SlideShare a Scribd company logo
LECTURE 2: UNDERSTANDING NETWORKS
Network Terminology Network Components Operating Systems on the Network The OSI Model and Networking Addressing on a Network How Data Travels on the Network: an Example
Network Adapter   Usually an expansion card called NIC (Network Interface Card) Network Protocol  A set of rules for network communications. Examples: OS protocols: TCP/IP, NetBEUI  Hardware protocols: Ethernet, Token Ring Segments, Packets, Datagrams  Small “chunks” of data that travel on network In the network media, the packets travel in  frames , which carry each data packet with a header and trailer to identify each packet
Lecture 2 -_understanding_networks_with_presenter_notes
Hardware: Network Interface Card (NIC)  Servers Workstations Hub, MAU, Concentrator, Switch Connectors Cable UPS Software: Operating Systems Applications Middleware
Lecture 2 -_understanding_networks_with_presenter_notes
Communications between computers require network OS(es) and network protocols. Functions of OS in a computer:  manage applications, hardware, and connection to the network. enabling the computers on the local area network (LAN) to share their resources Protocols specify network functionality. Using the same set of network protocols, different devices can communicate. The selected network protocol must be supported by every operating system on the network.
How resources are shared: peer-to-peer model : several computers using different operating systems in a small business or home can be connected to form a small LAN. client/server model , a.k.a.  domain model , a server is used to control which resources on the LAN are shared, and who can access these resources. Network OSes are used to manage resource sharing through mechanisms such as user account:  a collection of all of the information that pertains to a user on a computer authentication, validation,  or  logging on:  The process of entering a correct user ID and password to gain access to a computer
Windows 98 and Windows Me Windows NT Workstation, Windows 2000 Professional, Windows XP Linux Macintosh OSes e.g. Mac OS X
can be installed on a server and used to manage network resources, including user accounts, printers, and file sharing across the LAN. Windows NT Server, Windows NT Enterprise Server  Windows 2000 Windows Server 2003 Novell NetWare UNIX, Linux
Some criteria to consider when selecting a NOS are as follows: Reliability Performance Adaptability Affordability Security Scalability Ease of use and ease of installation
Lecture 2 -_understanding_networks_with_presenter_notes
In an effort to identify and standardize all the levels of communication needed in networking, ISO developed a networking model called the  Open Systems Interconnection (OSI) reference model . The OSI reference model provides a universally accepted reference illustrating how data is transmitted on a network or between two or more networked devices.
Lecture 2 -_understanding_networks_with_presenter_notes
Physical Layer Physical layer  is responsible for:  Passing data packets on to the cabling or wireless media  (whether the media be cabling or wireless). Data Link Layer Data Link layer  is responsible for:  Receiving packets of data from the Network layer and presenting them to the Physical layer  for transport. E.g: NIC (with firmware) When software is permanently embedded on a hardware device, it is called  firmware .
Network Layer Network layer  is responsible for:  Dividing a block of data into segments  that are small enough to travel over a network. Segments of data are called packets, data packets, or datagrams and contain data, along with special identifying information in headers and trailers at the beginning and end of the packet.
Transport Layer Transport layer  is responsible for:  Error checking  and  requests retransmission  of data if it detects errors. The Transport layer might or might not guarantee successful delivery of data (depends on the transport protocol used). Session Layer Session layer  is responsible for:  Establishing and maintaining a session between two networked stations or hosts. A  host  is any computer or other device on a network that has been assigned an IP address.
Presentation Layer Presentation layer  is responsible for:  receiving requests for files from the Application layer, and presents the requests to the Session layer. The Presentation layer  reformats, compresses, or encrypts data  as necessary. Application Layer The  Application layer  of the OSI model is responsible for interfacing with application software, such as Web browsers or Web servers.
The Web browser wants to make a request to a Web server, and processes the request using an API ( Application Program Interface  )call to the OS. The API process packages the data using HTTP format, which includes an HTTP header, and addresses it to an IP address and port 80, which is the default port for a Web server. Fig 5-33 An application asks the OS to do something using an API call
HTTP delivers the package to TCP, giving the destination IP address and port.
TCP hands the data off to IP, which resides in the network layer and is also managed by the OS.
The data with its header information is a long stream of bytes. IP breaks it into individual packets. IP adds its own IP header that contains its own IP address (source) and the server’s IP address (destination). IP passes the packets off to the hardware (NIC). Fig 5-36 IP divides data into packets, which are then released to the network
