1 / 56

Invitation to Computer Science 5 th Edition

Invitation to Computer Science 5 th Edition. Chapter 7 Computer Networks, the Internet, and the World Wide Web. Objectives. In this chapter, you will learn about: Basic networking concepts Communication protocols Network services and benefits The Internet and the World Wide Web.

ely
Download Presentation

Invitation to Computer Science 5 th Edition

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Invitation to Computer Science 5thEdition Chapter 7 Computer Networks, the Internet, and the World Wide Web

  2. Objectives In this chapter, you will learn about: • Basic networking concepts • Communication protocols • Network services and benefits • The Internet and the World Wide Web Invitation to Computer Science, 5th Edition

  3. Introduction • Networking • Might foster growth of democracy and global understanding • Can equalize access to information and eliminate the concept of “information haves” and “information have-nots” Invitation to Computer Science, 5th Edition 3

  4. Basic Networking Concepts • Computer network • Set of independent computer systems connected by telecommunication links • Individual computers on the network • Referred to as nodes, hosts, or end systems Invitation to Computer Science, 5th Edition 4

  5. Communication Links • In early days of networking: • Most common way to transmit data was via switched, dial-up telephone lines • Voice-oriented dial-up telephone network • Originally a totally analog medium • Modem • Modulates, or alters, a standard analog signal called a carrier so that it encodes binary information Invitation to Computer Science, 5th Edition

  6. Figure 7.1 Two Forms of Information Representation Invitation to Computer Science, 5th Edition

  7. Figure 7.2 Modulation of a Carrier to Encode Binary Information Invitation to Computer Science, 5th Edition

  8. Communication Links (continued) • Broadband • Has rapidly been replacing modems and analog phone lines for data communications • Digital subscriber line • Provided by either your local telephone company or someone certified to act as their intermediary • Asymmetric digital subscriber • Does not have the same transmission speed in the download direction as in the upload direction Invitation to Computer Science, 5th Edition

  9. Communication Links (continued) • Cable modem • Makes use of links that deliver cable TV signals into your home • Offered by cable TV providers • Ethernet • Designed to operate at 10 Mbps using coaxial cable • Fast Ethernet • Transmits at 100 Mbps across coaxial cable, fiber-optic cable, or regular twisted-pair copper wire Invitation to Computer Science, 5th Edition

  10. Communication Links (continued) • Gigabit networking • Transmission lines that support speeds in excess of 1 billion bits per second (Gbps) • Ten-gigabit Ethernetstandard • Version of Ethernet with data rate of 10 billion bits per second • Adopted by IEEE in 2003 • Wireless data communication • Uses radio, microwave, and infrared signals Invitation to Computer Science, 5th Edition

  11. Figure 7.3 Transmission Time of an Image at Different Transmission Speeds Invitation to Computer Science, 5th Edition

  12. Communication Links (continued) • Wireless local access network • User transmits from his or her computer to a local wireless base station • Wi-Fi (Wireless Fidelity) • Used to connect a computer to the Internet when it is within range of a wireless base station • Metropolitan Wireless Local Access Network • Routers provide convenient, low cost wireless Internet access to all residents Invitation to Computer Science, 5th Edition

  13. Communication Links (continued) • Bluetooth • Often used to support communication between wireless computer peripherals • Wireless wide area access network • Computer transmits messages to a remote base station provided by a telecommunications company • 3G • Offers voice services as well as data communication at rates of 0.5 to 2.4 Mbps Invitation to Computer Science, 5th Edition

  14. Local Area Networks • Local area network (LAN) • Connects hardware devices such as computers, printers, and storage devices that are all in close proximity • Bustopology • All nodes are connected to a single shared communication line • Ringtopology • Connects the network nodes in a circular fashion Invitation to Computer Science, 5th Edition

