e-business technologies1 chapter 3 internetworking basics

48
E-Business Technologies 1 Chapter 3 Internetworking Basics

Upload: joseph-norris

Post on 26-Dec-2015

218 views

Category:

Documents


1 download

TRANSCRIPT

E-Business Technologies 1

Chapter 3

Internetworking Basics

E-Business Technologies 2

Objectives

In this chapter, you will learn to:

• Identify internetworking hardware, Internet connections, and network addressing issues

• Describe the TCP/IP protocol suite, IP addresses, and logical ports

• Explain domain names, the Domain Name System, and Uniform Resource Locators

• Identify organizations that provide oversight for the Internet and the World Wide Web

E-Business Technologies 3

Internetworking Hardware

• Special network devices, called switches and routers, control data transmissions within and between network segments

• A network segment is part of a network, usually made up of computers that share a common function

• These network devices ensure that data sent between computers on the same segment are transmitted only on that segment

Valued Gateway Client:

Valued Gateway Client:

E-Business Technologies 4

E-Business Technologies 5

Hubs

• Used to connect groups of computers, generally fewer than 64 computers (inexpensive hubs generally stop at 6 computer connections)

• Repeats a signal, passing transmissions to all computers on a segment and the signal can be 'heard' by all computers connected via the hub

• Each computer connects to a hub using a separate cable

• Hubs can interconnect to other hubs, switches, and routers

E-Business Technologies 6

Switches

• An intelligent device that analyzes data packets to determine how to route a data transmission to its destination

• Reduces congestion by directing data transmissions to specific ports used to connect with each computer or device

• Switches can interconnect with hubs, switches, and routers

E-Business Technologies 7

Routers

• Analyzes data packets to determine how to route a data

• Specialized computers designed to manage data transmissions over large LANs and WANs

• Relies on databases containing address information to locate computers on network (these 'databases' can be maintained within the memory of the router itself)

E-Business Technologies 8

Firewalls

• A security tool - stands between the outside networks and the inside networks

• Specialized hardware or software or a combination of both, that filters all incoming

and outgoing transmissions

• Blocks transmissions that do not meet specific security criteria

why is this important for denial of service attacks, spoofed e-mail, etc?

E-Business Technologies 9

Firewalls

• Placed between the public network and private network– Public network identifies the external

network connection or portion of the Internet on the outside of a firewall

– Private network identifies a network or LAN on the inside of a firewall, such as a corporate LAN

E-Business Technologies 10

Packet Switching

• The practice of breaking data transmissions into packets that can travel independently across a network

• Packets are assigned sequence numbers so they can be reassembled in the correct order at the destination

• Routers direct packets across the network/Internet to their assigned destination

E-Business Technologies 11

Internet Connections

• Internet connections can take place using many different types of telecommunications media– Access devices range from a standard phone line

and a modem to wireless satellite connections

– Individual consumers usually obtain Internet access through an Internet service provider (ISP) such as America Online (AOL)

– Businesses usually obtain Internet access using a shared connection consisting of a router on a corporate LAN and a telecommunications connection between the router and the Internet

E-Business Technologies 12

Internet Connection Methods• Dial-up router - 56Kbps

– Includes a modem that connects to the Internet when it detects an office computer trying to access the Internet

• Leased line/Frame relay

– A connection that is always on and much more reliable than a dial-up connection

• Integrated Services Digital Network (ISDN) - 128Kbps to 1.5Mbps (Table 3.1 in text is wrong)

– A dial-up connection about twice as fast as a dial-up router

E-Business Technologies 13

Internet Connection Methods

• Digital Subscriber Line (DSL) - generally 32Mbps but up to 52Mbps

– A connection that operates over a standard phone line, but on a different set of frequencies than voice conversations; much faster than ISDN and usually less expensive

• T1 and T3 - 1.5Mbps and 43Mbps

– Communication lines leased from a common carrier such as AT&T suitable for both voice and data

E-Business Technologies 14

Network and Internetwork Addresses

• Physical addresses are used in communications between computers on the same network

• MAC (physical) addresses are permanently set in a device’s network interface card, such as:

52-54-50-21-D8-9B

• Virtual address, such as an IP address or Domain Name, are used in communications between computers over the Internet

E-Business Technologies 15

Internet Addressing

• Routers and other internetworking devices use logical (virtual) addresses to identify devices or applications on the Internet

• IP addresses are 32-bit number containing four 8-bit octets that identifies a device connected to the Internet

• Domain Names are text addresses that are translated to IP addresses

• Port addresses identify the logical connection between a server and a client application