On the NIC, each packet is given information at its beginning and end in the form of frame. A  checksum  is calculated using a technique called  cyclical redundancy check (CRC) . Then each frame is sent off to the Ethernet cable. At the destination, the checksum is verified and passed to the IP layer to be regrouped.
IP then passes the reassembled data and header stream on to the TCP layer who acknowledges the TCP layer on the client.
The HTTP server, listening at port 80, receives the data and passes it on to the Web server.
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
TCP/IP covers the first five layers of the OSI model, and is included in an operating system as a group of utilities called the TCP/IP stack. Figure 5-41 shows the four major groupings of the OSI model as applied to TCP/IP networks.
Lecture 2 -_understanding_networks_with_presenter_notes
The first three layers of the OSI model are handled by the protocol specific to the application using it and are best treated as a single group rather than unique layers. The language or protocol each of these applications uses is listed at the Application, Presentation, and Session layers.
A TCP/IP network has two protocols that work at the Transport layer; one protocol guarantees delivery and the other does not. With TCP/IP, the protocol that guarantees delivery is TCP and the protocol that does not is  UDP (User Datagram Protocol) . TCP is used for client and server requests and responses.
Because TCP establishes a connection, it is called a  connection-oriented protocol . UDP is a protocol that sends data without caring about whether the data is received. It does not establish a connection first; thus, it is called a  connectionless  protocol.
TCP and UDP communicate with the Network layer, which is sometimes called the Internet layer. Some of the other supporting protocols include  ARP (Address Resolution Protocol) , responsible for locating a host on a LAN;  RARP (Reverse Address Resolution Protocol) , responsible for discovering the Internet address of a host on a LAN; and  ICMP (Internet Control Message Protocol) , responsible for communicating problems with transmission to devices that need to know about these problems.
PPP (Point-to-Point Protocol)  is used over telephone lines, and allows a computer to connect to a network using a modem. PPP is the most popular protocol for managing network transmission from one modem to another.
Lecture 2 -_understanding_networks_with_presenter_notes
MAC addresses function at the lowest (Data Link) networking level. If a host does not know the MAC address of another host on a local area network, it uses the operating system to discover the MAC address.
All the protocols of the TCP/IP suite identify a device on the Internet or an intranet by its IP address. An IP address is 32 bits long, made up of 4 bytes separated by periods. Within an IP address, each of the four numbers separated by periods is called an  octet . The first part of an IP address identifies the network, and the last part identifies the host.
IP addresses that can be used by companies and individuals are divided into three classes: Class A, Class B, and Class C, based on the number of possible IP addresses in each network within each class. The group of IP addresses assigned to an organization are unique to all other IP addresses on the Internet and are available for use on the Internet. The IP addresses available to the Internet are called  public IP addresses .
Private IP addresses  are IP addresses that are assigned by a network administrator for use on private intranets that are isolated from the Internet. The RFC 1918 recommends that the following IP addresses be used for private networks: 10.0.0.0 through 10.255.255.255 172.16.0.0 through 172.31.255.255 192.168.0.0 through 192. 168. 255.255
Instead of IP addresses permanently being assigned to computers (called  static IP addresses ), an IP address is assigned for the current session only (called a  dynamic IP address ). Internet service providers (ISPs)  are organizations through which individuals and businesses connect to the Internet.
If the hosts on a network using private IP addresses need to access the Internet, a problem arises because the private IP addresses are not allowed on the Internet. The solution is to use  NAT (Network Address Translation) , which uses a single public IP address to access the Internet on behalf of all hosts on the network using other IP addresses.
Because of an impending shortage of IP addresses, as well as some limitations in the current standards for IP, a new scheme of IP addresses called the  IPv6 (IP version 6)  standard is currently being developed and implemented.  Current IP addresses using the current IPv4 (IP version 4) have 32 bits with eight bits in each of four octets.
With the new system, each address segment can have 32 bits, for a total of 128 bits for the entire address. A disadvantage of IPv6 is the fact that so much software used on the Internet would become outdated because current software is designed to hold 32-bit IP addresses and, with the new system, this number would no longer be sufficient.
A port is a number used to address software or services running on a computer. A host computer might have several services running on it. Each server running on the host is assigned a port. The port is written at the end of the IP address, separated from the IP address with a colon—like this: 169.49.209.19:80

