* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Document
Wireless security wikipedia , lookup
Net neutrality law wikipedia , lookup
Asynchronous Transfer Mode wikipedia , lookup
Network tap wikipedia , lookup
Distributed firewall wikipedia , lookup
Computer network wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Airborne Networking wikipedia , lookup
Deep packet inspection wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
UniPro protocol stack wikipedia , lookup
Internet protocol suite wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Chapter 15 Networks Addresses Networking Computer network: A collection of computing devices that are connected in various ways in order to communicate and share resources. 2 Networking Usually, the connections between computers in a network are made using physical wires or cables. However, some connections are wireless, using radio waves or infrared signals. The generic term node or host refers to any device on a network. 3 Networking Data transfer rate: The speed with which data is moved from one place on a network to another. Also referred to as bandwidth. Data transfer rate is a key issue in computer networks. 4 Networking Another key issue in computer networks is the protocols they use. A protocol is a set of rules describing how two entities interact. 5 Networking Computer networks have opened up an entire frontier in the world of computing called the client/server model. 6 Networking File server: A computer that stores and manages files for multiple users on a network. Web server: A computer dedicated to responding to requests (from a browser client) for web pages. Mail server: A computer dedicated to sending/receiving email. 7 Types of Networks Local-Area Network (LAN). A network that connects a relatively small number of machines in a relatively close geographical area. 8 LAN Topologies Various configurations, called topologies, have been used to administer LANs. Ring topology: a configuration that connects all nodes in a closed loop on which messages travel in one direction. Star topology: a configuration that centers around one node to which all others are connected and through which all messages are sent. Bus topology: all nodes are connected to a single communication line that carries messages in both directions. 9 LAN Topologies Types of Networks Wide-area network (WAN) A network connecting two or more LANs over a potentially large geographic distance. Often one particular node on a LAN is set up to serve as a gateway to handle all communication going between that LAN and other networks. 11 Types of Networks 12 Types of Networks Communication between networks is called internetworking. The Internet, as we know it today, is essentially the ultimate wide-area network, spanning the entire globe. 13 Types of Networks Metropolitan-area network (MAN) The communication infrastructures that have been developed in and around large cities. Often use wireless or optical fiber. York’s networking systems constitute a MAN. 14 So, who owns the Internet? Nobody No single person or company owns the Internet or even controls it entirely. A wide-area network, made up of many smaller networks. These smaller networks are often owned and managed by a person or organization. The Internet is really defined by how connections are made between networks. 15 Internet Connections Internet backbone High-speed networks that carry Internet traffic. These networks are provided by companies such as AT&T, GTE, and IBM. High data transfer rates 1.5 to 600 megabits/sec. Redundancy 16 Internet Connections Internet service provider (ISP) A company that provides other companies or individuals with access to the Internet. 17 Internet Connections Various technologies have been used to connect a home computer to the Internet: A phone modem (modulator/demodulator) converts computer data into analog audio signals for transfer over a telephone line, and then a modem at the destination converts it back into data. Simple implementation Limited bandwidth – 64 kilobits/sec. 18 Internet Connections Broadband Any connection in which transfer speeds are faster than 128 kilobits/sec. A digital subscriber line (DSL) uses regular copper phone lines to transfer digital data to and from the phone company’s central office. A cable modem uses the coaxial cable that transfer TV signals. 19 Internet Connections Download Upload Data travelling to your computer Data travelling to a remote computer Speeds quotes are for downloads May be several times faster than uploads 20 Packet Switching To improve the efficiency of transferring information over a shared communication line, messages are divided into fixed-sized, numbered packets. Packet Switching is a digital networking communications method that groups all transmitted data – regardless of content, type, or structure – into suitably-sized blocks, called packets. Packet switching features delivery of variable-bit-rate data streams (sequences of packets) over a shared network. When traversing network adapters, switches, routers and other network nodes, packets are buffered and queued, resulting in variable delay and throughput depending on the traffic load in the network. 15-18 Packet Switching Packet Switching Network devices called routers are used to direct packets between networks. To ensure that data does not degrade as it travels long distances, repeaters are installed along the line to strengthen (reclock) the signal. 15-18 15.2 - Open Systems Proprietary system A system that uses technologies kept private by a particular commercial vendor. One system couldn’t communicate with others, leading to the need for… Interoperability The ability of software and hardware on multiple machines and from multiple commercial vendors to communicate. Leading to… Open systems Systems based on a common network architecture and a suite of protocols used in its implementation. 24 Open Systems The International Organization for Standardization (ISO) established the Open Systems Interconnection (OSI) Reference Model. Each layer deals with a particular aspect of network communication. 