networking.ch1
TRANSCRIPT
![Page 1: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/1.jpg)
An Introductionto Networking
Chapter 1Updated January 2007
Panko’sBusiness Data Networks and Telecommunications, 6th edition
Copyright 2007 Prentice-HallMay only be used by adopters of the book
![Page 2: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/2.jpg)
2
Builds
• Slides with the “mouse click” icon in the upper right hand corner are “build” slides
• Not everything on the slide will appear at once
• Each time the mouse click icon is clicked, more information on the slide will appear.
![Page 3: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/3.jpg)
Part I: Basic Networks Concepts
Concepts we will seethroughout the book
![Page 4: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/4.jpg)
4
Figure 1-1: Basic Networking Concepts
• What Is a Network?
– A network is a transmission system that connects two or more applications running on different computers.
Network
![Page 5: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/5.jpg)
5
Figure 1-1: Basic Networking Concepts
• Client/Server Applications– Most Internet applications are client/server applications– Clients receive service from servers– The client is often a browser
Client ComputerServer Computer
ServerProgram
ClientProgram
Services
![Page 6: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/6.jpg)
Part II: The Nine Elements of a Network
Although the idea of “network”is simple, you must understand the
nine elements found in most networks
![Page 7: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/7.jpg)
7
Figure 1-3: Elements of a Network
WirelessAccess Point
MobileClient
Router
OutsideWorld
ServerComputer
ClientComputer
Switch1
Switch2
Switch3
Message (Frame)
AccessLine
TrunkLine
Server ApplicationClient Application
1.Networks connect
applications on different computers.
Networks connect computers: 2. Clients (fixed and mobile) and
3. Servers
![Page 8: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/8.jpg)
8
Figure 1-3: Elements of a Network
WirelessAccess Point
MobileClient
Router
OutsideWorld
ServerComputer
ClientComputer
Switch1 Switch
3
Message (Frame)
TrunkLine
Server ApplicationClient Application
4.Computers (and routers)
usually communicateby sending messages
called frames
![Page 9: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/9.jpg)
9
Figure 1-3: Elements of a Network
WirelessAccess Point
MobileClient
Router
OutsideWorld
ServerComputer
ClientComputer
Switch4
Message (Frame)
TrunkLine
Server ApplicationClient Application
Switch 2
Switch 1Switch 3
ClientSendsFrameto Sw1
Sw1 SendsFrameto Sw2
Sw2 SendsFrameTo Sw3
Sw3 SendsFrame toServer
5.Switches Forward
Frames Sequentially
![Page 10: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/10.jpg)
10
Figure 1-5: Ethernet Switch Operation
A1-44-D5-1F-AA-4C B2-CD-13-5B-E4-65
SwitchD4-47-55-C4-B6-F9
C3-2D-55-3B-A9-4F
Port 15
Frame to C3…
A1- sends a frame to C3-
Frame to C3…
Switch sends frame to C3-
Switching TablePort Host10 A1-44-D5-1F-AA-4C13 B2-CD-13-5B-E4-6515 C3-2D-55-3B-A9-4F16 D4-47-55-C4-B6-F915 C3-2D-55-3B-A9-4F
C3- is out Port 15
1
2
3
![Page 11: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/11.jpg)
11
Figure 1-3: Elements of a Network
WirelessAccess Point
MobileClient
Router
OutsideWorld
ServerComputer
ClientComputer
Switch1
Switch2
Switch3
Switch4
Message (Frame)
AccessLine
TrunkLine
Server ApplicationClient Application
6.Wireless AccessPoints Connect
Wireless Stationsto Switches
![Page 12: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/12.jpg)
12
Figure 1-3: Elements of a Network
WirelessAccess Point
MobileClient
Router
OutsideWorld
ServerComputer
ClientComputer
Switch1
Switch2
Switch3
Switch4
Message (Frame)
AccessLine
TrunkLine
Server ApplicationClient Application
7.Routers connect networks
to the outside world;Treated just like computers
