Web Developer Foundations: Using XHTML Bonus Networking Chapter

49
Web Developer Foundations: Using XHTML Bonus Networking Chapter Chapter: Networking for Web Developers This chapter introduces networking topics for web developers. The concepts of networking categories, topologies, components, architecture, protocols, and troubleshooting are discussed. While the role of web developer does not usually include administering a network, a web developer needs to be able to communicate effectively with network administrators and network engineers. This chapter should provide a foundation for that communication. Learning Outcomes In this chapter, you will learn to: Describe the categories of networking Describe network topologies Describe network operating systems Describe network architecture Describe the physical components of networks Describe the OSI Reference Model Describe common networking protocols Describe Internet addressing Describe network troubleshooting tools Describe servers used on the Internet and Web Categories of Networking A network consists of two or more computers connected together for the purposes of communication and sharing resources. Networked computers can share Copyright © 2002 Terry Felke 11/13/02 Page Network-1

Transcript of Web Developer Foundations: Using XHTML Bonus Networking Chapter

Page 1: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

Chapter: Networking for Web Developers This chapter introduces networking topics for web developers. The concepts of

networking categories, topologies, components, architecture, protocols, and

troubleshooting are discussed.

While the role of web developer does not usually include administering a

network, a web developer needs to be able to communicate effectively with network

administrators and network engineers. This chapter should provide a foundation for that

communication.

Learning Outcomes

In this chapter, you will learn to:

• Describe the categories of networking

• Describe network topologies

• Describe network operating systems

• Describe network architecture

• Describe the physical components of networks

• Describe the OSI Reference Model

• Describe common networking protocols

• Describe Internet addressing

• Describe network troubleshooting tools

• Describe servers used on the Internet and Web

Categories of Networking

A network consists of two or more computers connected together for the

purposes of communication and sharing resources. Networked computers can share

Copyright © 2002 Terry Felke 11/13/02 Page Network-1

Page 2: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

files and share peripherals such as printers and scanners. There are three major

networking categories: peer-to-peer, server-based, and enterprise.

• Peer-To-Peer Network

In a peer-to-peer network (shown below) all the nodes (computers) on the

network have a similar relationship to the others.

In this non-hierarchical relationship, each node can have access to resources

associated with the other nodes. Examples of PC operating systems which allow

peer-to-peer networking include: Microsoft Windows 95/98/Me, Novell NetWare

Lite, Artisoft LANtastic, and Microsoft Windows for Workgroups. Peer-to-Peer

Local Area Networks (LANs) are typically set up in small organizations or home

networks.

• Server-Based Network

A diagram of a server-based network is shown below. This type of network

contains one or more server computers in addition to network node computers.

Copyright © 2002 Terry Felke 11/13/02 Page Network-2

Page 3: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

The server computers are typically very fast and contain large (and often

multiple) hard drives. The server computer is called the file server, network

server, or just the "server". The server typically contains resources such as files

or databases that the node computers need to access. Peripheral devices such

as printers can be attached to the server, node computers, or directly connected

to the network. The server provides security and control for network resources.

Examples of server-based network operating systems include: UNIX, Linux,

Novell NetWare, Microsoft Windows NT, Microsoft Windows 2000, Digital

Advantage Networks (DECnet), and Apple AppleTalk network for Macintosh.

• Enterprise Network

Enterprise networks may include both peer-to-peer and server-based networks.

The enterprise network provides connectivity between all nodes in an

organization, regardless of their location or architecture type; and typically

support more than 500 active users at one time. Enterprise networks often

contain gateways that provide connectivity between different network architecture

types.

Network Topologies

The physical layout of the cables that connect the nodes of the network is called the

topology of the network. Common network topologies include bus, star, and ring

topologies. These are described below.

• Bus Topology

When using Bus Topology, all nodes are attached to the communications line

directly and all signals are seen by each of the nodes. See the figure below for a

diagram of this topology.

Copyright © 2002 Terry Felke 11/13/02 Page Network-3

Page 4: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

When a node sends data, it is transmitted to all nodes on the network. Each node

has a unique identity and can recognize those signals intended for it. Nodes

ignore the data if it is not intended for them.

In a bus topology, hardware called Terminators is placed on the ends of

the cable to prevent the data signals from echoing through the network. Bus

topology is reliable yet relatively simple and inexpensive to implement. Because

all the nodes are on the same line, isolating problems can be difficult and the

network traffic will slow during peak load periods. Data collisions can occur

because traffic can flow in both directions on the bus and multiple nodes can

transmit at any given time.

