Introduction to
computer Internet
Lecture 1
Q: Define Computer networks, then discuss the different
network benefits?
Sol:
Network is a collection of independent computers interconnected
together in order to share resources (such as printers, scanners, ….).
Network benefits:
(A)Resource sharing:
Make programs, data, and equipments available to
anyone on the network. The sharing may be for:
• Hardware: like printers, scanners, hard disks.
• Software: like database files, programs.
Printer
B. Computation speedup
Distribute the computations among various network
computers.
C. Load sharing
Move jobs from highly loaded to lightly loaded computers.
D. Communication
• Video conference.
• E-mail.
• Chatting.
Network Topologies
• The way in which various network computers are
connected.
• There are many different network topologies such
as:
Star
– All computers are
connected to a central
point.
Bus
All nodes are connected to a single wire (the bus)
that has two endpoints
Ring
All nodes connected to a
closed loop.
Q: what is meant by data packet, then show how a file can be
transmitted between two computers over the network?
Sol:
• A packet is the smallest piece of information that is exchanged
between computers on a network.
• A packet can contain data and some control and routing information.
• Example When transmitting a file between two computers is divided
into packets.
PACKET PACKET PACKET PACKET
File
Assume that Computer X wishes to send a file to Computer Y
X Y
File
Packets Router
Steps:
1. Computer X cuts the file into small pieces called packets.
2. Each packet consists of three main parts:
A. Header (sender address and receiver address)
B. Data (0.5 to 4 KB).
C. Footer (order, error checking information).
Header (Data (0.5 to 4 KB Footer
Source address Destination address Order Error check
information
X
Y
File
Packets
File
Steps:
Packets
3. The packets are injected into the network.
4. When a packets reaches a switching element (Router), the router
determines the most suitable path.
5. Finally computer Y resembles the packets to construct the original file.
Network types
• There is no fixed classification for computer networks
1. Network Types: According to Scale
• Personal Area Network (PAN).
• Local Area Network (LAN).
• Metropolitan Area Network (MAN).
• Wide Area Network (WAN).
Personal Area Network (PAN)
• A network for one person.
• The wireless network connecting a computer to its
mouse, keyboard, printer (Bluetooth network).
Local Area Network (LAN)
• Covers a small geographical area.
• Privately owned network.
• It has more speed (Explain why?).
• lower error rate than (WANs) (Explain why?).
• high quality cables are needed (Explain why?).
Metropolitan Area Network (MAN)
Covers a larger geographical area than the LAN (such as a city).
Wide Area Network (WAN):
• Covers an unlimited geographical area (such as country).
• Consists of a number of LANs interconnected by a a telephone
company.
• It has lower speed, higher error rate than LANs
• Due to such low speed, low quality cables are needed such as
telephone lines.
X
switch
LAN LAN
LAN LAN
Subnet
WAN Types
Enterprise Network Public Network
(owned by one (has no owner like
)company Internet)
Network Types: According
to Network Structure
• Peer–to–Peer Network.
• Server Based Network.
Client Server Model
Q: Define the client-server model, then classify networks
?according to structure
Sol:
in Client-Server model:
• Resources (H/W and S/W) are stored at the server.
• Users use simple machines (clients).
• Clients and servers are connected through a network.
• Clients can request any servers resources and the role of
the server is to reply clients requests.
Request
Response
Server
Clients
Switch
Data
Peer-to-Peer Network:
• All network computers are identical, known as peers
• No servers.
• No administrator for the entire network, each user determines the
shared resources in his machine
• It is relatively simple, smaller in size, less expensive than server
based networks.
• Each computer functions as client and server.
• Use peer-to-peer when:
– There are 10 or fewer machines.
– Security is not important.
user Password Accessِ
ali ******* Read
Distributed
mona ******** Write
kamal ****** Full
resources
Peer-to-Peer Network
Server Based Network:
• it is the standard model (Opened in size).
• The network has servers
• The shared resources are centralized at the server,
hence it can be easily administrated and controlled.
Centralized resources
user Password Accessِ
ali ******* Read
mona ******** Write
kamal ****** Full
Server-Based Network
• More secured than the peer-to-peer as one
administrator sets the rights to the network
clients.
• More expensive than peer-to-peer (Explain
why?) because:
• Powerful servers are required.
• More specialized Operating systems are needed
for clients and servers.
Servers types
o File server:
o Stores the files shared by the different clients, performs file
archiving, backups, and updates.
o Uses FTP (File transfer Protocol) for transferring files between
machines.
o Printer server: Allows different clients to send multiple print
jobs to the same physical printer.