in single networks
Yes, single networks cancontain routers
![Page 13: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/13.jpg)
13
Figure 1-3: Elements of a Network
WirelessAccess Point
MobileClient
Router
OutsideWorld
ServerComputer
ClientComputer
Switch1
Switch2
Switch3
Switch4
Message (Frame)
AccessLine
TrunkLine
Server ApplicationClient Application8. Access Lines
Connect Computersto Switches
9. Trunk Lines ConnectSwitches to Switches and
Switches to Routers
![Page 14: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/14.jpg)
14
Figure 1-4: Packet Switching and Multiplexing
ClientComputer A
Mobile ClientComputer B
Router D
ServerComputer C
AC
ACACAC
ACAC
BDBD
BD
BD
AccessLine
Trunk Line
Multiplexed PacketsShare Trunk Lines
So Packet SwitchingReduces the Cost of Trunk Lines
Breaking Communications intoSmall Messages is Called
Packet Switching, even if theMessages are Frames
![Page 15: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/15.jpg)
15
Network Elements: Recap
• Name the 9 Elements of Single networks.– Without looking back through
your handout
Never talk about aninnovation “reducing cost,”
“increasing speed,” etc.without specifyingwhich element ischeaper or faster.
For example, multiplexingonly reduces the cost of
trunk lines; othercosts are not decreased
![Page 16: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/16.jpg)
Part III: Transmission Speed
![Page 17: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/17.jpg)
17
Figure 1-6: Transmission Speed
• Measuring Transmission Speed– Measured in bits per second (bps)
– In metric notation:
• Increasing factors of 1,000 …– Not factors of 1,024
• Kilobits per second (kbps)-note the lowercase k
• Megabits per second (Mbps)
• Gigabits per second (Gbps)
• Terabits per second (Tbps)
![Page 18: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/18.jpg)
18
Figure 1-6: Transmission Speed
• Measuring Transmission Speed
– What is 23,000 bps in metric notation?
– What is 3,000,000,000 in metric notation?
– What is 15,100,000 bps in metric notation?
• Occasionally measured in bytes per second• If so, written as Bps• Usually seen in file download speeds
![Page 19: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/19.jpg)
19
Figure 1-6: Transmission Speed
• Writing Transmission Speeds in Proper Form– The rule for writing speeds (and metric numbers in
general) in proper form is that there should be 1 to 3 places before the decimal point
– 23.72 Mbps is correct (2 places before the decimal point).
– 2,300 Mbps has four places before the decimal point, so it should be rewritten as 2.3 Gbps (1 place).
– 0.5 Mbps has zero places to the left of the decimal point. It should be written as 500 kbps (3 places).
![Page 20: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/20.jpg)
20
Figure 1-6: Transmission Speed
• Writing Transmission Speeds in Proper Form– How to convert 1,200 Mbps to proper form
• Divide the number 1,200 by 1000– Move decimal point three places to the left: 1.200
• Multiply the metric suffix Mbps by 1,000– Gbps
• Result:– 1.2 Gbps
![Page 21: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/21.jpg)
21
Figure 1-6: Transmission Speed
• Writing Transmission Speeds in Proper Form– How to convert 0.036 Mbps to proper form
• Multiply the number 0.036 by 1000– Move decimal point three places to the right: 36
• Divide the metric suffix Mbps by 1,000– kbps
• Result:– 36 kbps
![Page 22: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/22.jpg)
22
Figure 1-6: Transmission Speed
• Writing Transmission Speeds in Proper Form– How should you write the following in proper form?
• 549.73 kbps
• 0.47 Gbps
• 11,200 Mbps
• .0021 Gbps
![Page 23: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/23.jpg)
23
Figure 1-6: Transmission Speed
• Rated Speed– The speed in bits per second that you should get
(advertised or specified in the standard).