E-Business Technologies 16

Transmission ControlProtocol/Internet Protocol

• The TCP/IP protocols operate within specific layers of the OSI Model

OSI Model Layer

Protocol Description

Transport TCP Connects two computers, transmits data packets, verifies data delivery

UDP Sends data in packets, no data verificationSKIP SLIDE

E-Business Technologies 17

Transmission ControlProtocol/Internet Protocol

OSI Model Layer

Protocol Description

Network or Internet

IP Transmits data packets, routes over intranet/Internet, assembles at destination

ARP Identifies host computer, converts IP address to MAC address

Reverse ARP Converts MAC address to IP address

ICMP Reports transmission errors to routers and host computers

SKIP SLIDE

E-Business Technologies 18

Transmission ControlProtocol/Internet Protocol

OSI Model Layer

Protocol Description

Application HTTP Controls delivery of Web pages to Web browser

POP3 Provides storage and forwarding of e-mail

SMTP Sends e-mail between mail servers on an IP network

IMAP4 Provides POP3 services, and remote user access to mail server

FTP Enables file upload/download between computers

SKIP SLIDE

E-Business Technologies 19

TCP Segments

• Data packets created at the Transport layer by TCP• Requires an established connection between sending

and receiving computer before transmission

SKIP SLIDE

E-Business Technologies 20

TCP Segment Data

Data Description

Source Port Logical port address of the sending computer

Destination Port Logical port address of the destination computer

Sequence Number Specifies the position of the packet in the flow of data

Acknowledgement Number

Contains receipt of data confirmation number

TCP Header Length

Designates the TCP header length

SKIP SLIDE

E-Business Technologies 21

TCP Segment Data

Data Description

Codes Specifies any special condition, such as “urgent”

Sliding-window Size

Number of data blocks that the destination computer can receive

Checksum A value used to ensure data is transmitted without error

Urgent Pointer Identifies location of urgent data

Options Specifies any special options

Padding Ensures the TCP header is a multiple of 32 bits

Data Contains the sent data

SKIP SLIDE

E-Business Technologies 22

IP Datagram

• Created in the Network layer by the IP protocol• Does not require a connection between sending

and destination computer• Does not provide error-checking• Does not guarantee data delivery

SKIP SLIDE

E-Business Technologies 23

IP Datagram

Data Description

Version Identifies the version of IP used for packet formatting

Internet Header Length

Defines the IP header length

Type of Service (ToS)

Specifies the speed, priority, or reliability of the data

Total Length Total number of bytes in the IP datagram

Identification Specifies the datagram’s sequence

SKIP SLIDE

E-Business Technologies 24

IP Datagram

Data Description

Flags Specifics whether the datagram is part of a fragmented sequence

Fragment Offset Reports the relative position of the datagram in a fragmented sequence

Time to Live Delay time before a datagram is discarded as undeliverable

Protocol Identifies the protocol which receives the datagram (TCP or UDP)

Header Checksum

A value used to ensure the Header is transmitted without error

SKIP SLIDE

E-Business Technologies 25

IP Datagram

Data Description

Source IP address

IP address of the sending computer

Destination IP address

IP address of the destination computer

Options Contains special processing instructions

Padding Ensures the IP header is a multiple of 32 bits

Data Contains the sent data

IP DatagramSKIP SLIDE

E-Business Technologies 26

E-Mail Subprotocols

• Sending and receiving e-mail requires a mail server and mail client (application)

• A mail server is a computer that supports both storage and forwarding of e-mail

• A mail client is an application that can access a mail server to retrieve and send e-mail

• TCP/IP supports the e-mail subprotocols — SMTP, POP3, and IMAP4

E-Business Technologies 27

SMTP

• Simple Mail Transfer Protocol is standard e-mail protocol on the Internet

• It defines the message format and the message transfer agent (MTA), which stores and forwards the mail to SMTP, POP3, and IMAP4 servers

• Supports MIME (multipurpose Internet mail extensions) and other encoding methods to enable program and multimedia files to be attached to e-mail messages

E-Business Technologies 28

POP3

• Post Office Protocol 3 mail server is commonly used on the Internet

• Provides message storage for incoming e-mail until users log on to download

• A simple system with little selectivity, all pending messages and attachments are downloaded at the same time

• POP3 servers use the SMTP messaging protocol

E-Business Technologies 29

IMAP4

• Internet Messaging Access Protocol is more sophisticated than POP3

• Messages can be archived in folders

• Mailboxes can be shared

• Users can access multiple mail servers

• Better integration with MIME

E-Business Technologies 30

E-Mail Clients

• Client e-mail programs, such as Eudora or Outlook, are mail user agents (MUA or UA)