Shared
Printer
Print
Server
Print Print
Queue Job
– Mail server:
• stores and forward e-mail messages between clients.
• Uses one of the following protocols:
– SMTP (Simple Mail Transfer Protocol).
– POP (Post Office Protocol).
– Web server:
• stores web pages.
• Uses HTTP (Hyper Text Transfer Protocol).
– Database server: stores Databases files used by network clients.
– Proxy server: exists between the network hosts and other hosts outside
the network to protect the network from the external attacks (acts as a
firewall), also used in web caching.
LAN
External
Proxy Hosts
Hub
server (other networks)
Compare between peer to peer network and
server based one
Peer-to-Peer networks Server Based network
Definition • All computers are identical. • Use powerful computers as
Servers, while the others are
• No dedicated servers. clients.
• Has dedicated servers.
Distributed
Centralized
resources
resources
Peer-to-Peer Network
Server based Network
Administration • Shared among network users. • Centralized.
Peer-to-Peer networks Server Based network
Shared • Distributed. • Centralized.
resources • Difficult to be controlled. • Easily controlled.
Size • Has small size (usually 10 • Has opened size.
or fewer computers).
Cost • Less expensive • More expensive
Security • Less than server-based • Mote secured .
networks.
Network Types: According
:to Connectivity
According to connectivity, there are two
main types:
– Wired Networks.
– Wireless Networks.
• Wired Networks:
– The connection that connect computers consists of
physical wires.
• Wireless Networks:
– No wiring between the network components,
connection is established using radio signals.
– There are three different types:
• System interconnection (Bluetooth).
• Wireless LAN.
• Wireless WAN.
• Bluetooth network:
– It’s a wireless network used to connect the computer
components to each others (CPU to keyboard, mouse,
printer, …).
– It has a range of about 10 meters.
• Wireless LAN:
– A LAN except that the connection happened through a radio
signals.
– Each computer has a radio modem to connect with each others.
– Two types of wireless LAN are available:
• With a base station (Access Point).
• Without base station (Ad Hoc) network.
Base To wired network
Station
Antenna
Radio
Wireless LAN With a Modem Ad Hoc network
Base Station
Wireless WAN:
• A wireless network covers a large geographical area.
–
it is usually divided into several service areas in which each service area is managed through an access point.
–
Service area
wire
Access
Point
Q: what are the different internet search tools?
Sol:
Internet search tools are:
1. Search Engines.
2. Web Directories.
3. Meta-Search Engines.
Search Directories
•Also called web portals or taxonomies.
• In web directory a set of experts organize web pages into a
tree-like topic hierarchy.
•General topics (like Computer System) can be sub-divided into
more specified topics or categories (like hardware and software,
… etc.).
• The user has the ability to move through the nodes of the
taxonomy with no restriction.
•The tree-like structure of the web directories allows non-expert
users to find useful information easily since querying directories
is done by category which is more reliable than querying by
keywords used in search engines.
•One of the most popular portals on the web today is Yahoo.
Add new pages to database
Search Engines
1 Crawler
Periodical
2 Phase
Indexer
Pass the page
WWW 3
Store Keywords
4 and other
features
Database
On Line Query
Serve the User Query
Manager
Phase
Transform
Query Transformed
query
Send Query
Post
Retrieval
analysis
Ranking
Final Results Results
User
interface
Search Engine components:
1. Crawler:
• The crawler is a program that automatically retrieves web pages.
• It starts from a set of seed pages (usually provided manually(, downloads
those pages, extracts links from them, adds them to its crawling queue.
then, recursively follows those links.
Web
Parser Keywords and
page features
Download
Document
WWW Extract Indexe
Links r
Database
Crawling
Loop
Seeds
HTTP
Request
Add links to the
Crawling Queue queue
2. Indexer
• Receives the pages retrieved by the crawler.
• Analyzes the various elements of each page then extracts the main
keywords of this page.
• Finally, it dumps the retrieved keywords into the search engines’
database.
• A common method for indexing is to use the inverted index.
3. Database
• Stores the extracted features for each page analyzed by the indexer.
4. Query Manager
• Four different functions are involved in this module, which are;
– it receives the user query in the form of keywords and
transforms it into a suitable database query.
– retrieves relevant pages from database.
– ranks results according to the user query.
– it performs analysis on the retrieved pages such as
categorization and text summarization
5. User Interface
• This is the part that the user sees. Search engines' interface allows the
user to enter his query. It also sends the query to database via query
manager and finally it displays the search result to the user.
Problems with search engines
1. low precision (explain why?) because it depends on a keyword
based search in which a keyword may be shared between different
domains. (Precision is defined to be the ratio of relevant pages in
the retrieved collection, which is calculated as number of relevant
pages retrieved / total retrieved pages).
