Basic infrastructure for electronic business on the internet
This presentation is the property of its rightful owner.
Sponsored Links
1 / 95

Basic Infrastructure for Electronic Business on the Internet PowerPoint PPT Presentation


  • 44 Views
  • Uploaded on
  • Presentation posted in: General

Basic Infrastructure for Electronic Business on the Internet. Authors: Miroslava Mitrovic ([email protected]) Veljko Milutinovic ([email protected]). Network. A network is a group of computers and peripherals connected together by some medium The connection can be

Download Presentation

Basic Infrastructure for Electronic Business on the Internet

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Basic infrastructure for electronic business on the internet

Basic Infrastructure for Electronic Business on the Internet

Authors:

Miroslava Mitrovic ([email protected])

Veljko Milutinovic ([email protected])


Network

Network

  • A network is

    a group of computers and peripherals

    connected together by some medium

  • The connection can be

    direct (through a cable) or

    indirect (through a modem)

  • The different devices on the network

    communicate with each other

    through a predefined set of rules (protocol)


Network hardware

Network Hardware

  • Physically connects

    computers in the network together

  • Main hardware components:

    Nodes

    Communication equipment

    Additional components

    Topology


Nodes

Nodes

  • Network node (computer, printers, routers)

  • Computers in network

    can be used as

    work stations or servers or both

  • PC computers need

    NIC (Network Interface Card)

    to be able to be part of

    LAN (Local Area Network)

  • Different standards, different network cards! (Ethernet, Token Ring, ARC net)


Communication equipment

Communication equipment

  • Cables :

    (coaxial cables, fiber-optic cables, twisted pairs)

  • Wiring centers :

    (HUB , concentrator,

    MAU (Multi station Access Units))

  • Intranetwork links :

    (connectors, transceivers, repeaters)

  • Internetwork links :

    (bridges, gateways, routers, switches)

  • Wireless components


Additional components

Additional Components

  • Peripherals :

    (printers, fax machines, modems, cd readers)

  • Safety devices :

    UPS (Uninterruptible Power Supply),

    SPS (Standby Power Supply)

  • Network tools


Topology

Topology

  • Defines rules for connecting network nodes

  • Logical topology differs from physical topology!

  • Logical topology defines rules for

    transmitting information's (bus, ring, star)

  • Physical topology defines rules for

    electrical connection components in network


Topology1

Topology


Topology2

Topology


Network software

Network Software

  • Enables using hardware

    for communication and exchanging information

  • Protocols (set of rules) give formulas

    for passing messages,

    specifying the details of message formats,

    and for describing how to handle error conditions


Internetting

Internetting

  • Connecting many disparate physical networks

    and make them function

    as a coordinate unit

  • Internet technology hides

    the details of network hardware and

    permits computers to communicate

    independent of their physical network connection


Internetting1

Internetting


Internet

Internet

  • Internet is network of all networks

  • Interconnected computer networks

    that communicate,

    usually via TCP/IP

  • Internet and internet

  • Set of application programs

    that use the network to carry out

    useful communication tasks (user’s point of view)

  • No one owns the Internet!


Internet architecture

Internet architecture

  • How are networks interconnected

    to form a internet work?

  • Computers that interconnect two networks

    and pass packets from one to the other

    are called internet gateways or internet routers


Internet architecture1

Internet architecture


Internet architecture2

Internet architecture


Internet architecture3

Internet architecture

  • Gateways provide all interconnections

    among physical networks

  • Usually minicomputers

  • Gateways route packets based on destination network, not on destination host!


Internet architecture4

Internet architecture


Internet architecture5

Internet architecture


Open systems

Open Systems

  • Architecture is not secret

  • The definition applies equally well

    to software and hardware

  • UNIX-classic example for

    an open software platform

  • Open system networking:

    network based on well-known and

    understood protocol

  • Three most popular services:

    File Transfer

    Electronic mail

    Remote login


Basic infrastructure for electronic business on the internet

The ISO OSI-RMInternational Organization for StandardizationOpen System Interconnection Reference Model

  • ISO has developed an architecture that defines seven layers of network protocol


Grouping of osi layers

Grouping of OSI Layers


Upper layers application presentation session

Upper Layers Application/Presentation/Session

  • Applications oriented

  • Presents the interface to the user

  • Don’t care how data gets to the application!


Middle layer transport

Middle LayerTransport

  • Separate application oriented upper layers from network oriented lower layers


Lower layers network data link physical

Lower LayersNetwork/Data Link/Physical

  • Oriented toward data transmission

  • Packages, routes, verifies and transmits datagrams

  • Type of data for application doesn't matter

  • Has no application dependencies !


