Top Banner
Networks Week 2 LBSC 690 Information Technology
44

Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Dec 19, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Networks

Week 2

LBSC 690

Information Technology

Page 2: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Types of Software

• Application programs (e.g., Internet Explorer)– What you normally think of as a “program”

• Compilers and interpreters (e.g., JavaScript)– Allow programmers to create new behavior

• Operating system (e.g., Windows XP)– Moves data between disk and RAM (+lots more!)

• Embedded program (e.g., BIOS)– Permanent software inside some device

Page 3: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Installing Applications

• Copy to a permanent place on your hard drive– From a CD, the Internet, …

• Installs any other required programs – “DLL” files can be shared by several applications

• Register the program’s location– Associates icons/start menu items with it– Configures the uninstaller for later removal

• Configure it for your system– Where to find data files and other programs

Page 4: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Discussion Point: What’s a Virus?

• Characteristics– Initiation– Behavior– Propagation

• Spyware

• Detection

Page 5: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Goal

• By the end of this class, you will…– Have a better understanding of networking

Page 6: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Network

• Computers and devices connected via – Communication devices– Transmission media

Page 7: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Why Network?

• Sharing data

• Sharing information

• Sharing hardware

• Sharing software

• Increasing robustness

• Facilitating communications

• Facilitating commerce

Page 8: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Packet vs. Circuit Networks

• Telephone system (“circuit-switched”)– Fixed connection between caller and called– High network load results in busy signals

• Internet (“packet-switched”)– Each transmission is routed separately– High network load results in long delays

Page 9: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Packet Switching

• Break long messages into short “packets”– Keeps one user from hogging a line

• Route each packet separately– Number them for easy reconstruction

• Request retransmission for lost packets– Unless the first packet is lost!

Page 10: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Networks of Networks

• Local Area Networks (LAN)– Connections within a room, or perhaps a building

• Wide Area Networks (WAN)– Provide connections between LANs

• Internet– Collection of WANs across multiple organizations

Page 11: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Local Area Networks

• Within a campus or an office complex– Short-distance lines are fast and cheap– Fast communications makes routing simple

• Ethernet is a common LAN technology– All computers are connected to the same cable

• Ordinary phone lines can carry 10 Mb/sec• 100 Mb/s connections require special cables• 1 Gb/s connections require special switches

– Every host broadcasts everything to all others• Collisions limit throughput to about 50% utilization

Page 12: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Shared Network

• All attach to the same cable– Ethernet and “cable modems”

• Transmit anytime– Collision detection– Automatic retransmission

• Inexpensive and flexible– Easy to add new machines– Robust to computer failure

• Practical for short distances– Half the bandwidth is wasted

Page 13: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Switched (“Star”) Network

• All attach directly to a hub– Switched Ethernet– Digital Subscriber Lines (DSL)

• Higher cost– Line from hub to each machine– Hub must handle every packet– Hub requires backup power

• Much higher bandwidth– No sharing, no collisions– Allows disks to be centralized

Page 14: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Local Area Networks

sam

kim

joe

ann

dove

rac4rac3www rac2 ttclass

HBK

PLS

CSS

Page 15: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Wireless Networks

• Radio-based Ethernet– Effective for a few rooms within buildings

• “Access Point” gateways to wired networks– Available throughout most of the Maryland campus– Commercial providers offer “hot spots” in airports, etc.

• “WiFi WLAN” is available in several speeds– IEEE 802.11b: 10Mb/s (good enough for most uses)– IEEE 802.11g: 54Mb/s (required for wireless video)– IEEE 802.11n: 248Mb/s (and longer range)

• Computer-to-computer networks are also possible– “Bluetooth” is the most common (very short range)

Page 16: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Wide Area Networks

• Campus, regional, national, or global scale– Expensive communications must be used well

• Limiting to two hosts allows 100% utilization

– Routing is complex with point-to-point circuits• Which path is shortest? Which is least busy? …

• Internet routers exchange “routing tables”– Which routes seem fast, which seem slow?

Page 17: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Maryland’s Campus Network

sam

kim

joe

ann

dove

rac4rac3www rac2 ttclass

HBK

CSS 1410

Elsewhere in CSS

Page 18: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

The Internet

• Global collection of public “IP” networks– Private networks are often called “intranets”

• Independent– Each organization maintains its own network

• Cooperating– Internet Protocol (IP) address blocks– Domain names– World-Wide Web Consortium (W3C)– Computer Emergency Response Team (CERT)

Page 19: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Internet Web

• Internet: collection of global networks

• Web: way of managing information exchange– More details on this next week

• There are many other uses for the Internet– File transfer (FTP)– Email (SMTP, POP, IMAP)

Page 20: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

A Short History of the Internet

• 1969: Origins in government research – Advanced Research Projects Agency (ARPAnet)– Key standards: UDP, TCP, DNS

• 1983: Design adopted by other agencies– Created a need for inter-network connections– Key standards: IP

• 1991: World-Wide Web added point-and-click– Now 150 million Internet “hosts”– Key standards: HTTP, URL, HTML, XML

Page 21: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Overview

Page 22: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

http://www.geog.ucl.ac.uk/casa/martin/atlas/isp_maps.html

Page 23: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Types of Internet “Nodes”

• Hosts– Computers that use the network to do something

• Routers– Specialized computers that route packets

• Gateway– Routers that connect two networks

• Firewall– Gateways that pass packets selectively

Page 24: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Intranets

Intranet

Intranet

Gateways

What are firewalls?Why can’t you do certain things behind firewalls?

Page 25: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

IP Address

• Every computer on the Internet is identified by a address

• 32 bit number, divided into four “octets”128.8.11.33 216.239.39.99199.181.132.250

Are there enough IP addresses to go around?What is the difference between static and dynamic IP?