  15. Figure 7.4 Some Common LAN Topologies Invitation to Computer Science, 5th Edition

  16. Local Area Networks (continued) • Shared cable • A wire is strung around and through a building • Users tap into the cable at its nearest point using a transceiver • Repeater • Device that simply amplifies and forwards a signal • Bridge (switch) • “Smarter” device that has knowledge about the nodes located on each separate network Invitation to Computer Science, 5th Edition

  17. Figure 7.5 An Ethernet LAN Implemented Using Shared Cables Invitation to Computer Science, 5th Edition

  18. Local Area Networks (continued) • Switch • Located in a room called a wiring closet • Contains a number of ports, with a wire leading from each port to an Ethernet interface Invitation to Computer Science, 5th Edition

  19. Figure 7.6 An Ethernet LAN Implemented Using a Switch Invitation to Computer Science, 5th Edition

  20. Wide Area Networks • Wide area network (WAN) • Connects devices that are not in close proximity but rather are across town, across the country, or across the ocean • Most WANs • Use a store-and-forward, packet-switched technology to deliver messages • Packet • Information block with a fixed maximum size that is transmitted through the network as a single unit Invitation to Computer Science, 5th Edition

  21. Figure 7.7 Typical Structure of a Wide Area Network Invitation to Computer Science, 5th Edition

  22. Overall Structure of the Internet • Individual networks are interconnected via a device called a router • Internet Service Provider (ISP) • Business whose purpose is to provide access from a private network to the Internet • Hierarchical, interconnecting to each other in multiple layers, or tiers, that provide ever-expanding geographic coverage Invitation to Computer Science, 5th Edition

  23. Figure 7.8(a) Structure of a Typical Company Network Invitation to Computer Science, 5th Edition

  24. Figure 7.8(b) Structure of a Network Using an ISP Invitation to Computer Science, 5th Edition

  25. Figure 7.8(c) Hierarchy of Internet Service Providers Invitation to Computer Science, 5th Edition

  26. Overall Structure of the Internet (continued) • International ISP • Also called tier-1 network or an Internet backbone • Provides global coverage • Internet • Huge interconnected “network of networks” that includes nodes, LANs, WANs, bridges, routers, and multiple levels of ISPs Invitation to Computer Science, 5th Edition

  27. Communication Protocols • Protocol • Mutually agreed upon set of rules, conventions, and agreements for the efficient and orderly exchange of information • Internet Society • Nonprofit, nongovernmental, professional society composed of more than 100 worldwide organizations • Internet protocol hierarchy • Also called a protocol stack • Has five layers Invitation to Computer Science, 5th Edition

  28. Figure 7.10 The Five-Layer TCP/IP Internet Protocol Hierarchy Invitation to Computer Science, 5th Edition

  29. Physical Layer • Physical layer protocols • Govern the exchange of binary digits across a physical communication channel • Goal of the physical layer • To create a “bit pipe” between two computers Invitation to Computer Science, 5th Edition

  30. Figure 7.11 The Concept of a Bit Pipe Invitation to Computer Science, 5th Edition

  31. Data Link Layer • Error detection and correction problem • How do we detect when errors occur, and how do we correct them? • Framing problem • Identifying the start and end of a message • Data link protocols • Address and solve error handling and framing • Medium access control protocols • Determine how to arbitrate ownership of a shared line when multiple nodes want to send messages at the same time Invitation to Computer Science, 5th Edition

  32. Figure 7.12 The Medium Access Control Protocols in Ethernet Invitation to Computer Science, 5th Edition

  33. Data Link Layer (continued) • Collision • Two or more messages transmitted at exactly the same time • Common occurrence in contention-based networks like Ethernet • Layer 2b logical link control protocols • Ensure that message traveling across this channel from source to destination arrives correctly • ARQ algorithm • Basis for all data link control protocols in current use Invitation to Computer Science, 5th Edition

  34. Network Layer • Network layerprotocols • Deliver message from the site where it was created to its ultimate destination • Responsibilities of the network layer • Creating a universal addressing scheme for all network nodes • Delivering messages between any two nodes in the network Invitation to Computer Science, 5th Edition

