcel of data sent across a computer network.Each packet contains a header that identifies the sender and recipient, and a payload area that contains the data being sent.All messages sent on a network such as the Internet are broken into small chucks called packets.

To Payload / Data

Packet:A small, self-contained parcel of data sent across a computer network.Each packet contains a header that identifies the sender and recipient, and a payload area that contains the data being sent.All messages sent on a network such as the Internet are broken into small chucks called packets.

From

Packet:A small, self-contained parcel of data sent across a computer network.Each packet contains a header that identifies the sender and recipient, and a payload area that contains the data being sent.All messages sent on a network such as the Internet are broken into small chucks called packets.

To

GET /index.html

Payload / Data

Packet:A small, self-contained parcel of data sent across a computer network.Each packet contains a header that identifies the sender and recipient, and a payload area that contains the data being sent.All messages sent on a network such as the Internet are broken into small chucks called packets.

From

Packet:A small, self-contained parcel of data sent across a computer network.Each packet contains a header that identifies the sender and recipient, and a payload area that contains the data being sent.All messages sent on a network such as the Internet are broken into small chucks called packets.

To

GET /index.html

Payload / Data

Packet:A small, self-contained parcel of data sent across a computer network.Each packet contains a header that identifies the sender and recipient, and a payload area that contains the data being sent.All messages sent on a network such as the Internet are broken into small chucks called packets.

From

Packet:A small, self-contained parcel of data sent across a computer network.Each packet contains a header that identifies the sender and recipient, and a payload area that contains the data being sent.All messages sent on a network such as the Internet are broken into small chucks called packets.

To

10.11.1.115 GET /index.html

Payload / Data

Packet:A small, self-contained parcel of data sent across a computer network.Each packet contains a header that identifies the sender and recipient, and a payload area that contains the data being sent.All messages sent on a network such as the Internet are broken into small chucks called packets.

From

Packet:A small, self-contained parcel of data sent across a computer network.Each packet contains a header that identifies the sender and recipient, and a payload area that contains the data being sent.All messages sent on a network such as the Internet are broken into small chucks called packets.

To

208.47.4.80:80 10.11.1.115 GET /index.html

Payload / Data

Packet:A small, self-contained parcel of data sent across a computer network.Each packet contains a header that identifies the sender and recipient, and a payload area that contains the data being sent.All messages sent on a network such as the Internet are broken into small chucks called packets.

From

Packet:A small, self-contained parcel of data sent across a computer network.Each packet contains a header that identifies the sender and recipient, and a payload area that contains the data being sent.All messages sent on a network such as the Internet are broken into small chucks called packets.

To

Page 40: Class_notes_InternetTechnology

When the web server receives this request, it will send the web page back to my computer by breaking it down into smaller parts and sending each part in a packet

Part 1 of web page

Part 2 of web page

10.11.1.115 208.47.4.80

10.11.1.115 208.47.4.80

To From Payload / Data

Packet 1

Packet 2

Page 41: Class_notes_InternetTechnology

The Client/Server:

clients

Nodes that use the network's resources are called clients (usually

computers), and nodes that manage the sharing of resources are called

servers.

Servers are specialized computers with their own operating systems and

network administration software.

Client Server

http

Page 42: Class_notes_InternetTechnology

Performance: Latency and Bandwidth:

Latency – How long minimum communication takes in seconds (s)– Round trip vs. single trip– More difficult to overcome than bandwidth

Bandwidth – Number of bits per time unit usually seconds (bps)

bandwidth

latency

link

Page 43: Class_notes_InternetTechnology

Architectural Approaches:

Connection orientedConnectionless

Connection-oriented– Circuit switched

(Persistent connection set up between sender and receiver

Example: telephone system)Connectionless

– Packet switched

(Data partitioned into packets and sent individually from sender to receiver and reassembled at receiver.)

