Slide 1

Slide 1 text

COMPUTER NETWORKS
 COURSE 5 ALEX PALCUIE

Slide 2

Slide 2 text

COMPUTER NETWORKS - COURSE 5 OUTLINE ▸ switch vs router ▸ MAC address vs IP address ▸ DNS, SSH, HTTP, Ethernet, Wi-Fi

Slide 3

Slide 3 text

https://xkcd.com/422/

Slide 4

Slide 4 text

2 COMPUTERS DEMO (NO WI-FI)

Slide 5

Slide 5 text

COMPUTER NETWORKS - COURSE 5 NETWORK INTERFACE CONTROLLER ▸ A network interface controller (NIC, also known as a network interface card, network adapter, LAN adapter or physical network interface and by similar terms) is a computer hardware component that connects a computer to a computer network.

Slide 6

Slide 6 text

COMPUTER NETWORKS - COURSE 5 MEDIA ACCESS CONTROL ADDRESS (MAC) ▸ A media access control address (MAC address), also called physical address, is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used as a network address for most IEEE 802 network technologies, including Ethernet and WiFi.

Slide 7

Slide 7 text

COMPUTER NETWORKS - COURSE 5 ETHERNET ▸ Ethernet is a family of computer networking technologies for local area networks (LANs) and metropolitan area networks (MANs). It was commercially introduced in 1980 and first standardized in 1983 as IEEE 802.3, and has since been refined to support higher bit rates and longer link distances.

Slide 8

Slide 8 text

No content

Slide 9

Slide 9 text

No content

Slide 10

Slide 10 text

COMPUTER NETWORKS - COURSE 5 IP ADDRESS ▸ An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there."

Slide 11

Slide 11 text

COMPUTER NETWORKS - COURSE 5 PRIVATE IP ADDRESS RANGES ▸ 127.0.0.1 - localhost ▸ 192.168.0.0 - 192.168.255.255 ▸ 172.16.0.0 - 172.31.255.255 ▸ 10.0.0.0 - 10.255.255.255

Slide 12

Slide 12 text

No content

Slide 13

Slide 13 text

COMPUTER NETWORKS - COURSE 5 ADDRESS RESOLUTION PROTOCOL (ARP) ▸ Telecommunication protocol used for resolution of network layer addresses into link layer addresses, a critical function in multiple-access networks. ARP was defined by RFC 826 in 1982.

Slide 14

Slide 14 text

COMPUTER NETWORKS - COURSE 5 INTERNET CONTROL MESSAGE PROTOCOL (ICMP) ▸ One of the main protocols of the Internet Protocol Suite. It is used by network devices, like routers, to send error messages indicating, for example, that a requested service is not available or that a host or router could not be reached. ▸ Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer and back. ▸ Smurf attack ▸ traceroute

Slide 15

Slide 15 text

http://xkcd.com/1077/

Slide 16

Slide 16 text

N COMPUTERS + SWITCH DEMO

Slide 17

Slide 17 text

COMPUTER NETWORKS - COURSE 5 SWITCH ▸ A network switch (also called switching hub, bridging hub, officially MAC bridge) is a computer networking device that connects devices together on a computer network, by using packet switching to receive, process and forward data to the destination device. Unlike less advanced network hubs, a network switch forwards data only to one or multiple devices that need to receive it, rather than broadcasting the same data out of each of its ports.

Slide 18

Slide 18 text

ROUTER + INTERNET DEMO

Slide 19

Slide 19 text

COMPUTER NETWORKS - COURSE 5 DOMAIN NAME SYSTEM (DNS) ▸ Hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most prominently, it translates domain names, which can be easily memorized by humans, to the numerical IP addresses needed for the purpose of computer services and devices worldwide. The Domain Name System is an essential component of the functionality of most Internet services because it is the Internet's primary directory service.

Slide 20

Slide 20 text

No content

Slide 21

Slide 21 text

https://www.iana.org/domains/root/servers

Slide 22

Slide 22 text

https://xkcd.com/1361/

Slide 23

Slide 23 text

COMPUTER NETWORKS - COURSE 5 HYPERTEXT TRANSFER PROTOCOL (HTTP) ▸ The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. ▸ Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text. HTTP is the protocol to exchange or transfer hypertext.

