csc 116 – computer networks fall 2015 instructor: robert spengler
TRANSCRIPT
![Page 1: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/1.jpg)
CSC 116 – Computer Networks
Fall 2015Instructor: Robert Spengler
![Page 2: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/2.jpg)
Chap 9: LAN, WAN, PAN...
Local Area Network Wide Area Network Personal Area Network Internetwork Metropolitan Area Network Wireless Local Area Network
![Page 3: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/3.jpg)
OSI Model
Picture Credit: blog.butchevans.com
![Page 4: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/4.jpg)
Chap 9: The Fundamentals
Network components Computer with Network Interface Card (NIC) Network Medium Interconnecting Device (maybe)
![Page 5: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/5.jpg)
Chapter 9: IP and MAC address
IP address is a logical address
– Work at the NETWORK layer
– Someone decides what IP Address you get MAC address is a physical address
– Work at the DATA LINK layer
– Your MAC address is permanently embedded on your network card
![Page 6: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/6.jpg)
Chap 9: More on IP Address
Can be STATIC (always the same) or DYNAMIC (changed each time it connects to the network)
Frequently assigned by Dynamic Host Configuration Protocol (DHCP)
![Page 7: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/7.jpg)
More on IP Addresses
Two Types
IPv4: 32-bit addresses• Use “Dotted-Decimal” ( 192.168.2.3)
IPv6: 128-bit addresses • Use hexadecimal
( 3ffe:1900:4545:1243:2001:f8ff:fe21:67cf)
![Page 8: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/8.jpg)
Special IP Addresses
10.0.0.0 – 10.255.255.255,
172.16.0.0 – 172.31.255.255, and
192.168.0.0 – 192.168.255.255 are PRIVATE IP Addresses used for internal networks
169.254.0.0 – 169.254.255.255 is the Automatic Private IP Addressing (APIPA) range. A computer gives itself one of these addresses if no network connection is detected.
![Page 9: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/9.jpg)
Ipconfig shows IP information
![Page 10: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/10.jpg)
Ping tests connectivity
![Page 11: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/11.jpg)
Clients and Servers
Client is accessing resources Server is providing resources This is not always a clear distinction
![Page 12: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/12.jpg)
Connecting to the LAN
Need a NIC if you're plugging in Need a Wireless NIC if you're going to WiFi in These are frequently built-in.
![Page 13: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/13.jpg)
Network Hardware
Repeaters Hubs Switches Wireless Access Point Routers (will be discussed later)
![Page 14: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/14.jpg)
A Hub is a multi-port repeater
![Page 15: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/15.jpg)
A Switch
![Page 16: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/16.jpg)
Wireless Access Point
![Page 17: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/17.jpg)
Routers Used to interconnect LANs to each other May directly connect or connect through
intermediate routers
![Page 18: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/18.jpg)
So what is this thing?
![Page 19: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/19.jpg)
But what about the back?
![Page 20: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/20.jpg)
Physical connections
UTP
Coaxial
Fiber Optic
![Page 21: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/21.jpg)
Unshielded Twisted Pair
![Page 22: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/22.jpg)
Coax
![Page 23: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/23.jpg)
Fiber Optic
Multimode vs Single-Mode
![Page 24: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/24.jpg)
Ethernet
Invented in the 1970s but has been updated Uses Carrier Sense Multiple Access with
Collision Detection (CSMA/CD) Uses Media Access Control (MAC) addresses
12 Hexadecimal digits One Ethernet protocol data unit is called a
frame Contains source and destination MAC addresses
![Page 25: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/25.jpg)
WiFi
Two modes: infrastructure and ad-hoc Uses Carrier Sense Multiple Access Collision
with Avoidance (CSMA/CA) Different standards and speeds:
802.11a 54Mbps but poor reception 802.11b/g/n 11/54/600Mbps and better reception 802.11ac up to 6.7 Gbps
![Page 26: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/26.jpg)
Wifi Standards
![Page 27: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/27.jpg)
WiFi Security
Traffic can be intercepted relatively easily Encryption protocols
Wired Equivalent Privacy (WEP) Wi-Fi Protected Access (WPA) WPA2
![Page 28: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/28.jpg)
Transport Layer
Transmission Control Protocol
Reliable and connection-oriented
User Datagram Protocol
Unreliable and connectionless
Both work with segments, use source and destination ports, and use checksums
![Page 29: CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler](https://reader036.vdocuments.mx/reader036/viewer/2022062423/5697bfc11a28abf838ca48b2/html5/thumbnails/29.jpg)
TCP and UDP