• Tidak ada hasil yang ditemukan

INTRODUCTION TO COMPUTING

N/A
N/A
Protected

Academic year: 2025

Membagikan "INTRODUCTION TO COMPUTING"

Copied!
16
0
0

Teks penuh

(1)

INTRODUCTION TO COMPUTING

CPIT 201 WEEK 11 LECTURE 3

(2)

Chapter 6

Computer Networks(Continued)

(3)

An Internet

The internet in lowercase(i) is defined as when two or more networks are connected, they

become an internetwork, or an internet.

(4)

• Here we have seven LANs and two WANs connected to each other via a router that route the packets(message travelling

through internet).

through internet).

(5)

The internet

The internet is a collaboration of hundreds of thousands of interconnected networks.

Internet users use the service of Internet

Service provider(ISP) to connect to internet.

Service provider(ISP) to connect to internet.

ISP is an organization with high capacity computers that are connected to the internet through the high speed links.

(6)

TCP/IP PROTOCOL TCP/IP PROTOCOL

To divide the services required to perform a To divide the services required to perform a task, the Internet has created a set of rules task, the Internet has created a set of rules called protocols. These allow different local called protocols. These allow different local and wide area networks to be connected

and wide area networks to be connected and wide area networks to be connected and wide area networks to be connected

together and carry a message from one point to together and carry a message from one point to another. These protocols that control the

another. These protocols that control the internet today is referred to as the TCP/IP internet today is referred to as the TCP/IP protocol suite.

protocol suite.

(7)

LAYERS

TCP/IP protocol suite is considered as a five layer model as shown below.

(8)

Application layer:

• The application layer enables a user,

whether human or software, to access the network. It provides support for services such as electronic mail, remote file access such as electronic mail, remote file access and transfer, browsing the World Wide

Web, and so on.

(9)

Transport Layer:

• The transport layer is responsible for the logical delivery of a message between

client and server processes.

(10)

Network Layer:

• The network layer is responsible for the source-to-destination (computer-to-

computer or host-to-host) delivery of a computer or host-to-host) delivery of a

packet, possibly across multiple networks (links). The network layer ensures that

each packet gets from its point of origin

(11)

Data Link Layer:

• The responsibility of data link layer is carrying the packet from one node to

another (where a node can be a computer or a router).

or a router).

(12)

Physical Layer:

• The physical layer coordinates the

functions required to carry a bit stream over a physical medium.

• The physical layer is responsible for

moving the individual bits that make up the frame to the next node.

(13)

• The following figure shows the layers involved when a message is sent from device A to device B. As the message

travels from A to B, it may pass through travels from A to B, it may pass through many routers. Routers use only the first three layers.

(14)
(15)

• Each layer in TCP/IP protocol has specific function when a message is transferred from one device it travels through the different the layers until it reaches the different the layers until it reaches the physical layer and is sent by the

transmission media.

(16)

Internet Applications

The main task of the Internet is to The main task of the Internet is to

provide services for users. Among the provide services for users. Among the most popular applications are:

most popular applications are:

1.Electronic mail1.Electronic mail 2.Remote login2.Remote login 3.File transfer3.File transfer

Referensi

Dokumen terkait

` NETSTAT : Display the TCP/IP network protocol statistics and information. ` PATH : View and modify the computers

To get back to our original point, Application layer protocols use TCP to open a socket by recording the TCP protocol in use, the destination IP address, and the port number of

function int readInt (String message): displays the message on the screen, reads from the keyboard the entered text until a newline character is detected, echoes the text to

The Boneh-Boyen basic scheme uses a shared secret that can be calculated by both the sender and receiver of a message to encrypt a plaintext message; the sender of the

[12] revealed that there is possibility of client data being compromised through different cloud computing layers, that may affect different data security requirements such as; privacy,

Indeed, the TCP/IP protocol suite includes application protocols such as: – TELNET for interactive terminal access to remote internet hosts.. – FTP file transfer protocol for

A key establishment protocol Breach of authentication • Security Assumption:Iis able to alter all the messages sent in the public channel.. She can also re-route any message to any

During the decode phase, the instruction in IR is decoded and the required operands are fetched from the register or from memory... • During the decode phase, the instruction in IR is