25 Current Standard The OSI’s 7 layer model is an ideal, but standard practice actually has 4 layers: Application Layer Transport Layer Network Layer Link Layer 26 Application Layer Consists of software units that communicate with each other across the Internet. Passes complete message to the Transport Layer… Examples of these “high-level” protocols include: SMTP POP3 Telnet FTP HTTP 27 Transport Layer Receives complete messages from the Application layer. Divides the message into packets. Adds a sequence number to each packet. Attaches the destination address to each packet. Passes the packets to the Network Layer. Examples include: TCP - Transmission Control Protocol UDP - User Datagram Protocol 28 TCP TCP stands for Transmission Control Protocol TCP software breaks messages into packets, hands them off to the IP software for delivery, and then orders and reassembles the packets at their destination. UDP stands for User Datagram Protocol It is an alternative to TCP. The main difference is that TCP is highly reliable, at the cost of decreased performance, while UDP is less reliable, but generally faster. 29 Network Layer Receives addressed packets from the Transport Layer. Adds an intermediate address. If the destination is within the current net, the intermediate and destination addresses are the same. Otherwise, the intermediate address is for a router in the current net, which will pass the packet to an adjacent net. Passes the packet to the Link Layer. 30 IP …is the most common Network Layer. Internet Protocol IP software deals with the routing of packets through the maze of interconnected networks to their final destination. The combination of Transport (TCP) and Network (IP) layers is commonly used and referred to as TCP/IP. 31 Link Layer …deals with the details of the particular LocalArea Network (LAN). The LAN protocol controls which machine can send its message next: Rings use tokens. Stars use polling. A bus uses CSMA/CD (Carrier Sense Multiple Access with Collision Detection). A bus technology called Ethernet has become the industry standard for local-area networks. 32 Protocol Layers Application Layer Application Layer Application Layer Transport Layer Transport Layer Transport Layer Network Layer Network Layer Network Layer Link Layer Link Layer Link Layer 33 Network Protocols Network protocols are layered such that each one relies on the protocols that underlie it. This organization is sometimes referred to as a protocol stack. 34 High-Level Protocols Examples of “high-level” protocols include: SMTP POP3 FTP HTTP Telnet - Simple Mail Transfer Protocol - Post Office Protocol - File Transfer Protocol - Hyper Text Transfer Protocol - for remote log-in A port is a numeric designation assigned to a particular high-level protocol. 35 Protocols & Ports 36 MIME Types Related to the idea of network protocols and standardization is the concept of a file’s MIME type. MIME stands for Multipurpose Internet Mail Extension. They define a standard for attaching specially formatted data. Based on a document’s MIME type, an application program can decide how to deal with the data. 37 Firewalls Firewall A machine and its software that serve as a special gateway to a network, protecting it from inappropriate access. Filters the network traffic that comes in, checking the validity of the messages as much as possible, and perhaps denying some messages altogether. Enforces an organization’s access control policy. 38 Firewalls 39 15.3 - Network Addresses Hostname A unique identification that specifies a particular computer on the Internet. An example: www.eecs.yorku.ca 40 Network Addresses Network software translates a hostname into its corresponding IP address. For example, in IPv4 the example hostname maps onto: 130.63.236.200 41 Network Addresses An IPv4 address is structured as four decimal numbers joined by dots (dotted decimal notation). Each decimal number is coded as an octet (8 bits): 42 Network Addresses There is NO correspondence between the parts of an IP address and its corresponding hostname. It’s accidental that there happen to be 4 components in the example hostname. 43 Network Addresses IPv4 is limited to just over 4 billion (2564) unique 4-byte (32 bit) addresses. IPv6 uses 128 bit addresses 8 groups of 16 bits producing 2128 or 65,5368 addresses Expressed in hexadecimal (binary would be very long) IPv4-mapped IPv6 addresses 0000:0000:0000:0000:0000:FFFF:823F:ECC8 44 Domain Name System A hostname consists of several parts. Typically, there is a machine name followed by the domain name. In the example (www.eecs.yorku.ca) “www” is the machine name; “eecs.yorku.ca” is the domain name. 45 Domain Name System A domain name may be further separated into sections that specify the organization, and possibly a subset of an organization (subdomain). In the example above: “yorku” is called the domain, “eecs” is the subdomain. 46 Domain Name System The very last section of the domain name is called its top-level domain (TLD) name. 47 Domain Name System Organizations based in countries other than the United States use a top-level domain that corresponds to their two-letter country codes. 48 Domain Name System ICANN International Corporation for Assigned Names and Numbers Responsible for the coordination of the global Internet's systems of unique identifiers and, in particular, ensuring its stable and secure operation Domain Squatting Led to approval of new TLDs Like “vanity” plates .coke $185K registration fee, $25K annual fee 49 Domain Name System The domain name system (DNS) is chiefly used to translate hostnames into numeric IP addresses. DNS is an example of a distributed database. If a server can resolve the hostname, it does so. If not, that server asks another domain name server. 50 Cloud Computing A service that provides storage on the Internet. The “cloud” consists of servers and software that facilitate storage. auto back-up synchronisation Not a new concept! 51 Cloud Computing Different types of Cloud Services Public Private Community Hybrid 52