SlideShare a Scribd company logo
1 of 30
Download to read offline
Introduction to networking
Laura Perret – University of Neuchâtel

Educational Course on DICOM-RT
13th June 2003
Outline
n Computer network or distributed system
n Why are networks useful ?
n Client/server and peer-to-peer models
n Layers model (network architecture)
n TCP / IP
n How HTTP works ?



                                           2
Computer network
n Collection of autonomous interconnected
  computers.
n Hardware with operating system, like
  Windows, Unix, MacOS, etc.
n Example : computers in a company
n Internet is not exactly a computer network
  but a network of networks.

                                               3
Distributed system
n Collection of independent computers
  appearing to its users as a single coherent
  system.
n Software system built on top of a network.
n Example : World Wide Web




                                            4
Why are networks useful ?
n Business applications
n Home applications
n Mobile users




                                5
Business applications
n Resource sharing
  e.g. shared printer, shared scanner, etc.
n Information sharing
  e.g. clients database, Medline, etc.
n Communication medium among people
  e.g. e-mail, videoconferencing, etc.
n E-business
  e.g. B2C, B2B, etc.
                                              6
Home applications
Internet access
n Access to remote information
  e.g. online journals, newspapers, etc.
n Person-to-person communication
  e.g. e-mail, chat, etc.
n Interactive entertainment
  e.g. video on demand, game playing, etc.
n E-commerce
  e.g. e-shopping, e-banking, etc.
                                             7
Mobile users
n Mobile people using notebook computers.
n Portable office, like e-mail, access remote
  files, log on to remote machines, etc.
n Mobile phones with WAP (Wireless
  Application Protocol) system.
n Portable payment system for credit cards.
n M-commerce (mobile commerce).


                                                8
Client-server model
n A server is a powerful computer
  containing data. It is housed and
  maintained by a system administrator.
n A client is a common computer used to
  access remote data.
n Clients and servers are connected by a
  network.


                                           9
Client-server model
n The client sends a request over the
  network to the server.
n The server gets the request, does the job
  and sends back a reply.
n Example : access a page on the Web
    n Server : remote Web server
    n Client : Web browser



                                              10
Peer-to-peer model
n   Every person can communicate with one or
    more other people.
n   Example : Napster for music exchange
    n   Members registered their songs lists in Napster
        database.
    n   Users checked Napster database to find out who had
        the requested song and then got it directly from
        there.
    n   Napster was shot down because it infringed
        copyright.

                                                         11
Use of computer networks
n   Monolithic view : one single huge program
    to manage all communications.
    n Hard to create
    n Too complex to be maintained
    n Too many different programs

n   Structured view : using different layers to
    manage all communications.
    n   General idea : divide and conquer

                                                  12
Layers model
n   Networks are organized as a stack of levels or
    layers (network architecture).
n   Each layer offers certain services to the upper
    layer.
n   The layer n on host A communicates with the
    layer n on host B using the layer n protocol.
n   A protocol is an agreement between
    communicating parties on how communication
    is to proceed.

                                                      13
Example




          14
Layers model




               15
TCP / IP
n ARPANET (Advanced Research Projects
  Agency Network) was a research network
  sponsored by the DoD (U.S. Department
  of Defence), 21/11/1969 UCLA-Stanford.
n It became TCP / IP (Transmission Control
  Protocol / Internet Protocol) Reference
  Model in 1974.
n ARPANET used TCP / IP on 1/1/1983.

                                         16
TCP / IP
The main goals were
n Ability to connect multiple and
  heterogeneous computers and networks.
n Ability to survive loss of subnet hardware.




                                            17
TCP / IP layer model


        Application

         Transport

         Internet

      Host-to-network




                        18
Host-to-network layer
n Main service : transfer data on physical
  medium
n LAN (Local Area Network)
n Ethernet is one implementation
  (R. Metcalfe, 1973, Xerox)




                                             19
Internet layer
n Main service : packet routing
n Permit packets to be sent into any
  network (IP over everything)
n IP (Internet Protocol) is the official packet
  format and protocol




                                                  20
Internet Protocol
n   An IP number (also called IP address) identifies
    a machine on the network.
n   A machine may host several applications. Each
    application is accessible via a communication
    port.
n   To send data to an application running on a
    specific machine, the IP number and the
    application port number are required.
n   A socket is a pair <IP number, port number>

                                                   21
Transport layer
n Main services : rearrange packets in
  original order and error control
n TCP (Transmission Control Protocol) is a
  reliable connection-oriented protocol




                                             22
Application layer
n Main service : user applications
n High-level protocols
    n FTP (File Transfer Protocol)
    n HTTP (HyperText Transfer Protocol)
    n SMTP (Simple Mail Transfer Protocol)
    n Etc.