Communication in osi rm

Communication in OSI-RM


Application layer

Application Layer

  • Highest layer in the OSI reference model

  • Concerned with the user’s view of the network

  • Handles network transparency, resource allocation and problem partitioning

  • Sends data and program tasks

    to the presentation layer,

    which is responsible

    for coding data from application layer

    in the appropriate form


Presentation layer

Presentation Layer

  • The second highest layer in the OSI reference model

  • Converts network data to application format

  • Performs function as

    text compression , code or format conversion

    to try to smooth out differences between hosts

  • Serves application layer, uses session layer


Session layer

Session Layer

  • The third highest layer in the OSI reference model

  • Synchronized data exchange

    between upper and lower layers

  • Manages the current connection, or session, between two computers

  • Handles security and creation of the session

  • Establishing connection

  • Closes connection

  • Uses the transport layer to establish a connection between processes on different hosts

  • Used by the presentation layer


Transport layer

Transport Layer

  • The middle layer in the OSI reference model

  • Uses the network layer to provide a

    virtual, error-free, point-to-point connection

    so that host A can send messages to host B

    and they will arrive uncorrupted and in the correct order

  • Hides details necessary to actually

    make a connection between two computers

  • Establishes and dissolves connections between hosts

  • Used by the session layer


Network layer

Network Layer

  • The third lowest layer in the OSI reference model

  • Determines addresses

  • Responsible for routing packets across the network

  • Establishing logical link between two nodes

  • Used by the transport layer, uses the data link layer


Data link layer

Data Link Layer

  • The second lowest layer in the OSI reference model

  • Splits data into frames for sending

    on the physical layer

  • Receives acknowledgment frames

  • Performs error checking and retransmission

  • Provides an error free virtual channel

    to the network layer

  • Split into

    an upper sublayer Logical Link Control (LLC)

    and lower sublayer Media Access Control (MAC)


Physical layer

Physical Layer

  • The lowest layer in OSI model

  • Transmits data

  • How bits are passed over the network medium,

    what control signals are used,

    and the mechanical properties of the network itself (cable size, connector, and so on)

  • Only layer in which actual communication occur

  • Used by the data link layer


Data transfer over the internet

Data Transfer over the Internet


Osi vs tcp ip

OSI vs. TCP/IP


The tcp ip protocol family

TCP

UDP

IP

ICMP

RIP

OSPF

ARP

DNS

RARP

BOOTP

FTP

Telnet

EGP

GGP

IGP

BGP

NFS

NIS

RPC

SMTP

SNMP

The TCP/IP protocol family


Transport

Transport

  • Transmission Control Protocol (TCP):

    connection-based services

  • User Datagram Protocol (UDP):

    connectionless services


Routing

Routing

  • Internet Protocol (IP):

    handles transmission of information

  • Internet Control Message Protocol (ICMP):

    handles status messages for IP

  • Routing Information Protocol (RIP):

    determines routing

  • Open Shortest Path First (OSPF):

    alternate protocol for determining routing


Network addresses

Network Addresses

  • Address Resolution Protocol (ARP):

    determines addresses

  • Domain Name System (DNS):

    determines addresses from machine names

  • Reverse Address Resolution Protocol (RARP): - determines addresses


User services

User Services

  • Boot Protocol (BOOTP):

    starts up a network machine

  • File Transfer Protocol (FTP):

    transfers files

  • Telnet:

    allows remote logins


Gateway protocols

Gateway Protocols

  • Exterior Gateway Protocol (EGP):

    transfers routing information for external networks

  • Gateway-to-Gateway Protocol (GGP):

    transfers routing information between gateways

  • Interior Gateway Protocol (IGP):

    transfers routing information for internal networks

  • Border Gateway Protocol (BGP)

    newer than EGP, used within an autonomous network


Others

Others

  • Network File System (NFS):

    enables directories on one machine to be mounted on another

  • Network Information Service (NIS):

    maintains user accounts across networks

  • Remote Procedure Call (RPC):

    enables remote applications to communicate

  • Simple Mail Transfer Protocol (SMTP):

    transfers electronic mail

  • Simple Network Management Protocol (SNMP): sends status messages about the network


Datagram

Datagram

  • Basic unit of data send thought an internet

  • Moving packets between routers and/or hosts

  • Consists of a header followed by the data

  • Header:

    information necessary to move the packet

    across the Internet

  • Connectionless transport mechanism


Datagram1

Datagram


Datagram2

Field

Function

ver

The version of the IP protocol that created the datagram.

IHL

The length of the IP header in 32-bit words (the minimum value is 5).