More Related Content

PPT
Osi , tcp/ip protocol and Addressing
marwan aldulaimy
 
PPT
Chapter04 -- network protocols
Raja Waseem Akhtar
 
DOCX
Protocols in computer network
priya sehgal
 
PDF
IP ADDRESSING AND SUBNETTING REPORT
Rajat Kumar
 
PPTX
Internet Protocols
Ramakrishna Kongalla
 
PPTX
Internet Protocols
Mohamed Daif
 
DOCX
Report of TCP/IP
Mannu Khani
 
PPT
TCP/IP Network ppt
extraganesh
 
Osi , tcp/ip protocol and Addressing
marwan aldulaimy
 
Chapter04 -- network protocols
Raja Waseem Akhtar
 
Protocols in computer network
priya sehgal
 
IP ADDRESSING AND SUBNETTING REPORT
Rajat Kumar
 
Internet Protocols
Ramakrishna Kongalla
 
Internet Protocols
Mohamed Daif
 
Report of TCP/IP
Mannu Khani
 
TCP/IP Network ppt
extraganesh
 

What's hot (20)

PDF
Advanced computer network lab manual (practicals in Cisco Packet tracer)
VrundaBhavsar
 
PPT
Exploration network chapter_5_modified
rajesh531
 
PPTX
TCP IP Model | Computer Science
Transweb Global Inc
 
PPT
Comparison and Contrast between OSI and TCP/IP Model
Conferencias FIST
 
PPTX
OSI model and TCP/IP model
Rubal Sagwal
 
PDF
53426980 tcp-ip
Sharan Huggi
 
PPTX
TCP/IP Model
farhan516
 
PPT
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
Saikiran Panjala
 
PPT
FEGTS IP training - TCP/IP Introduction
Kae Hsu
 
PDF
Basic ip and networking ver 3 kl
Azhar Ali
 
DOCX
Iap final
GLIM Digital
 
PPT
Fundamentals of Networking
Israel Marcus
 
DOCX
Osi model
GLIM Digital
 
PPTX
Protocols
Sonali Chawla
 
PPTX
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
Tutun Juhana
 
PPTX
Internet protocol
Bint Javed
 
PDF
Tcpip tutorial
Rajeshbabu88
 
PPT
Osi
Hardball0101
 
PPTX
Slides for protocol layering and network applications
jajinekkanti
 
PPTX
Addressing in networking (IP,MAC,Port addressing)
Geethu Jose
 
Advanced computer network lab manual (practicals in Cisco Packet tracer)
VrundaBhavsar
 
Exploration network chapter_5_modified
rajesh531
 
TCP IP Model | Computer Science
Transweb Global Inc
 
Comparison and Contrast between OSI and TCP/IP Model
Conferencias FIST
 
OSI model and TCP/IP model
Rubal Sagwal
 
53426980 tcp-ip
Sharan Huggi
 
TCP/IP Model
farhan516
 
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
Saikiran Panjala
 
FEGTS IP training - TCP/IP Introduction
Kae Hsu
 
Basic ip and networking ver 3 kl
Azhar Ali
 
Iap final
GLIM Digital
 
Fundamentals of Networking
Israel Marcus
 
Osi model
GLIM Digital
 
Protocols
Sonali Chawla
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
Tutun Juhana
 
Internet protocol
Bint Javed
 
Tcpip tutorial
Rajeshbabu88
 
Slides for protocol layering and network applications
jajinekkanti
 
Addressing in networking (IP,MAC,Port addressing)
Geethu Jose
 
Ad

Viewers also liked (12)

PPT
Lecture 1 -_overview_of_the_internet-1-
Serious_SamSoul
 
PPT
Lecture 3 -_internet_infrastructure_updated_2011
Serious_SamSoul
 
PPT
Lecture 1 -_overview_of_the_internet-1-
Serious_SamSoul
 
PPT
Lecture 4 -_internet_infrastructure_2_updated_2011
Serious_SamSoul
 
PDF
Lecture 12 -_internet_security
Serious_SamSoul
 
PPT
Lecture 5 internet-protocol_assignments
Serious_SamSoul
 
PDF
Lecture 13 -_e-commmerce_e-banking_and_advanced_tech
Serious_SamSoul
 
PDF
Lecture 9 electronic_mail_representation_and_transfer
Serious_SamSoul
 
PDF
Lecture 11 client_server_interaction
Serious_SamSoul
 
PPT
Lecture 6 -_presentation_layer
Serious_SamSoul
 
PDF
Lecture 7 -_ftp,_tftp,_telnet_and_ssh
Serious_SamSoul
 
PDF
서버 성능에 대한 정의와 이해
중선 곽
 
Lecture 1 -_overview_of_the_internet-1-
Serious_SamSoul
 
Lecture 3 -_internet_infrastructure_updated_2011
Serious_SamSoul
 
Lecture 1 -_overview_of_the_internet-1-
Serious_SamSoul
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Serious_SamSoul
 