Page 44: Class_notes_InternetTechnology

Switching Schemes:

(1) Circuit Switching

(2) Message Switching (Store-and-Forward)

(3) Packet Switching (Store-and-Forward)

Circuit Switching:

Provides service by setting up the total path of connected lines hop-by-hop

from the origin to the destination

Example: Telephone network

Properties:

Point-to-point communicationSeparate steps for circuit creation, use, and terminationPerformance equivalent to an isolated physical path

Page 45: Class_notes_InternetTechnology

Message Switching:

Each message is addressed to a destinationWhen the entire message is received at a router, the next step in its journey

is selected; if this selected channel is busy, the message waits in a queue until the channel becomes free

Thus, the message “travel (hope)” from node to node through a network while allocating only one channel at a time

Packet Switching:

Messages are split into smaller pieces called packetsThese packets are numbered and addressed and sent through the network

one at a time.Allows Pipelining

Page 46: Class_notes_InternetTechnology

Comparison of Switching Technologies:

(Circuit switched)

AdvantagesOnly route onceLatency and bandwidth constant

DisadvantagesIdle resources unavailable for other connectionsLarge setup timeSingle point of failure

(Packet switched)

Advantages Efficient use of wires Small startup overhead

Disadvantages Route each packet Per packet overhead Bursty

Page 47: Class_notes_InternetTechnology

Netiquette & Ethics

Page 48: Class_notes_InternetTechnology

Etiquette:

Is the practice of good manners.being polite and helpful.being kind and not aggressive.Being mindful of the fact that others may see things differently than oneself.

Netiquette:

Is etiquette for the Internet.Being polite to others.Important there are no facial clues or body-language to help us understand

another person, as there is in face to face meetings.

Page 49: Class_notes_InternetTechnology

Ten Commandments Of Computer Ethics:

1. Not Use A Computer To Harm Other People.

2. Not Interfere With Other People’s Computer Work.

3. Not Snoop Around In Other People’s Computer Files.

4. Not Use A Computer To Steal.

5. Not Use A Computer To Bear False Witness.

6. Not Copy Or Use Proprietary Software For Which You have Not Paid.

7. Not Use Other People’s Computer Resources Without Authorization

8. Not Appropriate Other People’s Intellectual Output.

9. You Shall Think About The Social Consequences Of The Program

10. You Shall Always Use A Computer to respect for your fellow humans.

Page 50: Class_notes_InternetTechnology

Publishing and Browsing the Web

What is World Wide Web?

The World Wide Web (WWW) is a global interactive, dynamic, cross platform, graphical hypertext information system that runs on the Internet.

Internet Standard Domain Names:

Edu: educational organizationsCom: commercial organizationsGov: government institutionsMil: military groups Net: major network support centre'sOrg: organizations other than the aboveInt: international organizations

Page 51: Class_notes_InternetTechnology

Web Browser:

A Web Browser is special software such as Netscape, Mosaic or Internet Explorer. These browsers allow a user to view Web pages delivered from a client server (Web Site) situated at a particular URL on the World Wide Web

Search Engines on the WWW:

Tools on the WWW used to search and find web sites related to a particular topic.

provide for searching using keywords and boolean operators.

Popular ones are Alta Vista, Infoseek, HotBot,Web Crawler, Lycos and Yahoo.

Over 600 search engines working at present.

Page 52: Class_notes_InternetTechnology

Web Page:

A web Page is a single document written in HTML ( Hypertext Markup Language ) that includes the text of the document, its structure, any links to other documents and graphic images and other media.

Homepage:

Homepage is a Hypertext document a server will serve as default.

URL:

A URL is the space of a web browser where the address of a website is written

Page 53: Class_notes_InternetTechnology

Web Protocol and Language:

HTTP (Hyper Text Transfer Protocol)

– The simple protocol used to transfer a World Wide Web page from one computer to another.

– A web client opens up a connection to a web server and sends GET PAGENAME and then the web server sends back the page text (usually HTML) over the connection.

HTML (Hyper Text Markup Language)

– The source form used for documents on the World Wide Web. HTML embeds commands that determine formatting along with the text to be displayed (e.g., to move to a new line or indent text).

Page 54: Class_notes_InternetTechnology
Page 55: Class_notes_InternetTechnology

Uniform Resource Locator (URL):

Method of accessing Internet Resources. URLs are used by web browsers to connect you directly to a specific document or homepage on resource is physically located.