Type of service

The quality of service (precedence, delay, throughput, and reliability) desired for the datagram.

Total length

The length of the datagram (both header and user data), in octets.

Identification

A 16-bit value assigned by the originator of the datagram, used during reassembly.

Datagram


Datagram3

Flags

Control bits indicating whether the datagram may be fragmented, and if so, whether other later fragments exist.

Fragment offset

The offset in the original datagram of the data being carried in this datagram, for fragmented datagrams.

Time to live

The time in seconds the datagram is allowed to remain in the internet system.

Protocol

The high level protocol used to create the message (analogous to the type field in an Ethernet packet).

Header checksum

A checksum of the header.

Datagram


Datagram4

Source IP address

32-bit IP address of the sender.

Destination IP address

32-bit IP address of the recipient.

Options

An optional field primarily used for network testing or debugging.

Padding

All bits set to zero - used to pad the datagram header to a length that is a multiple of 32 bits.

User data

The actual data being sent.

Datagram


Internet addresses

Internet Addresses

  • Globally accepted method of identifying computers

  • Each host on a TCP/IP internet is assigned

    a unique 32-bit address that is used

    in all communication with that host

  • Must not be confused with physical addresses!

  • Each address is a pair (netid, hostid),

    where netid identifies a network,

    and hostid identifies a host on that network

  • In practice, each IP address must have

    one of the first three forms shown

    in the picture that follows


Internet addresses1

Class

Maximum number ofpossible networks

Maximum number ofhosts per network

A

127

16,777,216

B

16,384

65,536

C

2,097,152

255

D

Reserved Class

E

Reserved Class

Internet Addresses


Internet addresses2

Internet Addresses


Internet addresses3

Internet Addresses

  • The IP address is expressed

    in dotteddecimalnotation (DDN)

    by taking the 32 binary bits and

    forming 4 groups of 8 bits, each separated by a dot

    • 10.4.8.2 is a class A address

    • 10 is the DDN assigned network number

    • .4.8 are (possibly) user assigned subnet numbers

    • .2 is the user assigned host number

    • 172.16.9.190 is a class B address

    • 172.16 is the DDN assigned network number

    • .9 is the user assigned subnet number

    • .190 is the user assigned host number


Internet addresses4

Internet Addresses

  • Host: any attached device on a subnet,

    including PC’s, mainframes and routers

  • Most hosts are connected to only one network,

    and they have a single IP address

  • Routers are connected to more than one network and they can have multiple IP addresses

  • Problem: IP type of addressing defines connection,

    not host!

  • Problem: what when an organization

    which has a class C address

    finds that they (.org) need to upgrade to class B


Dns the domain name system

DNS – The Domain Name System

  • Converts symbolic node name to IP address

  • Uses distributed database

  • Network Information Center (NIC) maintains names

    and network gateway addresses

  • Name Resolver on each network

    tries to complete address from own database

  • Examines Name Server for full NIC database

    if unsuccessful resolution


Arp address resolution protocol

ARP - Address Resolution Protocol

  • Allows host to find

    the physical address of a target host

    on the same physical network,

    given only the target’s IP address

  • It does this by sending out an ARP broadcast packet containing both the source

    and destination IP address

  • The broadcast is media-dependant

  • For Ethernet LANs the broadcast address

    is a packet whose destination address bits are all `1'


Arp address resolution protocol1

ARP - Address Resolution Protocol

  • All stations on the LAN receive this address,

    but only one host is able to recognize

    its own IP address

  • It replies, thereby giving the original host

    its physical address.


Arp address resolution protocol2

ARP - Address Resolution Protocol


Arp address resolution protocol3

ARP - Address Resolution Protocol


Rarp reverse address resolution protocol

RARP - Reverse Address Resolution Protocol

  • How does the diskless machine,

    one without access to secondary storage,

    determines its IP address at system startup?

  • A diskless machine uses RARP to obtain

    its IP address from a server


Rarp reverse address resolution protocol1

RARP - Reverse Address Resolution Protocol


Rarp reverse address resolution protocol2

RARP - Reverse Address Resolution Protocol


Ip internet protocol

IP - Internet Protocol

  • Defines unreliable, connectionless delivery mechanism

  • IP provides three important definitions:

    - Defines the basic unit of data transfer

    used throughout a TCP/IP internet

    - Performs routing function,

    choosing a path over which data will be sent

    - Includes a set of rules that embody

    the idea of unreliable packet delivery


Icmp internet control message protocol

ICMP - Internet Control Message Protocol

  • Integral part of IP

  • Allows gateways to send error or control messages

    to other gateways or hosts

  • Provides communication between

    the Internet Protocol software on one machine

    and the Internet Protocol Software on another

  • Only reports error conditions to the original source!