                                             23
HTTP
n The Web (World Wide Web or www) was
  invented at CERN in 1989.
n The Web is a huge distributed system with
  millions of clients and servers based on a
  simple interface (NCSA Mosaic 1993).
n HTTP (HyperText Transfer Protocol) is a
  protocol for fetching pages on the Web.


                                          24
How HTTP works ?
n The URL (Uniform Resource Locator)
  http://www.unine.ch is typed in the
  browser.
n Ann would like to call Bob but doesn’t
  know his phone number.
n The browser asks the DNS (Domain
  Name Service) for the IP address.
n Ann calls the directory service (111) to
  ask for Bob’s phone number.
                                             25
How HTTP works ?
n The DNS replies with 130.125.1.11
n The directory service replies with
  +41 32 718 00 00
n The browser makes a TCP connection to
  port 80 on 130.125.1.11
n Ann dials the +41 32 718 00 00




                                          26
How HTTP works ?
n The browser asks for file /console.asp
n Ann says « Hello Bob, are you coming for
  dinner tonight ? »
n The www.unine.ch server sends the file
  /console.asp
n Bob answers « Hi Ann, yes, I’m coming. »




                                         27
How HTTP works ?
n The TCP connection is released.
n When the conversation is over, Ann and
  Bob hang up and the connection is
  released.
n The browser displays the received Web
  page.



                                           28
Conclusion
n TCP / IP will remain the standard for WAN
  (Wide Area Network).
n Mobile and wireless (for LAN ?)
n Security is still a major issue
n Metcalfe’s law : utility of a network
  Utility (N) = N2 , N = number of users


                                          29
More on this topic ?
n Computer Networks,
  A. Tanenbaum, Prentice Hall, 2003
n Data and Computer Communications,
  W. Stallings, Prentice Hall, 2003
n http://www.vitels.ch/
n http://courses.cs.vt.edu/~cs4254/
n http://courses.cs.vt.edu/~cs5516/


                                      30

More Related Content

What's hot

Chapter1- Introduction to Computers and the Internet
Chapter1- Introduction to Computers and the InternetChapter1- Introduction to Computers and the Internet
Chapter1- Introduction to Computers and the InternetFatom Ahmad
 
Networking Models
Networking ModelsNetworking Models
Networking ModelsAftab Mirza
 
Network Protocols
Network ProtocolsNetwork Protocols
Network Protocolssbmiller87
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet ProtocolsMohamed Daif
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocolGLIM Digital
 
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALAINTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALASaikiran Panjala
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network priya sehgal
 
Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the InternetAdjeiKwadjo
 
Lecture 02 fundamental concepts of internet and www khalid khan
Lecture 02 fundamental concepts of internet and www khalid khanLecture 02 fundamental concepts of internet and www khalid khan
Lecture 02 fundamental concepts of internet and www khalid khanKhalid Khan
 
Low orbit ion cannon
Low orbit ion cannonLow orbit ion cannon
Low orbit ion cannoncutiewolfie
 

What's hot (19)

Chapter1- Introduction to Computers and the Internet
Chapter1- Introduction to Computers and the InternetChapter1- Introduction to Computers and the Internet
Chapter1- Introduction to Computers and the Internet
 
Internet
InternetInternet
Internet
 
Ch02 e commerce
Ch02 e commerceCh02 e commerce
Ch02 e commerce
 
Networking Models
Networking ModelsNetworking Models
Networking Models
 
Computer network
Computer networkComputer network
Computer network
 
Network Protocols
Network ProtocolsNetwork Protocols
Network Protocols
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
 
Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
Ecommerce Chap 11
Ecommerce Chap 11Ecommerce Chap 11
Ecommerce Chap 11
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
 
Networks
NetworksNetworks
Networks
 
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALAINTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
 
Arpanet.53
Arpanet.53Arpanet.53
Arpanet.53
 
It unit 1
It   unit 1It   unit 1
It unit 1
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the Internet
 
Lecture 02 fundamental concepts of internet and www khalid khan
Lecture 02 fundamental concepts of internet and www khalid khanLecture 02 fundamental concepts of internet and www khalid khan
Lecture 02 fundamental concepts of internet and www khalid khan
 