• Throughput– The speed you actually get– Almost always lower than the rated speed
• On Shared Transmission Lines– Aggregate throughput—total throughput for all users– Individual throughput—what individual users get
![Page 24: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/24.jpg)
Part IV: LANs and WANs
![Page 25: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/25.jpg)
25
Figure 1-8: LANs Versus WANs
CharacteristicsScope
LANs WANsFor transmission withina site. Campus, building, and SOHO(Small Office or HomeOffice) LANs
For transmissionbetween sites
BuildingLAN
HomeLAN
CampusLANWide Area
Network
![Page 26: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/26.jpg)
26
WANsCharacteristics LANs
Cost per bit Transmitted Low High
Figure 1-8: LANs Versus WANs
Typical Speed
Unshared 100 Mbps to a gigabit per second to eachdesktop. Even fastertrunk line speeds.
Shared 128 kbps to several megabits per second trunk line speeds
It’s simple economics. If the cost per unit is higher, the number of units demanded will be lower.
Corporations cannot afford high-speed for most of their WAN transmission
![Page 27: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/27.jpg)
27
Figure 1-8: LANs Versus WANs
Characteristics
Management
LANs WANsOn own premises, sofirm builds andmanages its own LANor outsources theWork
Must use a carrier withrights of way for transmission in publicArea. Carrier handles most work butCharges a high price.
Choices Unlimited Only those offered bycarrier
![Page 28: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/28.jpg)
28
Figure 1-9: Local Area Network (LAN) in a Large Building
Router Core Switch
Workgroup Switch 2
Workgroup Switch 1
Wall Jack
ToWAN
Wall Jack
Server
Client
Frames from the client to the server go through Workgroup Switch 2, through the Core Switch, through Workgroup Switch 1, and then to the server
![Page 29: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/29.jpg)
Part V: Internets
![Page 30: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/30.jpg)
30
Figure 1-11: Internets
• Single LANs Versus Internets
– In single networks (LANs and WANs), all devices connect to one another by switches—our focus so far.
– In contrast, an internet is a group of networks connected by routers so that any application on any host on any single network can communicate with any application on any other host on any other network in the internet.
LAN WAN LAN
Application Application
Router Router
![Page 31: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/31.jpg)
31
Figure 1-11: Internets
• Internet Components– All computers in an internet are called hosts– Clients as well as servers
Cat(IgnoresInternet)
Internet
Client PC(Host)
Cellphone(Host)
VoIP Phone(Host)
PDA(Host)
Server(Host)
Host
![Page 32: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/32.jpg)
32
Figure 1-11: Internets
• Hosts Have Two Addresses
• IP Address– This is the host’s official address on its internet– 32 bits long– Expressed for people in dotted decimal notation (e.g.,
128.171.17.13)
• Single-Network Addresses– This is the host’s address on its single network– Ethernet addresses, for instance, are 48 bits long– Expressed in hexadecimal notation (e.g., AF-23-9B-
E8-67-47)
![Page 33: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/33.jpg)
33
Figure 1-11: Internets
• Networks are connected by devices called routers
– Switches provide connections within networks, while routers provide connections between networks in an internet.
