* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download chap03
Net neutrality law wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Network tap wikipedia , lookup
Computer network wikipedia , lookup
Deep packet inspection wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Internet protocol suite wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Chapter 3 Internetworking Basics E-Business Technologies 1 Objectives In this chapter, you will learn to: • Identify internetworking hardware, Internet connections, and network addressing issues • Describe the TCP/IP protocol suite, IP addresses, and logical ports • Explain domain names, the Domain Name System, and Uniform Resource Locators • Identify organizations that provide oversight for the Internet and the World Wide Web E-Business Technologies 2 Valued Gateway Client: Internetworking Hardware • Special network devices, called switches and routers, control data transmissions within and between network segments • A network segment is part of a network, usually made up of computers that share a common function • These network devices ensure that data sent between computers on the same segment are transmitted only on that segment E-Business Technologies 3 E-Business Technologies 4 Hubs • Used to connect groups of computers, generally fewer than 64 computers (inexpensive hubs generally stop at 6 computer connections) • Repeats a signal, passing transmissions to all computers on a segment and the signal can be 'heard' by all computers connected via the hub • Each computer connects to a hub using a separate cable • Hubs can interconnect to other hubs, switches, and routers E-Business Technologies 5 Switches • An intelligent device that analyzes data packets to determine how to route a data transmission to its destination • Reduces congestion by directing data transmissions to specific ports used to connect with each computer or device • Switches can interconnect with hubs, switches, and routers E-Business Technologies 6 Routers • Analyzes data packets to determine how to route a data • Specialized computers designed to manage data transmissions over large LANs and WANs • Relies on databases containing address information to locate computers on network (these 'databases' can be maintained within the memory of the router itself) E-Business Technologies 7 Firewalls • A security tool - stands between the outside networks and the inside networks • Specialized hardware or software or a combination of both, that filters all incoming and outgoing transmissions • Blocks transmissions that do not meet specific security criteria why is this important for denial of service attacks, spoofed e-mail, etc? E-Business Technologies 8 Firewalls • Placed between the public network and private network – Public network identifies the external network connection or portion of the Internet on the outside of a firewall – Private network identifies a network or LAN on the inside of a firewall, such as a corporate LAN E-Business Technologies 9 Packet Switching • The practice of breaking data transmissions into packets that can travel independently across a network • Packets are assigned sequence numbers so they can be reassembled in the correct order at the destination • Routers direct packets across the network/Internet to their assigned destination E-Business Technologies 10 Internet Connections • Internet connections can take place using many different types of telecommunications media – Access devices range from a standard phone line and a modem to wireless satellite connections – Individual consumers usually obtain Internet access through an Internet service provider (ISP) such as America Online (AOL) – Businesses usually obtain Internet access using a shared connection consisting of a router on a corporate LAN and a telecommunications connection between the router and the Internet E-Business Technologies 11 Internet Connection Methods • Dial-up router - 56Kbps – Includes a modem that connects to the Internet when it detects an office computer trying to access the Internet • Leased line/Frame relay – A connection that is always on and much more reliable than a dial-up connection • Integrated Services Digital Network (ISDN) 128Kbps to 1.5Mbps (Table 3.1 in text is wrong) – A dial-up connection about twice as fast as a dial-up router E-Business Technologies 12 Internet Connection Methods • Digital Subscriber Line (DSL) - generally 32Mbps but up to 52Mbps – A connection that operates over a standard phone line, but on a different set of frequencies than voice conversations; much faster than ISDN and usually less expensive • T1 and T3 - 1.5Mbps and 43Mbps – Communication lines leased from a common carrier such as AT&T suitable for both voice and data E-Business Technologies 13 Network and Internetwork Addresses • Physical addresses are used in communications between computers on the same network • MAC (physical) addresses are permanently set in a device’s network interface card, such as: 52-54-50-21-D8-9B • Virtual address, such as an IP address or Domain Name, are used in communications between computers over the Internet E-Business Technologies 14 