Low orbit ion cannon
Low orbit ion cannonLow orbit ion cannon
Low orbit ion cannon
 

Similar to Introdution to networking

Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)nnmaurya
 
Internet
InternetInternet
InternetLavanya
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer NetworkingMasudurRahmanSourav
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Gaurav Mehndiratta
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Ishant Tiwari
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital SecurityLindsey Jones
 
The Internet and the World Wide Web
The Internet and the World Wide WebThe Internet and the World Wide Web
The Internet and the World Wide Webdpd
 
E-business Infrastructure and Security
E-business Infrastructure and SecurityE-business Infrastructure and Security
E-business Infrastructure and SecurityKimmy Chen
 
Internet Appendix A
Internet Appendix AInternet Appendix A
Internet Appendix Adpd
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applicationsjajinekkanti
 
Computer networks short note (version 8)
Computer networks short note (version 8)Computer networks short note (version 8)
Computer networks short note (version 8)Nimmi Weeraddana
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYGOKUL SREE
 
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSbadri narayan
 
Lecture16.pdf
Lecture16.pdfLecture16.pdf
Lecture16.pdfJoyPalit
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IPMichael Lamont
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationsAnyapuPranav
 
1. introduction data comm
1. introduction data comm1. introduction data comm
1. introduction data commHumayoun Kabir
 

Similar to Introdution to networking (20)

Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
 
Internet
InternetInternet
Internet
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital Security
 
The Internet and the World Wide Web
The Internet and the World Wide WebThe Internet and the World Wide Web
The Internet and the World Wide Web
 
E-business Infrastructure and Security
E-business Infrastructure and SecurityE-business Infrastructure and Security
E-business Infrastructure and Security
 
Internet Appendix A
Internet Appendix AInternet Appendix A
Internet Appendix A
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
 
Computer networks short note (version 8)
Computer networks short note (version 8)Computer networks short note (version 8)
Computer networks short note (version 8)
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
 
The Fundamentals of the Internet
The Fundamentals of the InternetThe Fundamentals of the Internet
The Fundamentals of the Internet
 
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
 
Lecture16.pdf
Lecture16.pdfLecture16.pdf
Lecture16.pdf
 
COMPUTER NETWORKS.pptx
COMPUTER NETWORKS.pptxCOMPUTER NETWORKS.pptx
COMPUTER NETWORKS.pptx
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
Chapter1.pdf
Chapter1.pdfChapter1.pdf
Chapter1.pdf
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
 
1. introduction data comm
1. introduction data comm1. introduction data comm
1. introduction data comm
 

Recently uploaded

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Recently uploaded (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Introdution to networking