• MUAs submit e-mail messages to SMTP servers and receives messages from either POP3 or IMAP4 servers

• MUAs retrieve/submit e-mail from/to the message store (MS) on a mail server

• The MS holds the mail until it is selectively retrieved and deleted

E-Business Technologies 31

E-Business Technologies 32

Internet Protocol (IP) Addresses

• Logical address for identifying computers and devices on the Internet

• 32-bit number composed of four 8-bit octets:

255.255.255.255

E-Business Technologies 33

Categories of IP addresses

• Public IP addresses can be accessed from the Internet

• Private IP addresses (such as a LAN behind a firewall) cannot be accessed from the Internet

• Static IP addresses are assigned to a specific host and remain unchanged

• Dynamic IP addresses are assigned when a computer logs on to a network and expires at log off

E-Business Technologies 34

Logical Port Addressing

• Client/Server applications use logical port addressing to connect with specific applications across an IP network

• There are 65,536 logical ports available on an IP network

E-Business Technologies 35

Well-Known Port Addresses

• Protocol port number that is widely used for a certain type of data on the network

– Port 21: File Transfer Protocol

– Port 25: Outgoing e-mail (SMTP)

– Port 80: Web pages (HTTP services)

– Port 110: Incoming e-mail (POP3)

– Port 443: Encrypted Web pages

E-Business Technologies 36

Domain Names

• Text-based addressing scheme to locate data on the Internet

• Domain name addresses correspond to a specific IP address:

ICANN.ORG

192.0.34.65

E-Business Technologies 37

Organizing Domains

• Top-level domains identify major domains (such as “.com”, “.org”. “.gov”)

• Subdomains identify computers by organization function (such as “baba.org”)

• Subdomains are divided by function (such as “mail.baba.org”

E-Business Technologies 38

The Domain Name System

• Uses name servers that contain databases of domain names and their equivalent IP addresses

• Translates domain names into IP addresses, also called “resolving a domain name”

E-Business Technologies 39

Domain Name System

• 13 root servers contain the top level domains (TLDs)

• IP address downloaded regularly to thousands of Domain name resolvers

• Name servers at ISP resolves addresses upon receipt of a request from a Web client

E-Business Technologies 40

E-Business Technologies 41

Registering a Domain Name

• Internet Corporation for Assigned Names and Numbers (ICANN) manages Domain Name registration

• Domains can be registered through ICANN or through a Shared Registration System (SRS) partner, such as Register.com or VeriSign

E-Business Technologies 42

Registration process

1. Contact ICANN or an accredited registrar

2. Search the database of registered domains to determine the availability of the desired domain name

3. Select the domain name, and record the required accounting information

4. Provide the IP address of host ISP’s primary and secondary domain name servers

5. Pay the fee

E-Business Technologies 43

Uniform Resource Locators (URLs)

• A URL is a short text address used with a Web browser to retrieve a Web page and its related files

• A URL includes the TCP/IP subprotocol, host name, domain name, and the path to the Web page file including any subfolders and the filename

E-Business Technologies 44

Internet Corporation for Assigned Names and Numbers

• Internet Corporation for Assigned Names and Numbers (ICANN) manages Domain Name registration

• Assigns and tracks IP addresses

• Polices bad Internet practices, such as cybersquatting

E-Business Technologies 45

World Intellectual PropertyOrganization (WIPO)

• Operates under United Nations mandate

• Provides global enforcement for copyrights and trademarks

• WIPO plays an increasing role in resolving international domain name disputes

E-Business Technologies 46

Internet Society (ISOC)

• ISOC supports the development of Internet standards and protocols through member groups such as the Internet Engineering Task Force (IETF) and the Internet Architecture Board (IAB)

• Membership includes more than 150 organizations and over 6,000 individual members

E-Business Technologies 47

World Wide Web Consortium (W3C)

• W3C promotes standardization and interoperability on the Web to assure that Web languages such as HTML and XML and protocols such as HTTP are compatible with any hardware and software used to access the Web

E-Business Technologies 48

Request for Comment(Setting the Standards)

• An RFC is a tool used by Internet scientists to help publicize or improve an idea for a new system or function

• Scientist develops the proposed function, and then submits an RFC document to the appropriate standards body

• The RFC is then assigned a unique number and posted for review and comment

• RFC is refined, reviewed, refined again, and reviewed again, until agreement is reached on a new or revised Internet standard