Lecture 12 -_internet_security
Serious_SamSoul
 
Lecture 5 internet-protocol_assignments
Serious_SamSoul
 
Lecture 13 -_e-commmerce_e-banking_and_advanced_tech
Serious_SamSoul
 
Lecture 9 electronic_mail_representation_and_transfer
Serious_SamSoul
 
Lecture 11 client_server_interaction
Serious_SamSoul
 
Lecture 6 -_presentation_layer
Serious_SamSoul
 
Lecture 7 -_ftp,_tftp,_telnet_and_ssh
Serious_SamSoul
 
서버 성능에 대한 정의와 이해
중선 곽
 
Ad

Similar to Lecture 2 -_understanding_networks_with_presenter_notes (20)

PPTX
OSI model.pptx
SmtArunaAsafAliGovtP
 
PDF
Lecture 2 -_understanding_networks_2013
Travis Leong Ping
 
PPT
Session 2 Tp 2
githe26200
 
PPTX
chapter 4.pptx
shucaybcabdi
 
DOCX
Cisco doc
Prakash V
 
PDF
Automation and Robotics 20ME51I_Week_3_Practicals.pdf
Gandhibabu8
 
PPTX
computer network and chapter 7 OSI layers.pptx
gadisaAdamu
 
PPTX
Know the advantages and disadvantages of peer-to-peer network and a server-ba...
ekwinsi
 
PPTX
Tcp
Sudhaa Ravi
 
PPT
Week 2
arslan_akbar90
 
PDF
Report on ip addresses
Amandeep Kaur
 
DOC
IP Address
Sukhdeep Kaur
 
PPTX
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha
 
PPTX
Internet basics and Cloud Computing- Manish Jha
manish jha
 
PPT
The Internet and World Wide Web
webhostingguy
 
PPTX
Computer networking
Mahbubur Rahman Shimul
 
PPTX
Networking fundamentals
The Avi Sharma
 
PPTX
Computer Networks 3
Mr Smith
 
PPT
Concept of networking
sumit dimri
 
PPTX
Internet Protocols
EILLEN IVY PORTUGUEZ
 
OSI model.pptx
SmtArunaAsafAliGovtP
 
Lecture 2 -_understanding_networks_2013
Travis Leong Ping
 
Session 2 Tp 2
githe26200
 
chapter 4.pptx
shucaybcabdi
 
Cisco doc
Prakash V
 
Automation and Robotics 20ME51I_Week_3_Practicals.pdf
Gandhibabu8
 
computer network and chapter 7 OSI layers.pptx
gadisaAdamu
 
Know the advantages and disadvantages of peer-to-peer network and a server-ba...
ekwinsi
 
Report on ip addresses
Amandeep Kaur
 
IP Address
Sukhdeep Kaur
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha
 
Internet basics and Cloud Computing- Manish Jha
manish jha
 
The Internet and World Wide Web
webhostingguy
 
Computer networking
Mahbubur Rahman Shimul
 
Networking fundamentals
The Avi Sharma
 
Computer Networks 3
Mr Smith
 
Concept of networking
sumit dimri
 
Internet Protocols
EILLEN IVY PORTUGUEZ
 

Recently uploaded (20)

PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
PDF
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
PPTX
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
PPTX
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
PPTX
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
PPTX
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
DOCX
Action Plan_ARAL PROGRAM_ STAND ALONE SHS.docx
Levenmartlacuna1
 
PPTX
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
PPTX
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
PPTX
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
PPTX
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
PPTX
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PPTX
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
PPTX
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
PPTX
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
PPTX
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
PPTX
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
PDF
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
PPTX
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
Action Plan_ARAL PROGRAM_ STAND ALONE SHS.docx
Levenmartlacuna1
 
