* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Introduction to the Internet, ping and traceroute
Internet protocol suite wikipedia , lookup
Net neutrality law wikipedia , lookup
Computer network wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Deep packet inspection wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Get the Net! Introduction to the Internet, World Wide Web, and the Utilities of Ping and Traceroute CSIT 220 (Blum) 1 Networks • A network is a collection of computers connected together so that they can share information. • A network is called a local area network (or LAN) if the constituent computers are all located in the same vicinity. CSIT 220 (Blum) 2 Other networks • Metropolitan area networks (MANs) are spread throughout a city or county. For example, a cellular phone network. • Wide area networks (WANs) are spread over an even wider area, a telephone company, for instance. CSIT 220 (Blum) 3 Internet • When two or more networks are connected, they form an internet. (small i) • The Internet (capital I) is the global collection of connected networks. • “The biggest WAN of them all” CSIT 220 (Blum) 4 A Little History • An early ancestor of the Internet was called ARPANET (ARPA stands for Advanced Research Project Agency). • It was built in the late 60’s by a collaboration of universities and the military. • One desired feature was a network that would still function if part of it was “knocked out.” CSIT 220 (Blum) 5 Connections • The whole point of being “connected” is that information can be passed back and forth. – Originally it was more about sharing processing power which was scarce, then as processors became more powerful it was more about sharing information. • Information (signals) can be sent through the air (as in radio, non-cable television or wireless networks) or through wires (as in telephone, cable tv or wired networks). CSIT 220 (Blum) 6 Wire • Twisted pair wire looks somewhat like the wire to your telephone. • Coaxial cable looks like the wire to your cable tv. • Fiber optic cable sends light beams. • Each successive wire has more bandwidth; bandwidth is related to the rate of information that can be send. • (bandwidth wire thickness) CSIT 220 (Blum) 7 Packets • On the Internet, the information is broken into pieces, called packets, which are sent individually over the wire. • The packets must also contain the information that allows the computer to reassemble them. • More like sending letters than talking on the phone. CSIT 220 (Blum) 8 Routers • Packets are to letters as routers are to sorters in the post office. • A router is the intelligent part of the connection that directs the information to the right place. • The analog of one’s address and zip code is the Internet protocol (IP) address. CSIT 220 (Blum) 9 Inter Vs. Intra • Inter: between or among • Intra: within or inside of • Intranet: a set-up like the Internet (having browsers, email, etc.) but not connected to the outside world (often used by companies wanting to maintain some privacy). CSIT 220 (Blum) 10 Firewalls • A firewall restricts the flow of information both into and out of a network. • An attempt to have the best of both worlds: connectivity and access to information on one hand, privacy and security on the other. • In the mail analogy, it is as though your mail is being censored. CSIT 220 (Blum) 11 The Web The Net • The World Wide Web is only part of the Internet. • The Internet also includes – e-mail (electronic mail): to send messages to and receive messages from, on the same or other networks – ftp (file transfer protocol): to put or get files from other computers CSIT 220 (Blum) 12 The Net > The Web • The Internet also incudes: – telnet: to log onto a computer that one is not physically in front of – gopher: to find files on the Internet; gopher is a precursor to a “search engine” – usenet: to promote discussions on various topics among discussion or news groups CSIT 220 (Blum) 13 CSIT 220 (Blum) 14 The World Wide Web • The Web is a hyperlinked multimedia database. • It is a vast collection of information stored in files (hence a database, at least in an informal sense). • It appears as documents with text, as well as graphics, audio, animation, and video (hence multimedia). CSIT 220 (Blum) 15 The Web • Finally, the documents (web pages) are connected to one another via hyperlinks, a reference to another web page which if clicked takes one to that page. • Moving about in this fashion is generally referred to as “surfing.” CSIT 220 (Blum) 16 Web Vs. Tree • Gopher is older than the Web and also allows one to access files. • It has a “hierarchical” or tree structure. • One could not jump from one branch to another; one had to climb back down the tree. • The Web, if less structured, is more highly connected. CSIT 220 (Blum) 17 Tree (like Windows Explorer) Web CSIT 220 (Blum) 18 Getting Around (URL’s) • The fancy term for a web site address is a uniform resource location (URL) • A URL consists of several parts, e.g. • http://www.lasalle.edu/lsu-site/it/notes.htm#attach – protocol: a set of standards allowing computers