Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke Study Questions CE 7-2 How does e-mail travel? What is a communications protocol? What are the functions of the five TCP/IP OSI layers? How does the Internet work? How does www.PrenHall.com become 192.52.0.34.65? © 2008 Prentice Hall, Experiencing MIS, David Kroenke How Does E-mail Travel? Messages and attachments sent from first computer – – Routers determine the best way to move messages through Internet System employed to ensure all pieces are received – CE 7-3 Broken down into pieces Pieces called packets Packets resent if necessary Messages and attachments reassembled at recipient’s computer © 2008 Prentice Hall, Experiencing MIS, David Kroenke What Is a Communications Protocol? Protocol – – – Standardized means Used for coordinating activities Sequence of ordered steps Communications protocol – Means for coordinating activities between communicating computers – CE 7-4 Computers agree on protocol to use Broken down into layers © 2008 Prentice Hall, Experiencing MIS, David Kroenke Layered Protocol Schemes Protocol architectures – Reference Model for Open Systems Interconnection (OSI) – Transmission Control Program/Internet Protocol (TCP/IP) – CE 7-5 Developed by International Organization for Standardization (ISO) Developed by the Internet Engineering Task Force (IETF) TCP/IP-OSI architecture is blend © 2008 Prentice Hall, Experiencing MIS, David Kroenke TCP/IP-OSI Architecture Figure CE7-3 CE 7-6 © 2008 Prentice Hall, Experiencing MIS, David Kroenke Terminology Architecture – Arrangement of protocol layers Protocol – – Exist at each layer of architecture Set of rules that accomplish tasks at that layer Program – – CE 7-7 Each layer performs specific tasks Specific computer product Implements a protocol © 2008 Prentice Hall, Experiencing MIS, David Kroenke Layer 5 Protocols – Simple Mail Transfer Protocol (SMTP) – Hypertext Transfer Protocol (HTTP) – Processes Web pages File Transfer Protocol (FTP) CE 7-8 Standard e-mail protocol Used to copy files from one computer to another © 2008 Prentice Hall, Experiencing MIS, David Kroenke Layer 4 Transmission Control program (TCP) – – Converts from one data representation to another Breaks e-mail into segments – Provides reliability CE 7-9 Adds identifying segments to beginning of pieces Checks to see if all packets are received © 2008 Prentice Hall, Experiencing MIS, David Kroenke Layer 3 Internet Protocol – – Interacts with TCP in Layer 4 Routers send messages across Internet – Packages messages into packets CE 7-10 Works through IP Special purpose computers Places IP data in front of TCP data © 2008 Prentice Hall, Experiencing MIS, David Kroenke Layers 1 and 2 Switches facilitate data communications Layer 2 protocols – CE 7-11 Program packages packets into frames Basic computer connectivity accomplished at layers 1 and 2 © 2008 Prentice Hall, Experiencing MIS, David Kroenke Network Addresses: MAC and IP MAC addresses – – – – Physical addresses Implemented by programs that use Layer 2 protocols Each NIC card given an address by manufacturer Address only shared within network or segment IP addresses – – Logical addresses Written as series of dotted decimals – Not permanently associated with hardware device CE 7-12 192.68.2.28 Can be reassigned as necessary © 2008 Prentice Hall, Experiencing MIS, David Kroenke IP Addresses Two kinds of IP addresses: – Public – Private CE 7-13 Used on Internet Assigned by ICANN Each address is unique Used within private networks Controlled by company operating network © 2008 Prentice Hall, Experiencing MIS, David Kroenke Dynamic Host Configuration Protocol DHCP Distributes temporary IP address to computers – – CE 7-14 Address loaned while computer connected to LAN When computer disconnected, IP address made available to others © 2008 Prentice Hall, Experiencing MIS, David Kroenke Private IP addresses Assigned manually by network administrator Usually given to: – – CE 7-15 Web servers Shared devices Most users are given addresses by DHCP © 2008 Prentice Hall, Experiencing MIS, David Kroenke Networks Figure CE7-1 CE 7-16 © 2008 Prentice Hall, Experiencing MIS, David Kroenke Using TCP/IP-OSI Protocols Within the Hotel