Slide 24

Slide 24 text

INTERNET VS WEB

Slide 25

Slide 25 text

COMPUTER NETWORKS - COURSE 5 GOPHER PROTOCOL ▸ The Gopher protocol is a TCP/IP application layer protocol designed for distributing, searching, and retrieving documents over the Internet. The Gopher protocol was strongly oriented towards a menu-document design and presented an alternative to the World Wide Web in its early stages, but ultimately HTTP became the dominant protocol. The Gopher ecosystem is often regarded as the effective predecessor of the World Wide Web.

Slide 26

Slide 26 text

COMPUTER NETWORKS - COURSE 5 TRANSMISSION CONTROL PROTOCOL (TCP) ▸ Core protocol of the Internet protocol suite. It originated in the initial network implementation in which it complemented the Internet Protocol (IP). Therefore, the entire suite is commonly referred to as TCP/IP. TCP provides reliable, ordered, and error-checked delivery of a stream of octets between applications running on hosts communicating over an IP network. TCP is the protocol that major Internet applications such as the World Wide Web, email, remote administration and file transfer rely on.

Slide 27

Slide 27 text

COMPUTER NETWORKS - COURSE 5 USER DATAGRAM PROTOCOL (UDP) ▸ UDP uses a simple connectionless transmission model with a minimum of protocol mechanism. It has no handshaking dialogues, and thus exposes the user's program to any unreliability of the underlying network protocol. There is no guarantee of delivery, ordering, or duplicate protection. UDP provides checksums for data integrity, and port numbers for addressing different functions at the source and destination of the datagram.

Slide 28

Slide 28 text

No content

Slide 29

Slide 29 text

No content

Slide 30

Slide 30 text

ROUTER WIFI + INTERNET DEMO

Slide 31

Slide 31 text

COMPUTER NETWORKS - COURSE 5 WIFI (IEEE 802.11 B/G/N/AC) ▸ Wi-Fi (or WiFi) is a local area wireless computer networking technology that allows electronic devices to network, mainly using the 2.4 gigahertz (12 cm) UHF and 5 gigahertz (6 cm) SHF ISM radio bands.

Slide 32

Slide 32 text

COMPUTER NETWORKS - COURSE 5 DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP) ▸ The Dynamic Host Configuration Protocol (DHCP) is a standardized network protocol used on Internet Protocol (IP) networks for dynamically distributing network configuration parameters, such as IP addresses for interfaces and services. With DHCP, computers request IP addresses and networking parameters automatically from a DHCP server, reducing the need for a network administrator or a user to configure these settings manually.

Slide 33

Slide 33 text

COMPUTER NETWORKS - COURSE 5 WI-FI PROTECTED ACCESS II (WPA2) ▸ Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, Wired Equivalent Privacy (WEP).

Slide 34

Slide 34 text

https://xkcd.com/936/

Slide 35

Slide 35 text

https://xkcd.com/1457/

Slide 36

Slide 36 text

http://www.extremetech.com/wp-content/uploads/2014/03/1000px-2.4_GHz_Wi- Fi_channels_802.11bg_WLAN.svg_.png

Slide 37

Slide 37 text

COMPUTER NETWORKS - COURSE 5 SERVICE SET ID (SSID) ▸ In computer networking, a service set is a set consisting of all the devices associated with a consumer or enterprise IEEE 802.11 wireless local area network (WLAN). The service set can be local, independent, extended or mesh. ▸ Service sets have an associated identifier, the Service Set Identifier (SSID), which consists of 32 octets that frequently contains a human readable identifier of the network.

Slide 38

Slide 38 text

ROUTER WIFI + SWITCH + INTERNET DEMO

Slide 39

Slide 39 text

SECURITY

Slide 40

Slide 40 text

QUESTIONS GITHUB.COM/PALCU/COMNETWORKS-LAB