2. Low recall (Recall is the fraction of relevant pages that have been
retrieved to the number of relevant pages in the collection. Hence,
retrieval recall is calculated as number of relevant pages
retrieved / number of relevant pages in the collection):
Problems with search engines
3. freshness problem (many database items will be out of date).
4. poor retrieval rate (none of the recent search engines can index
more than 16% of the web).
5. long list of result pages (consuming time and effort).
6. huge amount of rapidly expanded information (which results in a
storage problem),
Meta-Search Engine
•The best search engine (Google) covers only about 16% of the web.
•Since a single search engine can cover only a small portion of the web,
combining results from different search engines will certainly achieves
more comprehensive converge.
• A meta search engine is a system that sends the user query to a
number of search engine, collects the results from different search
engines and present them to the user.
User User Dispatcher
Interface Query Mechanism
Interface Agents
Display results as a Query Adaptation
ranked list
Send Modified Queries to
search engines
Collect Search Results
from various search
engines
Remove Duplications
Ranking Results
Q: Explain briefly how internet works?
Sol:
• Internet is the international network that based on TCP/IP
(Transmission Control Protocol/Internet Protocol).
• TCP/IP insures that information is transferred quickly and
reliably.
• TCP/IP performs as following:
• Divide data into packets.
• Send each packet separately.
• If a packet is lost, it resends it again.
• Finally, destination computer reassembles packets to the
original data.
Q: what is meant by the IP address, subnet mask , IP classes?
Sol:
IP address:
• Routing packets between network computers is done using IP
address (each computer has a unique IP).
• IP address consists of 32 bits divided into four groups (each
group 8 bit) and separated by dots.
IP address 10000001 00010000 00011011 00000001
Dotted decimal 129 16 27 1
0255 0255 0255 0255
• Each host is a part of a network.
• Small networks are connected
together to formulate bigger ones.
Network 1 • The IP address must indicate both:
Network 3 – Network address.
Host – Host address.
IP
IP address
address
Network 2
Host address Network address
Indicates the hose Indicates the address
address inside the of the network w.r.t the
network. other networks
• Use the subnet mask to indicate the host and network address so that:
– Ones: define the network address.
– Zeros: define the host address.
Subnet mask 11111111 11111111 00000000 00000000
Dotted decimal 255 255 0 0
IP address 10000001 00010000 00011011 00000001
Dotted decimal 129 16 27 1
Network Address Host Address
IP Address bit 8 bit 8 bit 8 bit 8
Class Range Subnet mask Network address Host address Number of
networks
126 - 1 255.0.0.0 bit 8 bit 24 126
A
127 Reserved for loop back address
191 - 128 255.255.0.0 16 bit 16 bit 16,384
B
223 - 192 255.255.255.0 24 bit 8 bit 2,097,152
C
255 - 224 Reserved for future use
Example
IP Address Network address Host address Class
56.82.31.27 56 82.31.27 A
138.87.23.81 138.87 23.81 B
211.71.18.33 211.71.18 33 C
Broadcast address
Special IP addresses Loopback address
255.255.255.255
• Loopback address (127.0.0.1): 127.0.0.1
Enable a computer to send to itself.
• Broadcast address (255.255.255.255):
Enable a computer to send to all computers within the network.
”Q: Define the term “Internet
• Internet = International Network.
• The largest network (WAN) distributed all over the
world.
• It not a privately owned network.
• It has no centralized control.
?Q: what are the different internet services
• (a) E-Mail (Electronic Mail)
– E-mail is the most important method of sending
messages across internet.
– Components of E-mail address:
[email protected] • "ahmed" is the name of a mailbox
• Hotmail is the mail server where the mailbox "ahmed"
exists.
• .com is the type of organization on net, which is hosting
the mail server.
There are six main categories
• com Commercial
• edu Educational
• gov Government
• mil Military
• net network
• org Private organizations
• (b) FTP (File Transfer Protocol)
– File Transfer Protocol, is an Internet utility
used to upload and download files.
– In order to download or upload files, you
must connect to a file server.
(c) Telnet (Remote Computing)
– Telnet or remote computing is allows you
to become a user on a remote computer.
(D) World Wide Web (WWW)
– The last service is web searching.
– The tool used to view these Web Pages on
Internet is known as browser such as
Internet Explorer.
• Internet Address
http://www.nos.org/computers/internet/url.htm
Web server Name
Web page path within the
web server machine
Protocol used
HTTP Hyper Text Transfer protocol
FTP File Transfer Protocol
?Any Questions