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 

Lecture 2 -_understanding_networks_with_presenter_notes

  • 2. Network Terminology Network Components Operating Systems on the Network The OSI Model and Networking Addressing on a Network How Data Travels on the Network: an Example
  • 3. Network Adapter Usually an expansion card called NIC (Network Interface Card) Network Protocol A set of rules for network communications. Examples: OS protocols: TCP/IP, NetBEUI Hardware protocols: Ethernet, Token Ring Segments, Packets, Datagrams Small “chunks” of data that travel on network In the network media, the packets travel in frames , which carry each data packet with a header and trailer to identify each packet
  • 5. Hardware: Network Interface Card (NIC) Servers Workstations Hub, MAU, Concentrator, Switch Connectors Cable UPS Software: Operating Systems Applications Middleware
  • 7. Communications between computers require network OS(es) and network protocols. Functions of OS in a computer: manage applications, hardware, and connection to the network. enabling the computers on the local area network (LAN) to share their resources Protocols specify network functionality. Using the same set of network protocols, different devices can communicate. The selected network protocol must be supported by every operating system on the network.
  • 8. How resources are shared: peer-to-peer model : several computers using different operating systems in a small business or home can be connected to form a small LAN. client/server model , a.k.a. domain model , a server is used to control which resources on the LAN are shared, and who can access these resources. Network OSes are used to manage resource sharing through mechanisms such as user account: a collection of all of the information that pertains to a user on a computer authentication, validation, or logging on: The process of entering a correct user ID and password to gain access to a computer
  • 9. Windows 98 and Windows Me Windows NT Workstation, Windows 2000 Professional, Windows XP Linux Macintosh OSes e.g. Mac OS X
  • 10. can be installed on a server and used to manage network resources, including user accounts, printers, and file sharing across the LAN. Windows NT Server, Windows NT Enterprise Server Windows 2000 Windows Server 2003 Novell NetWare UNIX, Linux
  • 11. Some criteria to consider when selecting a NOS are as follows: Reliability Performance Adaptability Affordability Security Scalability Ease of use and ease of installation
  • 13. In an effort to identify and standardize all the levels of communication needed in networking, ISO developed a networking model called the Open Systems Interconnection (OSI) reference model . The OSI reference model provides a universally accepted reference illustrating how data is transmitted on a network or between two or more networked devices.
  • 15. Physical Layer Physical layer is responsible for: Passing data packets on to the cabling or wireless media (whether the media be cabling or wireless). Data Link Layer Data Link layer is responsible for: Receiving packets of data from the Network layer and presenting them to the Physical layer for transport. E.g: NIC (with firmware) When software is permanently embedded on a hardware device, it is called firmware .
  • 16. Network Layer Network layer is responsible for: Dividing a block of data into segments that are small enough to travel over a network. Segments of data are called packets, data packets, or datagrams and contain data, along with special identifying information in headers and trailers at the beginning and end of the packet.
  • 17. Transport Layer Transport layer is responsible for: Error checking and requests retransmission of data if it detects errors. The Transport layer might or might not guarantee successful delivery of data (depends on the transport protocol used). Session Layer Session layer is responsible for: Establishing and maintaining a session between two networked stations or hosts. A host is any computer or other device on a network that has been assigned an IP address.
  • 18. Presentation Layer Presentation layer is responsible for: receiving requests for files from the Application layer, and presents the requests to the Session layer. The Presentation layer reformats, compresses, or encrypts data as necessary. Application Layer The Application layer of the OSI model is responsible for interfacing with application software, such as Web browsers or Web servers.
  • 19. The Web browser wants to make a request to a Web server, and processes the request using an API ( Application Program Interface )call to the OS. The API process packages the data using HTTP format, which includes an HTTP header, and addresses it to an IP address and port 80, which is the default port for a Web server. Fig 5-33 An application asks the OS to do something using an API call
  • 20. HTTP delivers the package to TCP, giving the destination IP address and port.
  • 21. TCP hands the data off to IP, which resides in the network layer and is also managed by the OS.
  • 22. The data with its header information is a long stream of bytes. IP breaks it into individual packets. IP adds its own IP header that contains its own IP address (source) and the server’s IP address (destination). IP passes the packets off to the hardware (NIC). Fig 5-36 IP divides data into packets, which are then released to the network
  • 23. On the NIC, each packet is given information at its beginning and end in the form of frame. A checksum is calculated using a technique called cyclical redundancy check (CRC) . Then each frame is sent off to the Ethernet cable. At the destination, the checksum is verified and passed to the IP layer to be regrouped.
  • 24. IP then passes the reassembled data and header stream on to the TCP layer who acknowledges the TCP layer on the client.
  • 25. The HTTP server, listening at port 80, receives the data and passes it on to the Web server.