• Star Topology

In networks that use star topology (shown below) all network nodes are

connected through a central device, usually a hub.

Copyright © 2002 Terry Felke 11/13/02 Page Network-4

Page 5: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

This has an advantage in reliability over bus topology in that if a single cable

fails, the rest of the network can still operate. However, a large disadvantage is

that if there is a problem with the central device (hub), the entire network may be

inoperable.

• Ring Topology

When using ring topology, the network nodes are connected to each other in a

circular chain. See the diagram below.

The final node connects to the first node to complete the ring. As the data travels

along the ring, each node examines the destination address. If the data is not

meant for the node, the node passes the data along the ring. Data always flows

in one direction on the ring, and only one “token” of data exists at any time. This

Copyright © 2002 Terry Felke 11/13/02 Page Network-5

Page 6: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

provides an advantage over bus topology in that collisions are eliminated. Ring

networks typically perform well during heavy network traffic. A disadvantage to

the ring is that if a single connection is broken, the entire network is inoperable.

• Hybrid Network Topology

An enterprise network or a large network created over time at an organization

may combine bus, star, and ring topologies. The networks are connected with

hardware called routers. An advantage of using hybrid network topology is ease

of expansion of an organization's networks.

• Mesh Topology

A network that is configured using mesh topology contains nodes that are

connected with multiple paths to provide redundancies in the network. All devices

are cross-connected. This allows the best path to be chosen at any particular

point in time.

Topology is just one aspect of a network of computers. Another aspect that a web

developer should be aware of is the network operating system being used.

Network Operating Systems

The purpose of a network operating system (NOS) is to manage resources on a

network. A NOS manages printer sharing, common file and database sharing,

application sharing, user identification, and security for the network. A NOS enables

client machines to access remote drives on the server or other client machines. In

client/server networks, the NOS is the operating system that runs on the server. The

client computers must have portions of the NOS software installed.

Commonly used network operating systems are UNIX, Microsoft Windows NT,

Microsoft Windows 2000, Microsoft Windows .NET Server, Novell NetWare, and Linux.

Interoperability is the ability of one system to communicate with another – different

Copyright © 2002 Terry Felke 11/13/02 Page Network-6

Page 7: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

operating systems working together. All of the popular network operating systems can

interoperate with each other. It is not uncommon for large organizations to have Novell

NetWare severs, Windows Servers, and UNIX servers all connected to the same

enterprise network. Popular network operating systems are discussed below.

• Microsoft Windows NT (New Technology)

Microsoft Windows NT, first released in 1995, provides a graphical user interface

to administer small and large networks. When using this popular NOS, Windows

NT Server is installed on the server and Windows NT Workstation is usually

installed on the client. Windows NT uses TCP/IP as the default network protocol.

• Microsoft Windows 2000 Server

This NOS is Microsoft’s replacement for Windows NT. It features improvements

in reliability and security. It also provides an Active Directory, which enables a

company to set up virtual private networks, to encrypt data locally or on the

network, and to give users access to shared files in a consistent way from any

network computer. Windows 2000 uses TCP/IP as the default network protocol.

There are three versions of Windows 2000 for servers. Windows 2000

Server is useful for small to medium sized businesses. Windows 2000 Advanced

Server is intended to be used as a network server or application server. Windows

2000 Datacenter Server is designed for large data warehouses and applications

requiring high-speed computations and large databases. Windows 2000

Professional is usually installed on the client.

• Microsoft Windows .NET Server

This NOS is meant to replace Windows 2000 Server. The .NET Server NOS also

is available in multiple versions, including the Standard Server, Enterprise

Server, and Datacenter Server. In addition to the expected improvements in

reliability and security, the .NET Servers provide additional functionality –

Copyright © 2002 Terry Felke 11/13/02 Page Network-7

Page 8: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

including the integration of an application environment to develop XML Web

services and business solutions. Visit Microsoft’s web site for more information.

Windows .NET Servers use TCP/IP as the default network protocol.

• Novell NetWare

Novell NetWare is a widely installed network operating system. Various versions

of Novell network operating systems have been in place since the 1980s. Novell

NetWare uses servers that provide services such as file storage and network

printing. A recent version is Novell NetWare 6, which uses TCP/IP as its

networking protocol and can be remotely configured. Earlier versions of NetWare

(before Netware 5) used proprietary protocols – Internetwork Packet Exchange

(IPX), Sequenced Packet Exchange (SPX), and NetWare Core Protocol (NCP) –

instead of TCP/IP.