Example URL:Example URL:

http://www.nic.in:80/nicnet.html

Host AddressHost AddressPortPort

Path/DocumentPath/Document

Page 56: Class_notes_InternetTechnology

Data Communication:

1) Coaxial cable

Widely installed for use in business and corporation Ethernet and other types of LANs.Consists of inter copper insulator covered by cladding material, and then covered by an outer jacket

:Physical Descriptions:

Covered by sheath material Outer conductor is braided shielded (ground)

Separated by insulating material

Inner conductor is solid copper metal

Page 57: Class_notes_InternetTechnology

•Applications:– TV distribution (cable TV); long distance telephone transmission; short

run computer system links– Local area networks

•Transmission characteristics:– Can transmit analog and digital signals– Usable spectrum for analog signaling is about 400 Mhz– Amplifier needed for analog signals for less than 1 Km and less

distance for higher frequency– Operation of 100’s Mb/s over 1 Km.

Page 58: Class_notes_InternetTechnology

2) Twisted Pair Cables:

•Physical description:– Each wire with copper conductor– Separately insulated wires– Twisted together to reduce cross talk– Often bundled into cables of two or four twisted pairs– If enclosed in a sheath then is shielded twisted pair (STP) otherwise

often for home usage unshielded twisted pair (UTP). Must be shield from voltage lines

•Application:– Common in building for digital signaling used at speed of 10’s Mb/s

(CAT3) and 100Mb/s (CAT5) over 100s meters. – Common for telephone interconnection at home and office buildings– Less expensive medium; limited in distance, bandwidth, and data rate.

Page 59: Class_notes_InternetTechnology

3) Optical Fibers:

•Physical Description:– Glass or plastic core of optical fiber = 2to125 µm– Cladding is an insulating material– Jacket is a protective cover– Laser or light emitting diode provides transmission light source

•Applications:– Long distance telecommunication– Greater capacity (2 Gb/s over 10’s of Km)– Smaller size and lighter weight– Lower attenuation (reduction in strength of signal)– Electromagnetic isolation (not effected by external electromagnetic

environment.– Greater repeater spacing (fewer repeaters, reduces line regeneration

cost)

Page 60: Class_notes_InternetTechnology

4) Wireless Transmission:

•Frequency range (line of sight):– 26 GHz to 40 GHz: for microwave with highly directional beam as

possible– 30 MHz to 1 GHz: for Omni directional applications– 300MHz to 20000 GHz: for infrared spectrum; used for point to point

and multiple point application (line of sight)

•Physical applications:– Terrestrial microwave – long haul telecommunication service

(alternative to coaxial or optical fiber)– Few amplifier and repeaters– Propagation via towers located without blockage from trees, etc (towers

less than 60 miles apart)

Page 61: Class_notes_InternetTechnology

Data Security:

Need for Security:

Page 62: Class_notes_InternetTechnology

1. Network layer security

TCP/IP can be made secure with the help of cryptographic methods and protocols that have been developed for securing communications on the Internet.

Ex: Electronic mail security (E-mail)

2. Pretty Good Privacy (PGP)

PGP provides confidentiality by encrypting messages to be transmitted or data files to be stored using an encryption algorithm such 3DES or CAST-128.

Email messages protection ways:

•Signing an email message to ensure its integrity and confirm the identity of its sender.•Encrypting the body of an email message to ensure its confidentiality.

•Encrypting the communications between mail servers to protect the

confidentiality of both the message body and message header.

Page 63: Class_notes_InternetTechnology

3. Multipurpose Internet Mail Extensions (MIME):

MIME transforms non-ASCII data at the sender's site to Network Virtual Terminal (NVT) ASCII data

It delivers it to client's Simple Mail Transfer Protocol (SMTP) to be sent through the Internet.

The server SMTP at the receiver's side receives the NVT ASCII data and delivers it to MIME to be transformed back to the original non ASCII data.

Example-

I. Secure/Multipurpose Internet Mail Extensions (S/MIME)

Page 64: Class_notes_InternetTechnology

Firewalls:

A firewall controls access between networks. It generally consists of gateways and filters which vary from one firewall to another. Firewalls also screen network traffic and are able to block traffic that is dangerous.