  • 28. TCP/IP covers the first five layers of the OSI model, and is included in an operating system as a group of utilities called the TCP/IP stack. Figure 5-41 shows the four major groupings of the OSI model as applied to TCP/IP networks.
  • 30. The first three layers of the OSI model are handled by the protocol specific to the application using it and are best treated as a single group rather than unique layers. The language or protocol each of these applications uses is listed at the Application, Presentation, and Session layers.
  • 31. A TCP/IP network has two protocols that work at the Transport layer; one protocol guarantees delivery and the other does not. With TCP/IP, the protocol that guarantees delivery is TCP and the protocol that does not is UDP (User Datagram Protocol) . TCP is used for client and server requests and responses.
  • 32. Because TCP establishes a connection, it is called a connection-oriented protocol . UDP is a protocol that sends data without caring about whether the data is received. It does not establish a connection first; thus, it is called a connectionless protocol.
  • 33. TCP and UDP communicate with the Network layer, which is sometimes called the Internet layer. Some of the other supporting protocols include ARP (Address Resolution Protocol) , responsible for locating a host on a LAN; RARP (Reverse Address Resolution Protocol) , responsible for discovering the Internet address of a host on a LAN; and ICMP (Internet Control Message Protocol) , responsible for communicating problems with transmission to devices that need to know about these problems.
  • 34. PPP (Point-to-Point Protocol) is used over telephone lines, and allows a computer to connect to a network using a modem. PPP is the most popular protocol for managing network transmission from one modem to another.
  • 36. MAC addresses function at the lowest (Data Link) networking level. If a host does not know the MAC address of another host on a local area network, it uses the operating system to discover the MAC address.
  • 37. All the protocols of the TCP/IP suite identify a device on the Internet or an intranet by its IP address. An IP address is 32 bits long, made up of 4 bytes separated by periods. Within an IP address, each of the four numbers separated by periods is called an octet . The first part of an IP address identifies the network, and the last part identifies the host.
  • 38. IP addresses that can be used by companies and individuals are divided into three classes: Class A, Class B, and Class C, based on the number of possible IP addresses in each network within each class. The group of IP addresses assigned to an organization are unique to all other IP addresses on the Internet and are available for use on the Internet. The IP addresses available to the Internet are called public IP addresses .
  • 39. Private IP addresses are IP addresses that are assigned by a network administrator for use on private intranets that are isolated from the Internet. The RFC 1918 recommends that the following IP addresses be used for private networks: 10.0.0.0 through 10.255.255.255 172.16.0.0 through 172.31.255.255 192.168.0.0 through 192. 168. 255.255
  • 40. Instead of IP addresses permanently being assigned to computers (called static IP addresses ), an IP address is assigned for the current session only (called a dynamic IP address ). Internet service providers (ISPs) are organizations through which individuals and businesses connect to the Internet.
  • 41. If the hosts on a network using private IP addresses need to access the Internet, a problem arises because the private IP addresses are not allowed on the Internet. The solution is to use NAT (Network Address Translation) , which uses a single public IP address to access the Internet on behalf of all hosts on the network using other IP addresses.
  • 42. Because of an impending shortage of IP addresses, as well as some limitations in the current standards for IP, a new scheme of IP addresses called the IPv6 (IP version 6) standard is currently being developed and implemented. Current IP addresses using the current IPv4 (IP version 4) have 32 bits with eight bits in each of four octets.
  • 43. With the new system, each address segment can have 32 bits, for a total of 128 bits for the entire address. A disadvantage of IPv6 is the fact that so much software used on the Internet would become outdated because current software is designed to hold 32-bit IP addresses and, with the new system, this number would no longer be sufficient.
  • 44. A port is a number used to address software or services running on a computer. A host computer might have several services running on it. Each server running on the host is assigned a port. The port is written at the end of the IP address, separated from the IP address with a colon—like this: 169.49.209.19:80

Editor's Notes

  • #4: Application : Data Presentation : Data Session : Data Transport : Segment Network : Packet Data Link : Frame Physical : Bit
  • #8: Different protocols offer different format/ service. Example: Server 10.1.1.1 Use HTTP to access Web Use FTP to access File Sharing
  • #12: Reliability | Ketahanan : The ability of the OS to stably perform in any condition. Recover from any failures Performance| Prestasi : The ability of the OS to serve the clients in a seamless way. Adaptability | Kebolehsuaian: The ability of the OS to adapt to the request of different platforms Security | Keselamatan : The hardness/ ability of the OS to eliminate and repel threats. Scalability | :  The ability of the OS to continue to function well when it is changed in size or volume in order to meet a user need/ migrate to other network technologies.
  • #14: There are a lot of OS platforms/ network device developers that uses the Internet: Apple OS X, Windows, Linux, Unix, Sun Cisco, 3Com, Huawei There must be a standard so that these OSs/devices can communicate.