• UNIX

The UNIX operating system is was developed at AT&T Bell Labs in the late

1960s. It was designed as a multi-user operating system and is ideal for a

networked environment. UNIX has a long history of supporting TCP/IP. It is very

scalable and is available for almost any platform.

UNIX is a command-driven, text-based operating system. However, there are

GUI window environments applications such as X-Windows available. Popular

versions of UNIX include Sun Solaris, IBM AIX, and HP-UX. Linux is a popular

derivative of UNIX.

[sidebar]

Web Developer Perspective: Why do I care about knowing which Network

Operating System (NOS) my web host provider uses?

Knowing the NOS used by your web host provider is important because it can help

you with troubleshooting your web site. Often students’ web sites work great on their

Copyright © 2002 Terry Felke 11/13/02 Page Network-8

Page 9: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

own PC (usually with a Windows-based operating system) but “fall apart” (with broken

links and images that do not load) after being published to a free web server that uses a

different operating system.

Some operating systems, such as Windows, treat upper- and lowercase letters in

exactly the same way. Other operating systems, such as UNIX and Linux, consider

upper- and lowercase letters to be different. This is called being “case sensitive”. For

example, when a web server running with on a Windows Operating System receives a

request generated by an anchor tag coded as “<a href=”MyPage.htm”>My Page</a>” it

will return a file named with any combination of upper or lowercase letters.

“MyPage.htm”, “mypage.htm”, “myPage.htm” could all be used. However, when the

request generated by the same anchor tag is received by a web server running on a

UNIX system (which is case sensitive) the file would only be found if it were really saved

as “MyPage.htm”. If the file were named “mypage.htm”, a 404 (not found) error would

result. This is a good reason to always be consistent when naming files – consider

always using lowercase letters for file names.

[end of sidebar]

• Linux

Linux was developed in the early 1990s by Linus Torvaldas. It is a version of

UNIX designed to run on PCs. Linux has grown in popularity because it is free,

open-source software. Linux includes a graphical user interface and utilizes

TCP/IP. Difficulties associated with using Linux include the small selection of

commercial software and hardware device drivers available for this platform.

Some large companies, such as IBM, are supporting Linux as an alternative to

Microsoft operating systems. IBM has released a version of its Universal

Database for the Linux platform. Commercial versions of Linux are available from

vendors such as Red Hat and Caldera.

Copyright © 2002 Terry Felke 11/13/02 Page Network-9

Page 10: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

Now that you've had an introductory overview of network categories, topologies,

and operating systems, let’s continue with a discussion of network architecture and

components.

Network Architecture

You have studied network categories and topologies. Now you are ready to take

a look at how networks are put together: Local Area Networks, Wide Area Networks and

the internetworking architecture of the Internet.

Local Area Network (LAN)

A LAN is a group of computers connected within a confined geographical area –

usually a building or group of buildings. Your school computer lab uses a LAN. If you

work in an office, you probably use a computer connected to a LAN. Recently, many

people have begun to set up LANs in their homes to share resources between

computers. Common LAN technologies include Ethernet and Token Ring.

Wide Area Network (WAN)

A WAN is a group of computers connected over a dispersed geographic area.

For example, an organization with offices on both the east and west coasts of the United

States probably uses a WAN to provide a link between the LANs at each of the offices.

See below for a diagram of this connectivity.

Copyright © 2002 Terry Felke 11/13/02 Page Network-10

Page 11: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

Internet Backbone

A backbone is a large transmission line that carries data gathered from smaller

lines that interconnect with it. On the Internet a backbone is a set of paths that local or

regional networks connect to for long-distance interconnection. The Internet is a group of

interconnected networks – the Internet Backbones provide very high-speed connectivity.

An image of the AT&T IP Backbone map (from

http://www.ipservices.att.com/backbone/index2.cfm) is shown in below.

Note the connections between major cities, or Network Access Points (NAPs). If you are

interested in maps of the Internet, visit An Atlas of Cyberspaces

(http://www.cybergeography.com/atlas/geographic.html)

• Network Access Point (NAP)

Access points or junctions to the Internet Backbone are called Network Access

Points (NAPs). Chicago, New York, and San Francisco are three key NAPs in the

United States. Visit the Chicago NAP's web site (http://www.aads.net/main.html)

Copyright © 2002 Terry Felke 11/13/02 Page Network-11

Page 12: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

to view photos of the actual hardware used and find out which Internet Service

Providers are connected directly to the NAP.

