1994-99, desktop computing services, rev 4.5b 1 chapter 7 networking perspective of the internet
Post on 20-Dec-2015
217 views
TRANSCRIPT
2 1994-99, Desktop Computing Services, Rev 4.5b
High-Level View
A network of networks Networks in other countries Commercial networks
BitNet, MCI, America OnLine and others National Science Foundation is phasing over to
commercial business Four Network Access Points (NAP)
Sprint, New Jersey PacBell, San Francisco Ameritech, Chicago MFS DataNet, Washington DC
3 1994-99, Desktop Computing Services, Rev 4.5b
NAP NAP
NAP
NAP
Network Network Network Network Network
Network
Network
ISP HostComputer
YouDialIn
Your Host
Computer
= gateway, router, switch or firewall
You rent spaceYou own the
computer
Architecture
4 1994-99, Desktop Computing Services, Rev 4.5b
Fundamental Concepts
Connections are varied Dial-up telephone lines Leased lines Fiber-optic Micro-wave links
Design concepts The sender puts data in an Internet Protocol (IP) packet The sender addresses the packet The sender and receiver work together to ensure
accuracy Every computer/device on the network can talk as a peer Hand the packet to a 3rd party provider and they will
move it to my intended destination Platform independent
5 1994-99, Desktop Computing Services, Rev 4.5b
Domain Names
Domain Names: pickaname.com To the right of the period
.com = commercial .edu = education .gov = government .mil = military .org = anything else .net = network
To the left of the period is the network name A descriptive name picked by the user and approved
by InterNIC (Internet Network Information Center) The country may come just before the period
Example: .ca = Canada .jp = Japan Register through your Internet provider or directly
$70 for the first two years
6 1994-99, Desktop Computing Services, Rev 4.5b
URLs
Universal Resource Locators First part identifies the protocol or service. For hypertext protocol on the Web
http:// Next comes the server
http://www.psi.net Next is the location on the host computer,
(/directories/filename) http://www.psi.net/promotions/business.html
7 1994-99, Desktop Computing Services, Rev 4.5b
IP Address Format
IP = Internet Protocol address now administered by Network Solutions (was
Internic) http://www.networksolutions.com dotted-decimal format convention: 129.63.8.108
each dot-delimited section refers to one byte (8 bits) the number between each dot is therefore 0-255 4 bytes = 32 bits theoretically 232 = 4,294,967,296 possible addresses 128-bit IPng (IP Next Generation) addresses are
coming, but there’s no schedule for implementation Identifies the network and the device Use the first 8, 16, or 24 bits to identify the network
8 1994-99, Desktop Computing Services, Rev 4.5b
Class A: addresses from 0.0.0.0 to 127.0.0.0 first byte is the network part last three bytes are the host address allows 2563 = 16,777,216 addresses on the network
this is a “ludicrously” large number of devices all the free addresses are wasted this class of address is therefore no longer issued
only practical with the use of a net mask which divides the large network into manageable subnets
Class A 07 bits127 networks
24 bits16 million devices0-127
IP Address Classes
Reference: http://www.iu.hioslo.no/~mark/sysadmin/SystemAdmin.html
9 1994-99, Desktop Computing Services, Rev 4.5b
Class B 1 014 bits16,000 networks
16 bits65,000 devices128-191
IP Address Classes (continued)
Class B: addresses from 128.0.0.0 to 191.255.0.0 first two bytes are the network part last two bytes are the host part allows 2562 = 65,536 addresses on the network typically given to large institutions such as
universities and ISPs (Internet Service Providers)
Reference: http://www.iu.hioslo.no/~mark/sysadmin/SystemAdmin.html
10 1994-99, Desktop Computing Services, Rev 4.5b
Class C21 bits2 million networks1 1 0
8 bits254 devices192-223
IP Address Classes (continued)
Class C: addresses from 192.0.0.0 to 233.255.255.0 first three bytes are the network part last byte is the host part allows 2561 = 256 addresses on the network addresses .0 and .255 are reserved by convention
Reference: http://www.iu.hioslo.no/~mark/sysadmin/SystemAdmin.html
11 1994-99, Desktop Computing Services, Rev 4.5b
Reserved IP Addresses
1 1 0 Network ID Host ID3 bits 21 bits 8 bits
127.0.0.1 “hard-wired” to localhost (“loopback” address)
90.0.0.n not routable, n can be 0-255 therefore allows 256 local addresses
192.168.a.b also not routable, both a and b can be 0-255 therefore allows 65,536 local addresses
Reference: WinProxy documentation
12 1994-99, Desktop Computing Services, Rev 4.5b
Connection Service Flavors
connectionless service no delivery confirmation is returned to the sender mail analogy: “send and hope” packets might be duplicated, arrive out of sequence,
or simply be lost and not arrive at all communication via datagrams
connection-oriented service “handshake” confirmation between players telephone analogy: “open a connection” packets can be reassembled exactly as transmitted communication via streams