  • 1. Introduction to networking Laura Perret – University of Neuchâtel Educational Course on DICOM-RT 13th June 2003
  • 2. Outline n Computer network or distributed system n Why are networks useful ? n Client/server and peer-to-peer models n Layers model (network architecture) n TCP / IP n How HTTP works ? 2
  • 3. Computer network n Collection of autonomous interconnected computers. n Hardware with operating system, like Windows, Unix, MacOS, etc. n Example : computers in a company n Internet is not exactly a computer network but a network of networks. 3
  • 4. Distributed system n Collection of independent computers appearing to its users as a single coherent system. n Software system built on top of a network. n Example : World Wide Web 4
  • 5. Why are networks useful ? n Business applications n Home applications n Mobile users 5
  • 6. Business applications n Resource sharing e.g. shared printer, shared scanner, etc. n Information sharing e.g. clients database, Medline, etc. n Communication medium among people e.g. e-mail, videoconferencing, etc. n E-business e.g. B2C, B2B, etc. 6
  • 7. Home applications Internet access n Access to remote information e.g. online journals, newspapers, etc. n Person-to-person communication e.g. e-mail, chat, etc. n Interactive entertainment e.g. video on demand, game playing, etc. n E-commerce e.g. e-shopping, e-banking, etc. 7
  • 8. Mobile users n Mobile people using notebook computers. n Portable office, like e-mail, access remote files, log on to remote machines, etc. n Mobile phones with WAP (Wireless Application Protocol) system. n Portable payment system for credit cards. n M-commerce (mobile commerce). 8
  • 9. Client-server model n A server is a powerful computer containing data. It is housed and maintained by a system administrator. n A client is a common computer used to access remote data. n Clients and servers are connected by a network. 9
  • 10. Client-server model n The client sends a request over the network to the server. n The server gets the request, does the job and sends back a reply. n Example : access a page on the Web n Server : remote Web server n Client : Web browser 10
  • 11. Peer-to-peer model n Every person can communicate with one or more other people. n Example : Napster for music exchange n Members registered their songs lists in Napster database. n Users checked Napster database to find out who had the requested song and then got it directly from there. n Napster was shot down because it infringed copyright. 11
  • 12. Use of computer networks n Monolithic view : one single huge program to manage all communications. n Hard to create n Too complex to be maintained n Too many different programs n Structured view : using different layers to manage all communications. n General idea : divide and conquer 12
  • 13. Layers model n Networks are organized as a stack of levels or layers (network architecture). n Each layer offers certain services to the upper layer. n The layer n on host A communicates with the layer n on host B using the layer n protocol. n A protocol is an agreement between communicating parties on how communication is to proceed. 13
  • 14. Example 14
  • 16. TCP / IP n ARPANET (Advanced Research Projects Agency Network) was a research network sponsored by the DoD (U.S. Department of Defence), 21/11/1969 UCLA-Stanford. n It became TCP / IP (Transmission Control Protocol / Internet Protocol) Reference Model in 1974. n ARPANET used TCP / IP on 1/1/1983. 16
  • 17. TCP / IP The main goals were n Ability to connect multiple and heterogeneous computers and networks. n Ability to survive loss of subnet hardware. 17
  • 18. TCP / IP layer model Application Transport Internet Host-to-network 18
  • 19. Host-to-network layer n Main service : transfer data on physical medium n LAN (Local Area Network) n Ethernet is one implementation (R. Metcalfe, 1973, Xerox) 19
  • 20. Internet layer n Main service : packet routing n Permit packets to be sent into any network (IP over everything) n IP (Internet Protocol) is the official packet format and protocol 20
  • 21. Internet Protocol n An IP number (also called IP address) identifies a machine on the network. n A machine may host several applications. Each application is accessible via a communication port. n To send data to an application running on a specific machine, the IP number and the application port number are required. n A socket is a pair <IP number, port number> 21
  • 22. Transport layer n Main services : rearrange packets in original order and error control n TCP (Transmission Control Protocol) is a reliable connection-oriented protocol 22
  • 23. Application layer n Main service : user applications n High-level protocols n FTP (File Transfer Protocol) n HTTP (HyperText Transfer Protocol) n SMTP (Simple Mail Transfer Protocol) n Etc. 23
  • 24. HTTP n The Web (World Wide Web or www) was invented at CERN in 1989. n The Web is a huge distributed system with millions of clients and servers based on a simple interface (NCSA Mosaic 1993). n HTTP (HyperText Transfer Protocol) is a protocol for fetching pages on the Web. 24
  • 25. How HTTP works ? n The URL (Uniform Resource Locator) http://www.unine.ch is typed in the browser. n Ann would like to call Bob but doesn’t know his phone number. n The browser asks the DNS (Domain Name Service) for the IP address. n Ann calls the directory service (111) to ask for Bob’s phone number. 25
  • 26. How HTTP works ? n The DNS replies with 130.125.1.11 n The directory service replies with +41 32 718 00 00 n The browser makes a TCP connection to port 80 on 130.125.1.11 n Ann dials the +41 32 718 00 00 26
  • 27. How HTTP works ? n The browser asks for file /console.asp n Ann says « Hello Bob, are you coming for dinner tonight ? » n The www.unine.ch server sends the file /console.asp n Bob answers « Hi Ann, yes, I’m coming. » 27
  • 28. How HTTP works ? n The TCP connection is released. n When the conversation is over, Ann and Bob hang up and the connection is released. n The browser displays the received Web page. 28
  • 29. Conclusion n TCP / IP will remain the standard for WAN (Wide Area Network). n Mobile and wireless (for LAN ?) n Security is still a major issue n Metcalfe’s law : utility of a network Utility (N) = N2 , N = number of users 29
  • 30. More on this topic ? n Computer Networks, A. Tanenbaum, Prentice Hall, 2003 n Data and Computer Communications, W. Stallings, Prentice Hall, 2003 n http://www.vitels.ch/ n http://courses.cs.vt.edu/~cs4254/ n http://courses.cs.vt.edu/~cs5516/ 30