chapter 2 pcs on the internet suraya alias. the tcp/ip suite of protocols internet applications –...

13
CHAPTER 2 PCs on the Internet Suraya Alias

Upload: oswin-price

Post on 26-Dec-2015

218 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data

CHAPTER 2

PCs on the Internet

Suraya Alias

Page 2: CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data

The TCP/IP Suite of Protocols

Internet applications – client/server applications The client requested data from the server Example : a home user (client) requesting the facebook web

page from facebook application web server (web host) Example of web servers : Apache HHTP Server and Internet

Information Services (IIS) The server application is installed as a service in a computer

Using IP and Ports addresses to identify services Each services (email, web server) is addressed using unique port

number since they access to the same IP Address So each server applications listens to the assigned port Example: web server is assigned port 80, email server is port 25 So the web server will communicate at 136.60.30.5:80 and the email

server using 136.60.30.5:25

Page 3: CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data

Common TCP/IP port assignmentPort Protocol Service Description

20 FTP FTP File transfer data

21 FTP FTP File transfer data

22 SSH Secure Shell Remote control to a networked computer

23 Telnet Telnet Used by UNIX computers to control a computer remotely

25 SMTP E-mail Simple Mail Transfer Protocol

80 HTTP Web server World Wide Web Protocol

109 POP2 E-mail Post Office Protocol,v2, used by client to receive email

110 POP3 E-mail Post Office Protocol,v3, used by client to receive email

119 NNTP News server New server, used for newsgroup

143 IMAP E-mail Internet Message Access Protocol, newer than POP3

443 HTTPS Web server HTTP with security includes authentication and encryption

Page 4: CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data

TCP/IP protocol layers

Web server Email Chat room FTP

Applications

HTTP SMTP, POP

IRC FTP

TCP Or UDP

IP, ARP,RARP,RIP or ICMP

Ethernet, PPP over telephone lines, Token Ring, FDDI or wireless

Cabling/telephone lines

TC

P/I

P s

uit

e o

f p

roto

cols

Applications

Operating System

Physical Network

Page 5: CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data

Application Protocols

Four common applications that uses the internet is Web browser, email, chat and FTP

Application Programming Interface (API) is used by the OS in order to request or send data to another host

For web browser and web servers, the OS generates Hypertext Transfer Protocol (HTTP) in order to communicate

A session is established after the response is received from the web server

Page 6: CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data

TCP/IP protocols used by OS for network communication

When a web browser make a request for a data to the web server, a packet is created and is ready to be delivered

Transmission Control Protocol (TCP) is the TCP/IP protocol that guarantees the packet is delivered and will resend if it fails

It is also called connection-oriented protocol and used for email and web browsers, s

While UDP (User Datagram Protocol) does not guarantee delivery by first connecting and checking whether data is received or not

Its called a connectionless protocol or best-effort protocol

Page 7: CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data

TCP/IP protocols used by OS for network communication Next, TCP & UDP pass the request to IP (Internet

Protocol) to breaks up and reassemble data into packets and routing them to respective destination

Other available network protocols; ARP (Address resolution Protocol)

Responsible to locate a host on a local network RARP (Reverse Address resolution Protocol)

Responsible for discovering the Internet Address of a host on a local network

ICMP (Internet Control Message Protocol) Responsible for communicating problem with transmission

Example of TCP/IP utilities ARP, Getmac, IPconfig,FTP,NBstat,Netstat, NSLookup Ping, route, telnet, tracert, winipcfg

Page 8: CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data

TCP/IP Utilities

Page 9: CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data

Connecting to the Internet

Computer or Local network can connect to Internet by ISP using following technologies;

1. Regular phone line - requires internal, external modem

2. Cable modem - uses cable lines3. DSL (Digital Subscriber Line) – uses copper phone

lines, same phone line for voice and DSL, Asymmetric SDL,Symmetric DSL

4. ISDN (Integrated Services Digital Network)5. Satellite access6. Wireless access

Page 10: CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data

Using Router Router is a device that manages traffic between

two network 2 major disadvantages of using host pc in sharing

internet connection1. Host comp must always be turned on2. Security issues

Advantages of using router rather than host pc1. Less bottleneck of the host pc2. Internet access not dependable to host pc3. Router can serve as hardware firewall, better protection

that software firewall4. Provide additional features such as DHCP server, switch,

wireless access point.

Page 11: CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data

Virtual Private Network (VPN) Solution for securing private data travelling over a public network is using

VPN VPN works by using encrypted data packets between a private network a

computer somewhere in the internet

Security methods with VPN User accounts and passwords are required, when the remote users sends

data to the authentication server, the data is encrypted using protocols such as EAP (Extensible Authentication Protocol), SPAP (Shiva Password Authentication Protocol) and others

After the user is authenticated, a tunnel is created so that all data sent between the user and the company is strongly encrypted

There are 4 tunnels protocol that can be used PPTP (Point to Point Tunneling Protocol) - weakest L2TP (Layer Two Tunneling Protocol) – strongest is combined with

IPSec SSL (Secure Socket Layer ) IPSec (IPSecurity)

Page 12: CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data

Supporting Internet Client

Web browser is a s/w application on client PC used to request web pages from the web server on the internet

URL (Uniform Resource Locator)

http://www.facebook.com/photo/mypic.php

Protocol

Domain Name

Network Name

Host Name

folder filename

Page 13: CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data

Using Secured Web Connection Using HTTPS (HTTP Secure) For Internet Banking or private business HTTP over SSL (Secure Socket Layer) or TSL (Transport Layer

Security) The purpose of these security protocols is to prevent others from

the internet to eavesdropping on data or change the data SSL – uses an encryption system that uses a digital certificate.

Public Keys are secret codes used to encrypt and decrypt the data. A digital certificate, or digital ID, digital signature is a code assigned to you by a certificate authority such as Verisign that uniquely identifies you on the net and includes a public key

TSL – improved version of SSL