  • ICMP message is encapsuled in an IP datagram


Icmp the internet control message protocol

ICMP-The Internet Control Message Protocol


Icmp the internet control message protocol1

ICMP-The Internet Control Message Protocol


Basic infrastructure for electronic business on the internet

Value

Description

0

Echo Reply

3

Destination Not Reachable

4

Source Quench

5

Redirection Required

8

Echo Request

11

Time to Live Exceeded

12

Parameter Problem

13

Timestamp Request

14

Timestamp Reply

15

Information Request (now obsolete)

16

Information Reply (now obsolete)

17

Address Mask Request

18

Address Mask Reply

Type field


Udp user datagram protocol

UDP - User Datagram Protocol

  • Connectionless protocol

  • Provides the primary mechanism that application programs use to send datagrams

    to other application programs

  • Provides protocol ports used to

    distinguish among multiple programs

    executing on a single machine

  • Uses IP to transport a message

    from one machine to another

  • Does not use acknowledgements to make sure messages arrive

  • UDP message is called a user datagram


Udp user datagram protocol1

UDP - User Datagram Protocol


Udp user datagram protocol2

UDP - User Datagram Protocol

  • Source port:

    An optional field with the port number

    If a port number is not specified, the field is set to 0

  • Destination port:

    The port on the destination machine

  • Length:

    The length of the datagram,

    including header and data

  • Checksum:

    A 16-bit one's complement

    of the one's complement sum of the datagram,

    including a pseudo header similar to that of TCP


Udp user datagram protocol3

UDP - User Datagram Protocol

Conceptual Layering


Tcp transmission control protocol

TCP - Transmission Control Protocol

  • TCP is a communication protocol,

    not a piece of software!

  • Provides reliable stream service

  • Positive acknowledgement with retransmission

  • Specifies the format of the data and acknowledgements that two computers exchange

    to achieve a reliable transfer

  • Specifies the procedures the computers use

    to ensure that the data arrives correctly

  • Specifies how TCP software distinguishes

    among multiple destinations on given machine

  • Specifies how communicating machines recover

    from errors like lost or duplicated packets


Tcp transmission control protocol1

TCP - Transmission Control Protocol

  • Specifies how two computers initiate

    a TCP stream transfer and

    how they agree when it is complete

  • Does not dictate the details of the interface

    between an application program and TCP

  • Does not specify the exact application programs

    to access these operations

  • Reason: flexibility

  • TCP uses the connection, not the protocol port,

    as its fundamental abstraction

  • Connections are identified by a pair of endpoints


Tcp transmission control protocol2

TCP - Transmission Control Protocol

  • TCP port number can be shared

    by a multiple connection on the same machine

  • The basic unit of transfer used by TCP is a segment

  • Segments are used

    to pass control information or data


Tcp transmission control protocol3

TCP - Transmission Control Protocol

Server Site

Network Messages

Receiver Site

Send Packet 1

Receive Packet 1

Send ACK 1

Receive ACK1

Send Packet 2

Receive Packet 2

Send ACK2

Receive ACK2

Sender awaits an acknowledgement for each packet sent


Tcp transmission control protocol4

TCP - Transmission Control Protocol

Network Messages

Receiver Site

Server Site

Packet lost

Send Packet1

Start Timer

Packet should arrive

ACK should be sent

ACK would normally

Arrive at this time

Timer Expires

Retransmit Packet1

Start Timer

Receive Packet1

Send ACK1

Receive ACK1

Cancel Timer

Timeout and retransmission that occurs when a packet is lost


Tcp transmission control protocol5

TCP - Transmission Control Protocol

  • A simple positive acknowledgement protocol

    wastes a substantial amount of network bandwidth

  • Delays sending a new packet until it receives

    an acknowledgement for the previous packet

  • Sliding window protocol

  • Keeps the network completely saturated with packets

  • Higher throughput than

    a simple positive acknowledgment protocol


Tcp transmission control protocol6

TCP - Transmission Control Protocol

Sender Site

Network Messages

Receiver Site

Send Packet1

Send Packet2

Receive Packet1

Send ACK1

Send Packet3

Receive Packet2

Send ACK2

Receive ACK1

Receive ACK2

Receive Packet3

Send ACK3

Receive ACK3

Three packet transmitted using a sliding window protocol


Tcp transmission control protocol7

TCP - Transmission Control Protocol

Conceptual Layering


Telnet remote login protocol

Telnet – remote login protocol

  • Allows user at one site

    to establish a TCP connection

    to a login server at another site,

    and then it passes keystrokes

    from the user’s terminal

    directly to the remote machine

    as if they had been typed at

    a terminal on the remote machine

  • Carries output from the remote machine

    back to the user’s terminal


Telnet remote login protocol1

Telnet – remote login protocol

  • The service is called transparent

  • Telnet client software

  • User specifies a remote machine

    either by giving its domain name or IP address

  • Telnet offers three basic services

  • Defines a network virtual terminal (NVT)