Internet Addressing • Routers and other internetworking devices use logical (virtual) addresses to identify devices or applications on the Internet • IP addresses are 32-bit number containing four 8bit octets that identifies a device connected to the Internet • Domain Names are text addresses that are translated to IP addresses • Port addresses identify the logical connection between a server and a client application E-Business Technologies 15 Transmission Control Protocol/Internet Protocol • The TCP/IP protocols operate within specific layers of the OSI Model OSI Model Layer Protocol Description Transport TCP Connects two computers, transmits data packets, verifies data delivery UDP Sends data in packets, no data verification SKIP SLIDE E-Business Technologies 16 Transmission Control Protocol/Internet Protocol OSI Model Layer Protocol Description Network or Internet IP Transmits data packets, routes over intranet/Internet, assembles at destination ARP Identifies host computer, converts IP address to MAC address Reverse ARP Converts MAC address to IP address SKIP SLIDE ICMP Reports transmission errors to routers and host computers E-Business Technologies 17 Transmission Control Protocol/Internet Protocol OSI Model Layer Protocol Description Application HTTP Controls delivery of Web pages to Web browser POP3 Provides storage and forwarding of e-mail SMTP Sends e-mail between mail servers on an IP network IMAP4 Provides POP3 services, and remote user access to mail server SKIP SLIDE FTP Enables file upload/download between computers E-Business Technologies 18 SKIP SLIDE TCP Segments • Data packets created at the Transport layer by TCP • Requires an established connection between sending and receiving computer before transmission E-Business Technologies 19 TCP Segment Data SKIP SLIDE Data Description Source Port Logical port address of the sending computer Destination Port Logical port address of the destination computer Sequence Number Specifies the position of the packet in the flow of data Acknowledgement Contains receipt of data confirmation Number number TCP Header Length Designates the TCP header length E-Business Technologies 20 TCP Segment Data SKIP SLIDE Data Description Codes Specifies any special condition, such as “urgent” Sliding-window Size Number of data blocks that the destination computer can receive Checksum A value used to ensure data is transmitted without error Urgent Pointer Identifies location of urgent data Options Specifies any special options Padding Ensures the TCP header is a multiple of 32 bits Data Contains the sent data E-Business Technologies 21 IP Datagram • Created in the Network layer by the IP protocol • Does not require a connection between sending and destination computer • Does not provide error-checking • Does not guarantee data delivery SKIP SLIDE E-Business Technologies 22 SKIP SLIDE IP Datagram Data Description Version Identifies the version of IP used for packet formatting Internet Header Defines the IP header length Length Type of Service Specifies the speed, priority, or (ToS) reliability of the data Total Length Total number of bytes in the IP datagram Identification Specifies the datagram’s sequence E-Business Technologies 23 SKIP SLIDE IP Datagram Data Description Flags Specifics whether the datagram is part of a fragmented sequence Fragment Offset Reports the relative position of the datagram in a fragmented sequence Time to Live Delay time before a datagram is discarded as undeliverable Protocol Identifies the protocol which receives the datagram (TCP or UDP) Header Checksum A value used to ensure the Header is transmitted without error E-Business Technologies 24 SKIP SLIDE IP Datagram Data Description Source IP address IP address of the sending computer Destination IP address IP address of the destination computer Options Contains special processing instructions Padding Ensures the IP header is a multiple of 32 bits Data Contains the sent data E-Business Technologies 25 E-Mail Subprotocols • Sending and receiving e-mail requires a mail server and mail client (application) • A mail server is a computer that supports both storage and forwarding of e-mail • A mail client is an application that can access a mail server to retrieve and send e-mail • TCP/IP supports the e-mail subprotocols — SMTP, POP3, and IMAP4 E-Business Technologies 26 SMTP • Simple Mail Transfer Protocol is standard e-mail protocol on the Internet • It defines the message format and the message transfer agent (MTA), which stores and forwards the mail to SMTP, POP3, and IMAP4 servers • Supports MIME (multipurpose Internet mail extensions) and other encoding methods to enable program and multimedia files to be attached to e-mail messages E-Business Technologies 27 POP3 • Post Office Protocol 3 mail server is commonly used on the Internet • Provides message storage for incoming email until users log on to download • A simple system with little selectivity, all pending messages and attachments are downloaded at the same time • POP3 servers use the SMTP messaging protocol E-Business Technologies 28 IMAP4 • Internet Messaging Access Protocol is more sophisticated than POP3 • Messages can be archived in folders • Mailboxes can be shared • Users can access multiple mail servers • Better integration with MIME E-Business Technologies 29 E-Mail Clients • Client e-mail programs, such as Eudora or Outlook, are mail user agents (MUA or UA) • MUAs submit e-mail messages to SMTP servers and receives messages from either POP3 or IMAP4 servers • MUAs retrieve/submit e-mail from/to the message store (MS) on a mail server • The MS holds the mail until it is selectively retrieved and deleted E-Business Technologies 30 E-Business Technologies 31 Internet Protocol (IP) Addresses • Logical address for identifying computers and devices on the Internet • 32-bit number composed of four 8-bit octets: 255.255.255.255 E-Business Technologies 32 Categories of IP addresses • Public IP addresses can be accessed from the Internet • Private IP addresses (such as a LAN behind a firewall) cannot be accessed from the Internet • Static IP addresses are assigned to a specific host and remain unchanged • Dynamic IP addresses are assigned when a computer logs on to a network and expires at log off E-Business Technologies 33 Logical Port Addressing • • Client/Server applications use logical port addressing to connect with specific applications across an IP network There are 65,536 logical ports available on an IP network E-Business Technologies 34 Well-Known Port Addresses • Protocol port number that is widely used for a certain type of data on the network – – – – – Port 21: File Transfer Protocol Port 25: Outgoing e-mail (SMTP) Port 80: Web pages (HTTP services) Port 110: Incoming e-mail (POP3) Port 443: Encrypted Web pages E-Business Technologies 35 Domain Names • Text-based addressing scheme to locate data on the Internet • Domain name addresses correspond to a specific IP address: ICANN.ORG 192.0.34.65 E-Business Technologies 36 Organizing Domains • • • Top-level domains identify major domains (such as “.com”, “.org”. “.gov”) Subdomains identify computers by organization function (such as “baba.org”) Subdomains are divided by function (such as “mail.baba.org” E-Business Technologies 37 The Domain Name System • Uses name servers that contain databases of domain names and their equivalent IP addresses • Translates domain names into IP addresses, also called “resolving a domain name” E-Business Technologies 38 Domain Name System • 13 root servers contain the top level domains (TLDs) • IP address downloaded regularly to thousands of Domain name resolvers • Name servers at ISP resolves addresses upon receipt of a request from a Web client E-Business Technologies 39 E-Business Technologies 40 Registering a Domain Name • Internet Corporation for Assigned Names and Numbers (ICANN) manages Domain Name registration • Domains can be registered through ICANN or through a Shared Registration System (SRS) partner, such as Register.com or VeriSign E-Business Technologies 41 Registration process 1. Contact ICANN or an accredited registrar 2. Search the database of registered domains to determine the availability of the desired domain name 3. Select the domain name, and record the required accounting information 4. Provide the IP address of host ISP’s primary and secondary domain name servers 5. Pay the fee E-Business Technologies 42 Uniform Resource Locators (URLs) • A URL is a short text address used with a Web browser to retrieve a Web page and its related files • A URL includes the TCP/IP subprotocol, host name, domain name, and the path to the Web page file including any subfolders and the filename E-Business Technologies 43 Internet Corporation for Assigned Names and Numbers • Internet Corporation for Assigned Names and Numbers (ICANN) manages Domain Name registration • Assigns and tracks IP addresses • Polices bad Internet practices, such as cybersquatting E-Business Technologies 44 World Intellectual Property Organization (WIPO) • Operates under United Nations mandate • Provides global enforcement for copyrights and trademarks • WIPO plays an increasing role in resolving international domain name disputes E-Business Technologies 45 Internet Society (ISOC) • ISOC supports the development of Internet standards and protocols through member groups such as the Internet Engineering Task Force (IETF) and the Internet Architecture Board (IAB) • Membership includes more than 150 organizations and over 6,000 individual members E-Business Technologies 46 World Wide Web Consortium (W3C) • W3C promotes standardization and interoperability on the Web to assure that Web languages such as HTML and XML and protocols such as HTTP are compatible with any hardware and software used to access the Web E-Business Technologies 47 Request for Comment (Setting the Standards) • An RFC is a tool used by Internet scientists to help publicize or improve an idea for a new system or function • Scientist develops the proposed function, and then submits an RFC document to the appropriate standards body • The RFC is then assigned a unique number and posted for review and comment • RFC is refined, reviewed, refined again, and reviewed again, until agreement is reached on a new or revised Internet standard E-Business Technologies 48