Reference: Deitel & Deitel, Java How To Program, p. 835
13 1994-99, Desktop Computing Services, Rev 4.5b
TCP/IP
Actually two separate networking protocols TCP = Transmission Control Protocol
connection-oriented communication via streams
IP = Internet Protocol connectionless communication via datagrams
14 1994-99, Desktop Computing Services, Rev 4.5b
TCP/IP (continued)
Actually two separate networking protocols TCP = Transmission Control Protocol IP = Internet Protocol
A family of related protocols that provide services E-mail: electronic mail Telnet: remote logon FTP: transfer files (File Transfer Protocol) SMTP: route messages
Simple Mail Transfer Protocol ARP: obtain addresses
Address Resolution Protocol WWW: Connect information using links
15 1994-99, Desktop Computing Services, Rev 4.5b
TCP/IP (continued)
Actually two separate networking protocols TCP = Transmission Control Protocol IP = Internet Protocol
A family of related protocols that provide services UDP = User Datagram Protocol
a datagram stored inside an IP datagram good for short messages used by Internet Domain
Name Servers (DNS) good for live audio and video where losing single
packets is not critical
16 1994-99, Desktop Computing Services, Rev 4.5b
Domain Name Service
Maps IP network address numbers to a people- friendly name
A database of domain names Stored at many locations in a hierarchical structure,
not on a central repository Domain names identify specific networks Domain Name Servers look up desired networks in
the database and return their numeric IP addresses Once the packet arrives at the destination network,
it is moved to the host device by the network itself
17 1994-99, Desktop Computing Services, Rev 4.5b
Domain Name Hierarchy
root domain: unnamed top-level domains: com, edu, gov, org, net, etc. second-level domains: administered by Network
Solutions must be registered on at least two DNS computers primary routes to secondary
third-level domains: added by LAN administratorscs.uml.edu
domain sequence: third.second.top
Reference: Kruglinski, Shepherd, and Wingo, p. 992-993
18 1994-99, Desktop Computing Services, Rev 4.5b
The HOSTS File relates host names to IP addresses
sort of a mini-DNS DNS not allowed on systems connected to cable modems
due to the volume of traffic they entail on Windows NT: \winnt2\system32\drivers\etc\hosts on Windows 95/98: \windows\hosts
90.0.0.1 reuben2 129.63.1.6 cs90.0.0.2 harold 129.63.1.6 jupiter90.0.0.3 bonnie2 129.63.8.2 saturn90.0.0.4 jroad2 129.63.8.20 dexter90.0.0.7 jroad1 129.63.8.105 martin209.192.194.28 cbtartisan 129.63.8.140 abraham
Reference: Kruglinski, Shepherd, and Wingo, p. 998
19 1994-99, Desktop Computing Services, Rev 4.5b
Program to Program: Sockets
A combination of the Internet address and Port (application) address IP address: numeric address of the host Port address: address of the application running on
the host or client computer the two together define a socket
Sockets provide a two-way communication channel between applications
Windows Sockets API - ensures that Windows applications can communicate using TCP/IP, regardless of vendor
20 1994-99, Desktop Computing Services, Rev 4.5b
Unifying Example: Browser Connection
1. Server:listens on port 802. Client:gets server IP address from DNS3. Client:connects to server4. Client:opens 2-way TCP using own port
number5. Client:sends GET request + request headers
GET /filename HTTP/1.1
6. Server:identifies request as a GET & reads headers
7. Server:sends OK response + response headersHTTP/1.1 200 OK
8. Server:sends requested HTML file9. Client:interprets HTML file and displays itReference: Kruglinski, Shepherd, and Wingo, p. 994
21 1994-99, Desktop Computing Services, Rev 4.5b
Internet Application Architecture
Browserwith JAVA
Machineor Active X
Millions of PCs or “thin clients”
Internet
WebServer
Data Base Server
Data
MerchantServer
Intranetor VPN
CreditCard
TransactionServer
1. Client makes a request
2. Server sends applet back
3. Client uses applet to enter secure transaction
4. Credit is executed
5. Credit company inter- acts with customer and merchant banks
22 1994-99, Desktop Computing Services, Rev 4.5b
Intranets
Private Internets Use Internet tools Universal clients are in place Use existing LAN wires Use existing WAN
Private leased lines or public switched networks Can use the Internet with encrypting bridges
Sometimes called an “Extranet” Common use: share company information
23 1994-99, Desktop Computing Services, Rev 4.5b
Security
Internet as an open system Anyone can connect unless you take precautions Encryption (RSA, DES)
Rivest, Shamir, & Adleman (public key encryption technology)
US Digital Encryption Standard Commerce over the Internet
(secure protocols)
24 1994-99, Desktop Computing Services, Rev 4.5b
Security (continued)
Firewalls Use a router or gateway to filter or control packets Allow only approved IP addresses through A skilled hacker can defeat Many variations exist Example: Firewall-1 from
Checkpoint Technologies About 40% market share http://www.checkpoint.com