  35. Figure 7.13 A Message Packet Sent by the Data Link Protocols Invitation to Computer Science, 5th Edition

  36. Network Layer (continued) • Nodes identify each other using a 32-bit IP address • Domain Name System (DNS) • Converts from a symbolic host name such as macalester.edu to its 32-bit IP address 141.140.1.5 • Local name server • Checks to see if it has data record containing a specific IP address Invitation to Computer Science, 5th Edition

  37. Network Layer (continued) • Routing • Process of selecting one specific path • Shortest path • Path via which message can travel the fastest Invitation to Computer Science, 5th Edition

  38. Transport Layer • Transport layer protocols • Assigns port numbers to programs • Remembers which program goes with which port • Well-known port numbers • Used by all important applications on the Internet Invitation to Computer Science, 5th Edition

  39. Figure 7.14 Relationship between IP Addresses and Port Numbers Invitation to Computer Science, 5th Edition

  40. Application Layer • Application layer protocols • Rules for implementing end-user services provided by a network • Uniform Resource Locator (URL) • protocol://host address/page • HTTP request message • Sent on the TCP connection from the client to the server, specifying the name of a Web page • HTTP response message • Returned from the server to the client along the same TCP connection Invitation to Computer Science, 5th Edition

  41. Figure 7.16 Some Popular Application Protocols on the Internet Invitation to Computer Science, 5th Edition

  42. Figure 7.17 Behavior of the HTTP Application-Level Protocol Invitation to Computer Science, 5th Edition

  43. Network Services and Benefits • Electronic mail (e-mail) • Single most popular application of networks for the last 30 years • Bulletin boards • Shared public file where anyone can post messages and everyone is free to read the postings of others • Social networks • Systems that create communities of users who share common interests Invitation to Computer Science, 5th Edition

  44. Network Services and Benefits (continued) • Resource sharing • Ability to share physical and logical resources • Client-server computing • Some nodes provide services, while the remaining nodes are users of those services • Information sharing • A network is an excellent way to access scientific, medical, legal, and commercial data files Invitation to Computer Science, 5th Edition

  45. Figure 7.18 The Client-Server Model of Computing Invitation to Computer Science, 5th Edition

  46. Network Services and Benefits (continued) • Information utility (data warehouse) • Nodes contain massive amounts of information that can be electronically searched for specific facts • Collaborative software (groupware) • Facilitates the efforts of individuals connected by a network and working on a single shared project • Electronic commerce (e-commerce) • Use of computers and networking to support the paperless exchange of goods, information, and services Invitation to Computer Science, 5th Edition

  47. A Brief History of the Internet and the World Wide Web • ARPA • Small research office of the Department of Defense charged with developing technology that could be of use to the U.S. military • ARPANET • Formally demonstrated to scientific community at an international conference in 1972 • Internetworking • Any WAN is free to do whatever it wants internally Invitation to Computer Science, 5th Edition

  48. A Brief History of the Internet and the World Wide Web (continued) • Robert Kahn and his colleagues needed to create: • A standardized way for a node in one WAN to identify a node located in a different WAN • A universally recognized message format for exchanging information across WAN boundaries • Telnet • Allows users to log on remotely to another computer and use it as though it were their own local machine Invitation to Computer Science, 5th Edition

  49. Figure 7.19 A Network of Networks Invitation to Computer Science, 5th Edition

  50. A Brief History of the Internet and the World Wide Web (continued) • FTP (file transfer protocol) • Provides a way to move files around the network quickly and easily • NSFNet • Used TCP/IP technology identical to the ARPANET • Interconnected six NSF supercomputer centers with dozens of new regional networks set up by the NSF • Internet service providers • Offered Internet access once provided by ARPANET and NSFNet Invitation to Computer Science, 5th Edition

More Related