to exchange information – http - “hypertext transfer protocol” (others: ftp, gopher, telnet, news) CSIT 220 (Blum) 19 URL’s (cont.) • http://www.lasalle.edu/lsu-site/it/notes.htm#attach – domain: denotes the computer that holds the web page (stands in for the IP address) – often starts with www (World Wide Web) – ends with the type of organization operating the site or the country (known as the top-level domain) • edu (education), gov (government), mil (military), org (organization), net (networks), uk (United Kingdom), ch (Switzerland) CSIT 220 (Blum) 20 URL’s (cont.) • http://www.lasalle.edu/lsu-site/it/notes.htm#attach – the folder (or directory) containing the file, also known as the path • http://www.lasalle.edu/lsu-site/it/notes.htm#attach – the file or document (often an html file) • http://www.lasalle.edu/lsu-site/it/notes.htm#attach – anchor or fragment, indicates a specific part of a document • (A URL can also have a port number) CSIT 220 (Blum) 21 Ping and traceroute • Having a network is about being connected – having information be directed from one computer to another. • One can check on connectivity using ping and actually determine the path information takes using traceroute. • Material based on Chapter 2 in Computer Networks and Internets (Comer) CSIT 220 (Blum) 22 Pinging • Some say ping is short for Packet Internet Groper. • It is a utility that sends a message to a computer and waits for a response. – A utility is part of system software that is used to help manage the computer’s resources, as opposed to application software. • If the response is received, information about the time required and so on are reported. • If the response is not received in a certain amount of time, the request is said to have “timed out.” CSIT 220 (Blum) 23 Pinging (Cont.) • It works by sending special packets to a destination – an IP address or domain name. – The special packets belong to Internet Control Message Protocol (ICMP). – You send a echo request and you receive an echo reply. • If the destination responds, you have a good TCP/IP connection (working route). CSIT 220 (Blum) 24 Breaking it down • Pinging consists of the command “ping” followed by an IP address or domain name – ping 139.84.10.250 – ping www.lasalle.edu • It sends out special packets which request a response (echo reply) if the destination host is reached. CSIT 220 (Blum) 25 Host • A host is a computer that is connected to a TCP/IP network, including the Internet. • Each host has a unique IP address. – A computer may always have the same address or may have a different address each time it connects to the networks. – Two computers on the same network or internet at the same time should not have the same address. CSIT 220 (Blum) 26 IP (v4) Address • A 32-bit number that identifies a computer or device on a TCP/IP network. – TCP/IP stands for Transmission Control Protocol/Internet Protocol • A 32-bit number consists of four bytes – A byte is eight bits (a.k.a. an octet) – 256 (0 through 255) numbers can be represented using a byte – 256 = 28 = 2 2 2 2 2 2 2 2 CSIT 220 (Blum) 27 Numbers represented using a byte • • • • • • • • • • • • • • • • 00000000 00000001 00000010 00000011 00000100 00000101 00000110 00000111 CSIT 220 (Blum) ETC., ETC. 00001000 00001001 00001010 00001011 00001100 00001101 00001110 00001111 28 Usual form • Instead of writing out a string of thirty-two 1’s and 0’s, IP addresses are usually written as four numbers between 0 and 255 separated by periods (the dotted decimal notation) • For example 139.84.10.250 CSIT 220 (Blum) 29 How many? • With 32 bits, 232 devices could be distinguished. • Actually the number of valid IP addresses is less than 232 because certain addresses are reserved for special purposes (127.0.0.1 is one example we’ll see later) – Another problem is that addresses are “owned” by people not using them. CSIT 220 (Blum) 30 Running out • IP addresses are broken into classes (more on this later in the semester) – Class A - supports 16 million hosts on each of 127 networks. – Class B - supports 65,000 hosts on each of 16,000 networks. – Class C - supports 254 hosts on each of 2 million networks. • The number of unassigned Internet addresses is running out, so a new classless scheme called CIDR is gradually replacing the system based on classes A, B, and C and is tied to adoption of IPv6. CSIT 220 (Blum) 31 The Next Generation • IPv6 (IP version 6), a.k.a. IPng: Internet Protocol next generation is an extended version of the Internet Protocol (IP) “Recommended” by an IETF standards committee. • The commonly used version of IP is version 4, so it is sometimes referred to as IPv4. CSIT 220 (Blum) 32 IP Address (cont.) • In an isolated network, any set of IP addresses can be assigned. • On the other hand, connecting a network to the Internet requires using registered IP addresses to avoid duplications. • The InterNIC Registration Service assigns Internet addresses. CSIT 220 (Blum) 33 Domain name • A domain name is a string of characters standing in for an IP address. • It can be more complicated, it can be that – One Name Multiple Addresses, or – One Address Multiple Names • Domain names are used in URLs to identify particular Web pages. For example, in the URL http://www.pcwebopedia.com/index.html, the domain name is pcwebopedia.com. CSIT 220 (Blum) 34 Packet • A packet is a message (protocol + “some” data) or a piece of a message transmitted over a packet-switching network. • A packet must also contain an address (identifier) so that it can be routed to its destination. CSIT 220 (Blum) 35 Packet switching • A set of protocols (rules for communication) in which messages are broken into pieces called packets before being sent. • The packets are transmitted individually (connectionless). – They may follow different routes. – They can arrive out of order. – Share the medium with other packets from other transmissions. • When the packets arrive, they are reassembled into the original message. CSIT 220 (Blum) 36 As opposed to Circuit switching • Another way to send information is called circuit switching (connection oriented). • A telephone call is an example of circuit switching. A dedicated line is allocated for transmission between two parties. • Preferred when speed and the order the data is sent in are important, as is the case with real-time data, such as live audio and video. CSIT 220 (Blum) 37 Pinging: Start/Run CSIT 220 (Blum) 38 Pinging: Type command in Run dialog box Older systems might use command instead CSIT 220 (Blum) 39 Pinging: type ping followed by domain name CSIT 220 (Blum) 40 Pinging a host which was off at the time Timed out Can use IP instead of domain name CSIT 220 (Blum) 41 Pinging webopedia, also timed out CSIT 220 (Blum) 42 Webopedia ping timed out, even though site was up CSIT 220 (Blum) 43 Denial of service • One possibility is that some companies block pings because their systems could become clogged with ping requests. • Rejecting pings could make a site less vulnerable to a Denial of Service (DoS) attack, in which a site is flooded with so many requests that it cannot answer them all. CSIT 220 (Blum) 44 Slow connection versus no connection CSIT 220 (Blum) The network was slow when I was doing this. 45 Type ping /? To find the various options CSIT 220 (Blum) 46 Using the count request option to send 5 instead of 4 CSIT 220 (Blum) 47 Useful or not? • Simply pinging a remote host (a computer that is on one’s internet but not on one’s network) usually has an all or nothing outcome and as such can provide somewhat limited information. • A sequence of pinging can provide more information (see MCSE TCP/IP for Dummies). CSIT 220 (Blum) 48 Pinging yourself using localhost or 127.0.0.1: verifies that TCP/IP has been installed and started correctly Reserved IP address CSIT 220 (Blum) 49 Pinging yourself using your IP, checks that the IP is valid CSIT 220 (Blum) 50 You can use another utility ipconfig to find your IP if you don’t know it CSIT 220 (Blum) 51 Pinging the Gateway – timing out here may indicate a problem with the router CSIT 220 (Blum) 52 Gateway • Recall that one gets an internet by connecting more networks. • The point at which data leaves one (local) network and enters another is known as a gateway. • A node (a device on the Internet) can be either a gateway, router, or a host (endpoint). CSIT 220 (Blum) 53 Host/Gateway • When you are looking at some site on the net, your computer and the one containing the site are hosts. • On the other hand, the computers that direct the traffic, for example your Internet service provider (ISP) are gateway/router nodes. CSIT 220 (Blum) 54 Traceroute • A utility that traces (determines the route taken by) a packet from your computer (the local host) to some other host on the network. – It doesn’t actually follow a single packet but sends out a series of packets. – The packets are restricted in the number of “hops” they can take. • It is limited by the time-to-live (TTL) field – When the limit is reached, information about the node is (should be) returned. – Each consecutive packet is allowed one more hop. CSIT 220 (Blum) 55 Hop • A hop is when a packet is transmitted from one node to the next. • “Some Internet Service Providers (ISPs) advertise how many hops away from Internet backbone they are. Theoretically, the fewer hops it takes to get your data onto the backbone, the faster your access will be.” (webopedia) CSIT 220 (Blum) 56 Traceroute (Cont.) • Traceroute shows how many hops were required to reach the destination as well as the length of time for each hop. • When the web is sluggish, you can use traceroute to determine where the congestion lies. CSIT 220 (Blum) 57 Traceroute (Cont.) • The original traceroute was for UNIX utility • Windows has a traceroute utility called tracert. • Go to Start/Run, type cmd, and then type “tracert” followed by the domain name of the host. • For example: tracert www.webopedia.com CSIT 220 (Blum) 58 tracert www.whatis.com CSIT 220 (Blum) 59 Other TCP/IP diagnostic commands • • • • • • Nbtstat Netstat Ipconfig Arp Hostname route CSIT 220 (Blum) 60 Other sources • http://www.webopedia.com • http://www.whatis.com • MCSE TCP/IP for Dummies (Cameron Brandon) CSIT 220 (Blum) 61