  • Includes a mechanism that allows

    the client and server to negotiate options

  • Treats both ends of the connection symmetrically


Telnet remote login protocol2

Telnet – remote login protocol

server sends to

pseudo terminal

client reads

from terminal

client sends

to server

server receives

from terminal


Ftp file transfer protocol

FTP – File Transfer Protocol

  • Manages files across machines

    without remote Telnet session

  • Transfers files, manages directories, accesses e-mail

  • Does not enable access

    to remote machine for program execution

  • Uses two channels

    for simultaneous transfer

    of commands and data

  • Conducts all transfers in foreground

  • Does not use queues or spoolers

    so you are watching the transfer process in real time


Ftp file transfer protocol1

FTP – File Transfer Protocol

  • Relies on TCP to provide connection management

  • Protocol Interpreter PI transfers instructions

    using TCP port 21

  • Data Transfer Process DTP transfers files

    using TCP port 20


Ftp file transfer protocol2

FTP – File Transfer Protocol

FTP channel connections


Ftp file transfer protocol3

FTP – File Transfer Protocol

  • Login

    Verifies user ID and password

    Anonymous FTP allows access without login account

    Access and file transfer requires

    proper permissions on the remote side

  • Define directory

    Identifies starting directory

    Local and remote file system

  • Define File Transfer Mode

    Text uses ASCII characters separated by CR and NL

    Binary transfers without conversion or formatting


Ftp file transfer protocol4

FTP – File Transfer Protocol

  • Start Data Transfer

    Enables user commands

  • Stop Data Transfer

    Closes connection


Tftp trivial file transfer protocol

TFTP – Trivial File Transfer Protocol

  • Does not log on to remote machine

  • Uses UDP connectionless transport

    TFTP transfer identifiers (TID’s)

    set ends of connection

    Support basic error messages

    Any kind of error can result in transfer failure

  • Uses to boot diskless terminals and load applications

    Small executable size and memory requirements

    Cannot execute FTP until loaded with OS

  • Lax access regulations pose security risks


Electronic mail

Electronic Mail

  • The most widely used application service

  • Differs fundamentally from other uses of network

  • Usually timeout and retransmission

    if no acknowledgement

  • Sender don’t want to wait for

    the remote machine to become available

    before continuing work!

  • User don't want to have transfer abort merely because communication with the remote machine becomes temporary unavailable!

  • Spooling


Conceptual components of an electronic mail system

Conceptual components of an electronic mail system


Smtp simple mail transfer protocol

SMTP - Simple Mail Transfer Protocol

  • Standard for the exchange of mail

    between machines

  • Focuses specifically on

    how the underlying mail delivery system

    passes messages across a link

    from one machine to another

  • Messages transferred as 7-bit ASCII

  • Uses spools or queues

  • Does not specify

    how the mail system accepts mail from a user

    or how the user interface presents the user

    with incoming mail


Smtp simple mail transfer protocol1

SMTP - Simple Mail Transfer Protocol

  • Does not specify

    how mail is stored or

    how frequently the mail system

    attempts to send messages

  • Mail command identifies sender and provides message information

  • Response is acknowledgment with identification of recipient


Example of smtp transfer

Example of SMTP Transfer

S: 220 Beta.gov Simple Mail Transfer Service Ready

C: HELO Alpha.edu

S: 250 Beta.gov

C: MAIL FROM: <[email protected]>

S: 250 OK

C: RCPT TO: <[email protected]>

S: 550 No such user here


Example of smtp transfer1

Example of SMTP Transfer

C: RCPT TO: <[email protected]>

S: 250 OK

C: DATA

S: 354 Start mail input; end with <CR><LF>.<CR><LF>

C: …sends body of mail message…

C: …continues for as many lines as message contains

C: <CR><LF>. <CR><LF>

S: 250 OK

C: QUIT

S: 221 Beta.gov Service closing transmission channel


References

References

  • The Internet Unleashed, SAMS Publishing

  • Internetworking With TCP/IP, Douglas Comer

  • Teach yourself TCP/IP in 14 days, Tim Parker

  • Novell’s Complete Encyclopedia of Networking, Werner Feibel

  • http://www.ieee-occs.org


Conclusion

Conclusion


  • Login