Types of firewalls:

1. Packet filters

Packet filters are one of several different types of firewalls that process network traffic on a packet-by-packet

basis. Their main job is to filter traffic from a remote IP host, so a router

is needed to connect the internal network to the Internet. The router is known as a screening router, which screens

packets leaving and entering the network.

Page 65: Class_notes_InternetTechnology

2. Circuit-level gateways

The circuit-level gateway is a proxy server that statically defines what traffic will be allowed.

Circuit proxies always forward packets containing a given port number.port number is permitted by the rules set

3. Application-level gateways

An application-level gateway is a proxy server operating at the TCP/IP application level.

A packet is forwarded only if a connection is established using a known

protocol.

Page 66: Class_notes_InternetTechnology

Malicious software and antivirus:

1. Malware

Commonly, a computer user can be tricked or forced into downloading software onto a computer that is of malicious intent. Such programs are known as malware and come in many forms, such as viruses, Trojan horses, spyware, and worms.

2. Viruses

Viruses are programs that can replicate their structures or effects by infecting other files or structures on a computer. The common use of a virus is to take over a computer to steal data.

3. Trojan horse

A Trojan horse (commonly known as a Trojan) is a general term for malicious software that pretends to be harmless so that a user willingly allows it to be downloaded onto the computer.

Page 67: Class_notes_InternetTechnology

4. Spyware

The term spyware refers to programs that surreptitiously monitor activity on a computer system and report that information to others without the user's consent.

5. Worms

Worms are programs that can replicate themselves thoughout a computer network, performing malicious tasks throughout.

6. Botnet

A botnet is a network of "zombie" computers that have been taken over by a "bot" that performs large-scale malicious acts for the creator of the botnet.

Page 68: Class_notes_InternetTechnology

Antivirus:

Antivirus programs and Internet security programs are useful in protecting a computer or programmable device from malware.

Such programs are used to detect and usually eliminate viruses.A user would pay for antivirus software. A computer users now can, and do, download from a host of free security applications on the Internet.

Buffer overflow attacks:A buffer overflow is an attack that could be used by a cracker to get full

system access through various methods.By essentially cracking a computer using brute force.Most security applications and suites are incapable of adequate defense

against these kinds of attacks.

Ex- Through remote control process.

Page 69: Class_notes_InternetTechnology

Client-Server Architecture:

A network architecture in which each computer or process on the network is either a client or a server.

Components of Client-Server Architecture:

• Client• Server• Communication Network

Page 70: Class_notes_InternetTechnology

Tier Architecture of Client Server model:

2-Tier Architecture :

2-tier architecture is used to describe client/server systems where the client requests resources and the server responds directly to the request, using its own resources. This means that the server does not call on another application in order to provide part of the service.

Page 71: Class_notes_InternetTechnology

3-Tier Architecture :

• In 3-tier architecture, there is an intermediary level, meaning the architecture is generally split up between:

• A client, i.e. the computer, which requests the resources, equipped with a user interface (usually a web browser) for presentation purposes

• The application server (also called middleware), whose task it is to provide the requested resources, but by calling on another server

• The data server, which provides the application server with the data it requires

Page 72: Class_notes_InternetTechnology

Multi-Tiered Architecture :

Page 73: Class_notes_InternetTechnology

WWW

Definition:

All the resources and users on the Internet that are using the Hypertext Transfer Protocol (HTTP)

History:

1969 - RFCs begun by S. Crocker1972 - Email by Ray Tomlinson & Larry Roberts1970’s - TCP by Vint Cerf & Bob Kahn1980s – Hardware Explosion (LANs, PCs, and workstations)1983 – Ethernet by Metcalfe1985 – Internet used by researchers and developers

Page 74: Class_notes_InternetTechnology

Development of Internet:

Internet evolved from ARPANET. It includes

first operational packet network

applied to tactical radio & satellite nets also

had a need for interoperability

led to standardized TCP/IP protocols

Page 75: Class_notes_InternetTechnology

Model diagram of WWW:

CGI

User

CLIENT

HTTP

TCP/IP

SERVER

Docs