This document provides an overview of networking and internet concepts including:
1) Network classifications such as LAN, MAN, and WAN and topologies like ring, bus, star, and hub. 2) Protocols for connecting networks including TCP/IP, token ring, CSMA/CD, and protocols for interprocess communication. 3) Internet architecture including domains, gateways, IP addresses, and DNS. 4) Applications and technologies on the internet like email, file transfer, web browsers, HTML, and security issues.
Protocols Token ringPopular in ring topology. Token and messages are passed in one direction. Only the machine that gets the token can transmit its own message. CSMA/CD Carrier sense, multiple access with collision detection. Popular in bus topology (Ethernet). Broadcasting. When collision, both machines wait for a brief random time before trying again.
Connecting compatible networksRepeater Simply passing through messages. Connecting two compatible networks. Bridge Only passing those messages addressed to the other side. Connecting two compatible networks more efficiently. Switch A bridge with multiple connections. Connecting several compatible networks more efficiently.
Interprocess communication Server-clientOne server, several clients. Clients initiate communications by sending requests. Server serves. P2P (peer-to-peer) Two processes communicating as equals. The most popular distribution mode nowadays.
Distributed systems Infrastructurecan be provided by standardized toolkits. Enterprise Java Beans by Sun Microsytems .NET framework by Microsoft
12.
The Internet The most notable example of an internet is the Internet. Original goal was to prevent disruptions caused by local disaster. Now it’s a commercial undertaking.
13.
Internet architecture Domaina network or an internet controlled by one single authority. ICANN (Internet corporation for assigned names and numbers) Oversee the registration of domains. Registrar Gateway A router that connects a domain to the rest of the Internet (the Internet cloud).
Connecting to theInternet ISP (Internet service provider) Allow customers to connect their domain to the ISP’s equipment or join the domain already established by the ISP. Different means Telephone (dial-up) Cable DSL Wireless
16.
IP addresses IP(Internet protocol) addresses 32 bit in IPv4 128 in IPv6 Network identifier (by ICANN) Host address (domain administrator) Dotted decimal 140.112.18.33
17.
Host names Mnemonicaddress made up of two parts Domain name Assigned by a registrar edu.tw Top-level domain By usage: .edu = education By country: .tw = Taiwan Subdomains and individual host names Assigned by domain owner www.ee.ntu .edu.tw Name server & domain name server (DNS) www.ee.ntu.edu.tw 140.112.18.33
18.
Internet applications VoIP(voice over Internet protocol) email (electronic mail) FTP (file transfer protocol) telnet & ssh (secure shell) p2p: bittorrent, edonkey, emule…
19.
World wide webwww, w3, web hypertext, hyperlink, hypermedia. Web page: hypertext document Website: a collection of closely related web pages.
20.
Browsers Presenting theweb pages downloaded from the Internet. HTTP (hypertext transfer protocol) URL (uniform resource locator) Textbook, Figure 4.8
eXtensible markup languageXML Standard style to represent data as text. Restricted mapping each opening to each ending. <x property=“yyy”> …… </x> XHTML HTML that follows XML format. <name code=“ISO-8859-1”> Tian-Li Yu </name> <name code=“Big5”> 于天立 </name> <education> <BS> NTUEE, 1997</BS> <MS> UIUCCS, 2003 </MS> <PhD> UIUCCS, 2006 </PhD> </education>
Internet protocol LayersApplication: constructs message with address Transport: chops message into packets Network: handles routing through the Internet Link: handles actual transmission of packets Port (not the I/O port)
TCP/IP suite TCPand IP are two protocols, TCP/IP refers to a collection of protocols more than just TCP and IP. TCP (transmission control protocol) UDP (user datagram protocol) No notification before sending message, no retransmission service, no acknowledge of receiving message. TCP: more reliable, less efficient UDP: more efficient, less reliable
Encryption sftp (ftps as in the textbook) , https, ssh, ssl Public/private keys Public key encryption Private key decryption Textbook Figure 4.16
29.
Public/private key issuesCertificate authority Ensure the public key is given by the trusted one. Authentication Make sure the author of a message is, in fact, the party it claims to be. Use private key to encrypt; public key to decrypt.