• Frames and Packets
– In single networks, message are called frames
– In internets, messages are called packets
![Page 34: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/34.jpg)
34
Figure 1-11: Internets
• Packets are carried within frames– One packet is transmitted from the source host to the
destination host across the internet• Its IP destination address is that of the destination
host
Frame
Packet
LAN WAN LAN
Router Router
![Page 35: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/35.jpg)
35
Figure 1-11: Internets
• Packets are carried within frames– In each network, the packet is carried in (encapsulated
in) a frame
– If there are N networks between the source and destination hosts, there will be one packet and N networks between the source and destination hosts, there will be one packet and N frames for a transmission
Frame
Packet
LAN WAN LAN
Router Router
![Page 36: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/36.jpg)
36
Figure 1-12: Internet with Three Networks
Host B
Host A
Network XNetwork Y
Network Z
R1
R2
Route A-B
Packet
A packet goes all theway across the internet;
It’s path is its route
![Page 37: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/37.jpg)
37
Figure 1-12: Internet with Three Networks
Mobile ClientHost
ServerHost
Switch
SwitchX2
SwitchX1
Switch
Router R1D6-EE-92-5F-C1-56
Network XRoute A-B
A route is a packet’spath through the internet
Details inNetwork X
Data linkA-R1
A data Link is aframe’s path through
its single network
In Network X, the Packet is Placed in Frame X
PacketFrame X
Host A10.0.0.23
AB-23-D1-A8-34-DD
![Page 38: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/38.jpg)
38
Figure 1-12: Internet with Three Networks
Router R1
Router R2AF-3B-E7-39-12-B5
PacketFrame Y
ToNetwork X
ToNetwork Z
Network Y
Data LinkR1-R2
RouteA-B
Details inNetwork Y
![Page 39: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/39.jpg)
39
Figure 1-12: Internet with Three Networks
Host Bwww.pukanui.com
1.3.45.11155-6B-CC-D4-A7-56
Mobile Client Host
SwitchZ1
Switch
SwitchZ2
Switch
PacketFrame Z
Network Z
Router R2
Router
Data LinkR2-B
Details inNetwork Z
Mobile ClientComputer
![Page 40: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/40.jpg)
40
Figure 1-12: Internet with Three Networks
• In this internet with three networks, in a transmission,– There is one packet
– There are three frames (one in each network)
• If a packet in an internet must pass through 10 networks,– How many packets will be sent?
– How many frames must carry the packet?
![Page 41: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/41.jpg)
41
10000000101010110001000100001101
Figure 1-13: Converting IP Addresses into Dotted Decimal Notation
Divided into 4 bytes. Theseare segments. 10000000 10101011 00010001 00001101
Dotted decimal notation(4 segments separated bydots)
IP Address (32 bits long)
Convert each byte todecimal (result will bebetween 0 and 255)*
128 171 17 13
*The conversion process is described in the Hands On section at the end of the chapter.
128.171.17.13
![Page 42: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/42.jpg)
42
Figure 1-25: Windows Calculator
3.Click on Bin to
Indicate that theSource number
Is binary.
2.Choose
View, Scientific
1.Windows Calculators is under
Programs Accessories
4.Enter the bits of an 8-bit segment(The calculator has an 8-bit limit)
![Page 43: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/43.jpg)
43
Figure 1-25: Windows Calculator
5.Click on Dec
To do the conversion
6.See the result
![Page 44: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/44.jpg)
44
Converting Decimal to Binary
• Click on Dec to indicate that the input is decimal
• Type a decimal number between 0 and 255
• Click on Bin to do the conversion
• The result must be eight bits long to be a segment of an IP address– So if the calculator shows 1100,
– the correct answer is 00001100
![Page 45: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/45.jpg)
45
Figure 1-17: The Internet
2.User PC’s
Internet ServiceProvider
2.Webserver’s
Internet ServiceProvider
ISP ISP
1.User PC
HostComputer
1.Webserver
HostComputer
4.NAPs = Network Access Points
Connect ISPs
RouterNAP NAP
NAPISP
ISP
3.Internet Backbone
(Multiple ISP Carriers)AccessLine
AccessLine
![Page 46: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/46.jpg)
46
Figure 1-18: Subnets in an Internet
LAN 1LAN 2