Hotel has private Web server – Guest computer signs into Web server – – CE 7-17 IP address of server assigned by network administrator Guest browser constructs request for server Uses HTTP TCP breaks request into segments, adds additional data TCP program hands segments to program that implements IP © 2008 Prentice Hall, Experiencing MIS, David Kroenke Using TCP/IP-OSI Protocols Within the Hotel (continued) IP program adds header into packet Passes on to program that implements Ethernet Ethernet program translates IP address into MAC address Ethernet wraps packet into frame – CE 7-18 Sends packet through switch © 2008 Prentice Hall, Experiencing MIS, David Kroenke Switches and Routers Switches – Switch table – – – Entries for every device on network Work with frames in Layer 2 Use MAC addresses Routers – Routing tables CE 7-19 Table of data Directs packet traffic on Internet Work with packets in Layer 3 Use IP addresses © 2008 Prentice Hall, Experiencing MIS, David Kroenke Accessing Hotel Web Server Figure CE7-6 CE 7-20 © 2008 Prentice Hall, Experiencing MIS, David Kroenke Using TCP/IP-OSI Protocols Within the Hotel (continued) Switch consults switch table Directs frame to router Ethernet unpacks frame, send packet to IP Router consults routing table, sends packet one hop down Internet Ethernet determines MAC address needed – – CE 7-21 Ethernet packages packet into frame addressed to appropriate MAC address Sends frame to switch © 2008 Prentice Hall, Experiencing MIS, David Kroenke Using TCP/IP-OSI Protocols Within the Hotel (continued) Switch sends frame to destination Ethernet unpacks frame, send packet to IP program IP program strips off header Sends segment to program that implements TCP TCP sends acknowledgement back to guest computer indicating receipt When both segments received, sent to Web server program – CE 7-22 Processes HTTP request © 2008 Prentice Hall, Experiencing MIS, David Kroenke Network Address Translation Internet traffic uses public IP addresses – Routers may have two IP addresses – – Private one assigned by organization for local traffic Public one assigned by ISP for Internet traffic Network Address Translation – – CE 7-23 Assigned in blocks Process of changing public IP addresses into private addresses and reverse Routers receive packets on Internet and redirects them to individual computers on local network © 2008 Prentice Hall, Experiencing MIS, David Kroenke Your E-mail You enter e-mail address of recipient – E-mail program works at application layer E-mail message sent to router – Sends message to TCP Breaks into segments, placed in packets Sent to router Packets sent to Ethernet program – – CE 7-24 Implements SMTP to send email Uses domain name system to get public IP address Placed in frame Sent to switch, sent to router © 2008 Prentice Hall, Experiencing MIS, David Kroenke Your E-mail (continued) Packets arrive at router – – CE 7-25 Implements NAT Replaces private IP address with public IP address Router consults table, sends to gateway router of recipient Segments unpacked from packets, sent to TCP program Program waits for all segments, then sends to program that implements SMTP Program operates at Layer 5, puts message in mailbox © 2008 Prentice Hall, Experiencing MIS, David Kroenke E-mail System Figure CE7-7 CE 7-26 © 2008 Prentice Hall, Experiencing MIS, David Kroenke Domain Name System DNS – – Converts user-friendly names into public IP address Resolves domain name Domain name – Registered name Uniform Resource Locator (URL) – CE 7-27 ICANN manages resolution system Document’s Web address © 2008 Prentice Hall, Experiencing MIS, David Kroenke Domain Name Resolution ICANN manages root servers – – Domain name resolvers – – CE 7-28 13 computers across the world Maintain lists of IP addresses of servers Cache name and IP address on local file Used instead of going through entire resolution process © 2008 Prentice Hall, Experiencing MIS, David Kroenke Active Review CE 7-29 How does e-mail travel? What is a communications protocol? What are the functions of the five TCP/IP OSI layers? How does the Internet work? How does www.PrenHall.com become 192.52.0.34.65? © 2008 Prentice Hall, Experiencing MIS, David Kroenke