Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07 Today – The Internet & Enterprise Network Internet (Public) Enterprise Network (Private) 2 The Internet Note: Capitalized “I”, the only one, public access Also called “the Net” “internet” = inter-connected networks (LANs or WANs) there are many. The Internet: A global WAN that connects approximately 1 million inter organizational computer networks in more than 200 countries on all continents Origin: ARPANET – (DoD, 1969) Original purpose exchange messages, transfer files 3 4 Connecting the Internet ISP: Internet Service Provider Name several well-known ISPs How to find a local ISP: http://www.thelist.com Internet Backbone Providing connectivity in many cities Has many network access points (NAPs) Local ISPs rent NAPs to access the backbone Who owns the backbone? ARPAnet (DoD, 1969 – 1986) 5 NSFnet – educational (1986- now) Domain Name Systems (DNS) To publish on the Internet: Apply for a public domain name Organization: ICANN (Internet Corporation for Assigned Names and Numbers, www.icann.org ), 13 root servers maintain lists of IP addresses of Internet servers Purpose of Domain Name: To get user-friendly names rather than IP addresses. Components of a Domain Name: www.sina.com.cn From the rightmost: Regional code top-level domains (types of institutes) name of the institute www (or www2, the main server), or a specific computer in the domain 6 The Naming System Regional Code: E.g. “cn”, “fr”, “de”, “it”, “uk”, “au”, “jp”, …etc. What is the regional code for the United States? Top-Level Domains (type of the site) com / edu / gov / net, etc. See page 143 for a complete list (note: in some country, .com is short as “.co”, e.g www.amazon.co.uk) Name of the institute (e.g. csusm.edu, microsoft.com) The leftmost: www: world wide web – generally go to the predefined main server of the institute A particular machine or subnet: 7 E.g. fangfang.csusm.edu, sandiego.craigslist.org Exercise: Based on the following domain name, describe the type of the institute. sandiego.craigslist.org www.ebay.com.au www.tsinghua.edu.cn 8 Public IP address Any computer with direct Internet Access needs a public IP address. IPv4 and IPv6 Some small business/home LANs only obtains one IP addresses for the router or server Router has two IP addresses (one public, one private) The other computers obtain private IP addresses from routers 9 Issues with Domain Name System Use Fake Domain Names to acquire users’ private information Using similar names to gain visits E.g. www.craiglist.com, www.wikipeda.org, www.goggle.com, etc. Cybersquatting: register domain names in hoping companies would want it later: gauge for money. Anti-cybersquatting Consumer Protection Act. Nov 1999. 10 The future of the Internet The current Internet is UNSATISFACTORY Too slow for data intensive applications Unreliable, insecure Article: the internet is broken – call for a complete redesign Three initiatives underway 11 Internet 2 Develops and deploys advanced network applications such as remote medical diagnosis, digital libraries, distance education, online simulation and virtual libraries. (http://www.Internet2.edu) Next Generation Internet (NGI) Government sponsored initiative aimed at creating an Internet that is fast, always on, everywhere, natural, intelligent, easy and trusted. (http://www.ngi.gov ) vBNS high-speed network designed to support the academic Internet2 and the NGI. Goal: 2.4 gigabits per second. Enterprise Networks Major Components of Enterprise Networks LANs – a small size network in a single location (e.g. a building). Small company, home business, a department in a big organization (e.g. embedded LAN for large enterprise) WANs – connects computers (or LANs) located at physically separated sites. (see Figure 5-12 on page 126) Generally provided by common carriers (e.g. Verizon, AT&T, etc.) Backbone Networks: high-speed central networks which connects multiple smaller networks (e.g. LANs or small WANs) 12 Types of WANs Connecting the PC to an ISP via Modems Home computers, small businesses use Telephone dial up, DSL line, cable TV line Networks of Leased Lines (Mostly PSTN) Lease from telephone companies (a variety of lines, speed ranges from 1.544Mbps to 40Gbps) Connecting different sites of the company Expensive, hard to manage, sometimes, managed by specialized 3rd parties Public Switched Data Network (PSDN) PSDN – a network of computers and leased lines that is developed and maintained by a vendor Lease a line from the vendor that connects to PSDN Virtual Private Network (VPN) 13 Uses the public Internet (private internets sometimes) to create virtual connections Creating VPN Tunneling Protocol: Tunneling: encrypts the data packet to be sent, and places it inside another packet, which provides confidentiality, authentication and integrity of the message. Ensure Security: software encryption. Offer the benefits of leased lines, but more flexible. The connections is established upon user request, disconnect at will 14 Good for employees on the go, small sites which is too expensive to lease fixed lines, or business partners with limited data transfer, etc. Microsoft windows supports VPN Criteria for comparing network alternatives Cost Initial setup costs, operational costs, and maintenance costs Performance Speed, latency, availability, loss rate, transparency, performance guarantees Other Growth potential, commitment periods, management time, financial risk, technical risk 15 Extensions of Enterprise Network Intranet vs Extranet Intranet: a network designed to serve the internal information needs to a single organization Extranet: connects part of the intranets of different organizations and allows for secure communications among business partners over the Internet using virtual private networks (VPNs) 16 Extranet Business partners access modules such as SCM, CRM, and B2B Subnet and Subnet Mask a subnetwork or subnet is a range of logical addresses (e.g. IP addresses) that is assigned to an organization. Subnet mask is a 32-bit sequence which is used in conjunction with IP address to determine whether the computer is in the subnet. How? A bitwise “and” operation: IP address: 143.37.100.27 10001111.00100101.01100100.00011011 Subnet mask: 255.255.255.0 11111111.11111111.11111111.00000000 Bitwise “AND” operation 10001111.00100101.01100100.00000000 143. 17 37. 100. How many IP addresses can give the same result? 0 Some Other Subnet Masks 11111111.11111111.11111111.00000000 (255.255.255.0) ~ supports 256 IP addresses 11111111.11111111.11111110.00000000 (255.255.254.0) ~ supports how many IP addresses? 11111111.11111111.11111111.10000000 (255.255.255.128) ~ supports how many IP addresses? 255.255.255.254 ~ supports how many IP addresses? If a company has 120 computers, how should the network administrator configure the subnet mask? Step1: round up to 2n, (e.g. ~27=128) Step 2: set all the n digits to be 0 from right to left, and the rest digits as 1 18 e.g. 11111111.11111111.11111111.10000000 Convert to decimal representation of the network address: 255.255.255.128 Exercises A) what should be the subnet mask if the company has 1000 computers? B) Are computer A and B in the same subnet? Computer A: 143.37.100.27 Computer B: 143.37.101.36 Subnet Mask: 255.255.252.0 C) Markstein Hall has both computer labs and offices. The network administrator needs to separate the computers in the labs and offices into two separate subnets. The plan is, Lab computers occupy IP addresses 144.37.2.0~127 Office computers occupy IP addresses 144.37.2.128~255 How should the subnet mask be configured? 19 Assignment: the Internet is Broken Read the article and write your thoughts on this issue on the blog site. Answer the following questions and email the answer to fangfang@csusm.edu by Oct 11 before class starts 20 1. What is the basic flaw of the current Internet design according to David Clark? 2. Why nowadays, the basic design flaw has become a much bigger issue compared to the past? 3. Explain the saying that “humans are good at ignoring problems” use your own words. 4. July 2005, Pew Internet reported ______% of U.S. Internet users have reported having spyware or adware on their computers merely by visiting websites.