LAN Subnet10.1.x.x
WANSubnet
123.x.x.x
LAN Subnet60.4.3.x
LAN Subnet10.2.x.x
LAN Subnet10.3.x.x
LAN Subnet60.4.15.x
LAN Subnet60.4.7.x
Note: Subnets are single networks (collections of switches, transmission lines)Often drawn as simple lines to focus on routers for internetworking
RouterR1
Router R3
RouterR4
Router R2
LAN Subnet60.4.131.x
![Page 47: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/47.jpg)
47
Figure 1-19: Terminology Differences for Single-Network and Internet Professionals
By Single-NetworkProfessionals
By InternetProfessionals
Single Networks AreCalled
Networks Subnets
Internets Are Called Internets Networks
In this book, we will usually call internets “internets”and subnets “single networks”
![Page 48: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/48.jpg)
48
Figure 1-14: The Internet, internets, Intranets, and Extranets
• Lower-case internet– Any internet
• Upper-case Internet– The global Internet
• Intranet– An internet restricted to users within a single company
• Extranet– A group of resources that can be accessed by authorized
people in a group of companies
![Page 49: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/49.jpg)
49
Figure 1-20: IP Address Management
• Every Host Must Have a Unique IP address
– Server hosts are given static IP addresses (unchanging)
– Clients get dynamic (temporary) IP addresses that may be different each time they use an internet
• Dynamic Host Configuration Protocol (DHCP) (Figure 1-21)
– Clients get these dynamic IP addresses from Dynamic Host Configuration Protocol (DHCP) servers (Figure 1-21)
![Page 50: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/50.jpg)
50
Figure 1-21: Dynamic Host Configuration Protocol (DHCP)
Client PCA3-4E-CD-59-28-7F
DHCPServer
1. DHCP Request Message:“My 48-bit Ethernet address is A3-4E-CD-59-28-7F”.
Please give me a 32-bit IP address.”
2. Pool ofIP Addresses
3. DHCP Response Message:“Computer at A3-4E-CD-59-28-7F,
your 32-bit IP address is 11010000101111101010101100000010”.(Usually other configuration parameters as well.)
![Page 51: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/51.jpg)
51
Figure 1-20: IP Address Management
• Domain Name System (DNS) (Figure 1-22)
– IP addresses are official addresses on the Internet and other internets
– Hosts can also have host names (e.g., cnn.com)• Not official—like nicknames
– If you only know the host name of a host that you want to reach, your computer must learn its IP address
• DNS servers tell our computer the IP address of a target host whose name you know. (Figure 1-22)
![Page 52: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/52.jpg)
52
Figure 1-22: The Domain Name System (DNS)
Host Name IP Address … …… …Voyager.cba.hawaii.edu128.171.17.13… …
DNS Table1.Client Host
wishes to reachVoyager.cba.hawaii.edu;
Needs to knowits IP Address
2. Sends DNS Request Message“The host name is Voyager.cba.hawaii.edu”
Voyager.cba.hawaii.edu128.171.17.13
LocalDNSHost
![Page 53: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/53.jpg)
53
Figure 1-22: The Domain Name System (DNS)
Host Name IP Address … …… …Voyager.cba.hawaii.edu128.171.17.13… …
DNS Table
4. DNS Response Message“The IP address is 128.171.17.13”
Voyager.cba.hawaii.edu128.171.17.13
5.Client sends packets to
128.171.17.13
3.DNS Host
looks up thetarget host’sIP address
DNSHost
![Page 54: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/54.jpg)
54
Figure 1-22: The Domain Name System (DNS)
Host Name IP Address … …… …Voyager.cba.hawaii.edu128.171.17.13… …
DNS Table
Client Host
1. DNS Request Message
Anther DNS Host
LocalDNSHost
3. DNS Response Message
The local DNS hostsends back the response;the user is unaware that
other DNS hosts were involved
If local DNS host does nothave the target host’s IP address,
it contacts other DNS hoststo get the IP address
2.Request &Response
![Page 55: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/55.jpg)
Part VI: Security
![Page 56: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/56.jpg)
56
Figure 1-23: Firewall and Hardened Hosts
LegitimateHost
LegitimatePacket
BorderFirewall
HardenedServer
Allowed LegitimatePacket
HardenedClient PC
InternalCorporateNetwork
Border firewallshould pass
legitimate packets
TheInternet
Attacker
Log File
![Page 57: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/57.jpg)
57
Figure 1-23: Firewall and Hardened Hosts