Example: go in your browser and type “http://66.249.93.99/”

Page 26: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

An Internet Protocol (IP) Address

IP address: 216.183.103.150

Identifies a LAN

Identifies a specific computer

Page 27: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Routing Tables

IP Prefix Next Router Estimated Delay

216.141.xxx.xxx 120.0.0.0 18 ms

216.xxx.xxx.xxx 121.0.0.0 34 ms

101.42.224.xxx 120.0.0.0 21 ms

xxx.xxx.xxx.xxx 121.0.0.0 250 ms

45.0.2.10120.0.0.0 121.0.0.0

Page 28: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Packet Routing128.0.1.5

4.8.15.2

192.28.2.5

63.6.9.12

52.55.64.2

18.1.1.4

Destination Next Hop

52.55.*.* 63.6.9.12

18.1.*.* 192.28.2.5/63.6.9.12

4.*.*.* 128.0.1.5

(Much simplified) Routing table for 4.8.15.2

Page 29: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Domain Name Service (DNS)

• “Domain names” improve usability– Easier to remember than numeric IP addresses– DNS coverts between names and numbers– Written like a postal address: general-to-specific

• Each name server knows one level of names– “Top level” name server knows .edu, .com, .mil, …– .edu name server knows umd, umbc, stanford, …– .umd.edu name server knows wam, glue, ttclass, …– .wam.umd.edu name server knows rac1, rac2, …

Page 30: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

IP Addresses and Domain Names

Domain Name: www.howstuffworks.com

IP address: 216.183.103.150

Page 31: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Hands-on: Learn About Your IP Address

• Find your IP address– Select “start” on the taskbar, then “Run”– Type in “cmd” and click “OK”– Type “ipconfig /all” (and press enter)

• See who “owns” that address– Use http://remote.12dt.com/

• See how packets get from South Africa to you– Use http://utl-lnx1.puk.ac.za/cgi-bin/webutil

Page 32: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

The TCP/IP “Protocol Stack”

• Link layer moves bits – Ethernet, cable modem, DSL

• Network layer moves packets– IP

• Transport layer provides services to applications– UDP, TCP

• Application layer uses those services– DNS, SFTP, SSH, …

Page 33: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

User Datagram Protocol (UDP)

• The Internet’s basic transport service– Sends every packet immediately– Passes received packets to the application

• No delivery guarantee– Collisions can result in packet loss

• Example: sending clicks on web browser

Page 34: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Transmission Control Protocol (TCP)

• Built on the network-layer version of UDP

• Guarantees delivery all data– Retransmits missing data

• Guarantees data will be delivered in order– “Buffers” subsequent packets if necessary

• No guarantee of delivery time– Long delays may occur without warning

Page 35: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Telnet

• Simulates a dial-up connection– Read data from another machine

• VT-100 protocol allows only text– The pine email program is designed for VT-100– X Windows extension adds graphics

Page 36: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Paths

• Specify location of files on a hard drive

• Folder metaphor– Hierarchically nested directories

– Absolute vs. relative paths

/afs/wam.umd.edu/home/wam/j/i/jimmylin/homeC:\Documents and Settings\Jimmy Lin\My Documents

../pub

..\Desktop

Page 37: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

File Transfer Program (FTP)

• Used to move files between machines– Upload (put) moves from client to server– Download (get) moves files from server to client

• Available using command line and GUI interfaces

• Normally requires an account on the server– Userid “anonymous” provides public access– Web browsers incorporate anonymous FTP

• Automatically converts end-of-line conventions– Unless you select “binary”

Page 38: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Hands On: FTP

• Try it first with a graphical FTP program• Then try it from the command line

– Start a cmd window– Type “ftp ftp.umiacs.umd.edu”– Login in anonymously with

• User: anonymous• Password: your email address

– Go download a file• Type “cd pub/gina/lbsc690/”• Type “binary”• Type “get hwOne.ppt”

– Exit• Type “quit”

Page 39: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

HyperText Transfer Protocol (HTTP)• Send request

GET /path/file.html HTTP/1.0 From: [email protected] User-Agent: HTTPTool/1.0

• Server responseHTTP/1.0 200 OK Date: Fri, 31 Dec 1999 23:59:59 GMT Content-Type: text/html Content-Length: 1354 <html><body> <h1>Happy New Millennium!</h1> …

</body> </html>

Page 40: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Encryption

• Secret-key systems (e.g., DES)– Use the same key to encrypt and decrypt

• Public-key systems (e.g., PGP)– Public key: open, for encryption– Private key: secret, for decryption

• Digital signatures– Encrypt with private key, decrypt with public key

Page 41: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Encrypted Standards

• Secure Shell (SSH)– Replaces Telnet

• Secure FTP (SFTP)/Secure Copy (SCP)– Replaces FTP

• Secure HTTP (HTTPS)– Used for financial and other private data

• Wired Equivalent Protocol (WEP)– Used on wireless networks

• Virtual Private Network (VPN)– Not really a “standard”

Page 42: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Virtual Private Networks

Intranet

Intranet

a secure private network over the public Internet

Public Internet

virtual “leased line”

Page 43: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Network Abuse

• Flooding– Excessive activity, intended to prevent valid activity

• Worms– Like a virus, but self-propagating

• Sniffing– Monitoring network traffic (e.g., for passwords)

Page 44: Networks Week 2 LBSC 690 Information Technology. Types of Software Application programs (e.g., Internet Explorer) –What you normally think of as a “program”

Before You Go

On a sheet of paper, answer the following (ungraded) question (no names, please):

What was the muddiest point in today’s class?