LegitimateHost
AttackPacket
DeniedAttackPacket
HardenedServer
HardenedClient PC
InternalCorporateNetwork
Border firewallshould deny (drop)
and logattack packets
TheInternet
BorderFirewall
Attacker
Log File
![Page 58: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/58.jpg)
58
Figure 1-23: Firewall and Hardened Hosts
LegitimateHost
AttackerAttackPacket
DeniedAttackPacket
InternalCorporateNetwork
TheInternet
BorderFirewall
HardenedServer
HardenedClient PC
AttackPacket
AttackPacket
Log File
Hosts shouldbe hardened
against attack packetsthat get through
![Page 59: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/59.jpg)
59
Figure 1-24: Cryptographic Protections
• Cryptography– The use of mathematical operations to thwart attacks on
message dialogues between pairs of communicating parties (people, programs, or devices)
• Initial Authentication– Determine the other party’s identity to thwart impostors
![Page 60: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/60.jpg)
60
Figure 1-24: Cryptographic Protections
• Message-by-Message Protections
– Encryption to provide confidentiality so that an eavesdropper cannot reach intercepted messages
– Electronic signatures provide message-by-message authentication to prevent the insertion of messages by an impostor after initial authentication
– Electronic signatures usually also provide message integrity; this tells the receiver whether anyone has changed the message en route
![Page 61: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/61.jpg)
Topics Covered
![Page 62: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/62.jpg)
62
Network Elements: Recap
• Applications (the only element that users care about)• Computers
– Clients– Servers
• Switches and Routers• Transmission Lines
– Trunk lines– Access Lines
• Messages (Frames)• Wireless Access Points
Never talk about aninnovation “reducing cost,”
“increasing speed,” etc.without specifyingwhich element ischeaper or faster.
For example, multiplexingonly reduces the cost of
trunk lines; othercosts are not decreased
![Page 63: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/63.jpg)
63
Recap: LANs and WANs
• LANs transmit data within corporate sites
• WANs transmit data between corporate sites
• Each LAN or WAN is a single network
• LAN costs are low andspeeds are high
• WAN costs are highand speeds are lower
WAN
![Page 64: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/64.jpg)
64
LAN WAN LAN
Recap: Internets
• Most firms have multiple LANs and WANs.• They must create internets
– An internet is a collection of networks connected by routers so that any application on any host on any single network can communicate with any application on any other host on any other network in the internet.
Application Application
Router Router
![Page 65: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/65.jpg)
65
LAN WAN LAN
Recap: Internets
• Elements of an Internet– Computers connected to the internet are called
hosts• Both servers and client PCs are hosts
– Routers connect the networks of the internet together
• In contrast, switches forward frames within individual networks
Router
Client PC Host Server Host
Router
![Page 66: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/66.jpg)
66
Recap: Internets
• Hosts Have Two Addresses
• IP Address– This is the host’s official address on its internet– 32 bits long– Expressed for people in dotted decimal notation (e.g.,
128, 171, 17.13)
• Single Network Addresses– This is the host’s address on its single network– Ethernet addresses, for instance, are 48 bits long– Expressed in hexadecimal notation, e.g., AF-23-9B-
E8-67-47
![Page 67: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/67.jpg)
67
Recap: Internets
• Switches versus Routers– Switches move frames through a single network (LAN
or WAN)
– Routers move packets through internets
• Messages– Messages in single networks are called frames
– Messages in internets are called packets
– Packets are encapsulated within (carried inside) frames
![Page 68: Networking.ch1](https://reader033.vdocuments.pub/reader033/viewer/2022051706/577cc9c91a28aba711a49d96/html5/thumbnails/68.jpg)
68
Recap: Security
• Security– Firewalls
– Hardened Hosts
– Cryptographic securityfor sensitive dialogues
• Initial authentication
• Encryption for confidentiality
• Electronic signatures for authentication and message integrity