• Segment

A segment is used in network architecture to describe a part of a large structure.

This could be used to indicate part of the Internet Backbone or part of a regional

connection. Segments can also be used to describe subnetworks in a LAN.

Network Components

As you read the previous sections you might have been wondering – what about the

hardware? What about all the devices that use the protocols and physically connect the

computers together? This section focuses on Network components – the hardware.

• Network Interface Card (NIC)

Every node on a network contains a Network Interface Card (NIC). The card

usually is located in an expansion slot on the motherboard of a desktop or tower

personal computer. Notebook computers use PCMCIA NICs. The NIC connects

to the network with some type of network cable media. Each NIC that is

manufactured contains a unique MAC or Media Access Control address. This is

used to identify the device to other network devices.

• Repeaters

Repeaters re used to extend LAN segments. This device amplifies the incoming

signal received from one segment and sends it on to the next segment. Using

repeaters allows you to extend the network beyond ordinary distance limitations.

• Hubs

A hub is a device that is used to connect computers on the same local network in

Copyright © 2002 Terry Felke 11/13/02 Page Network-12

Page 13: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

a star topology. A hub has several ports, and each network computer (or node)

connects to a separate port. Hubs can also be connected to other hubs,

switches, and routers.

• Bridges

Bridges are used to connect network segments in the same LAN. They can

reduce the amount of network traffic by dividing a network into two segments.

Bridges can also be used to connect network segments using different protocols.

Bridges use MAC (media access control) hardware addresses as the basis for

limiting network traffic.

• Switches

Switches select a path or circuit for sending a packet to the proper pot, reducing

network traffic in a manner similar to bridges. Switches operate more intelligently

than simple network devices such hubs and repeaters. Switches are increasingly

replacing these older devices. Switches do not share bandwidth in the same

manner that hubs do; they can devote the entire bandwidth to a single node if

needed. Servers can also connect directly to switches.

• Routers

The role of a router is to direct network packets. A router identifies the packet's

destination address and determines the best path to the destination. The router

sends the packet to either the next closest router or to the actual destination

network, if that network is connected to the router. A router will create or maintain

a table of the available routes and their conditions and use this information along

with distance and cost algorithms to determine the best route for a given packet.

Copyright © 2002 Terry Felke 11/13/02 Page Network-13

Page 14: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

An addressing structure supported by the addressing protocol (IP or IPX) must

be used. Routers are dynamic and can update their routing tables "on the fly".

RIP (Routing Information Protocol) is a protocol used for dynamically managing

routing tables.

• Brouters

Brouters contain the functionality of both bridges and routers. They can route

traffic to a variety of networks and are protocol-independent.

• Gateways

A gateway is a network point that acts as an entrance to another network. A

gateway is often used to connect two networks using different network protocols.

For example, a gateway would be used to connect a Novell IPX/SPX network to

a Windows 2000 TCP/IP network.

• Modems

Modems enable computers to use telephone lines to communicate with other

computers. A traditional analog modem modulates outgoing digital signals from a

computer to analog signals for a conventional telephone line. When a modem

receives the signal over a telephone line it demodulates the incoming analog

signal and converts it to a digital signal for the receiving computer.

Modems are also used to connect computers to cable, DSL, and ISDN

networks. In these cases, there is no translation to analog; the term modem is

used to describe the physical device that connects the computer to the outside

network or digital phone line.

Copyright © 2002 Terry Felke 11/13/02 Page Network-14

Page 15: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

• Patch Panel

A patch panel s used to provide a central connection point where cables from

different rooms or departments can be connected to networking devices to form a

LAN. A patch panel consists of a group of network cabling sockets mounted on a

rack. It is usually placed in a secure closet.

Transmission Media

Networks are comprised of computers, devices, network software, and

transmission media – the component that connects everything together. This section

discusses some commonly used types of transmission media.

• Twisted Pair Cable

This is the most widely used media in modern ethernet networks. Twisted pair is

formed by twisting two insulated copper wires around each other. A twisted pair

segment cannot be more than 100 meters in length. That is why network devices

such as repeaters are used. There are a number of categories of twisted pair. A

commonly used category is Category 5 (Cat5). Cat5 contains four twisted pairs

and can transmit data up to 100 Megabits per second.

• RJ-45 Connectors

RJ-45 (Registered Jack-45) connectors are used with twisted pair cabling in

ethernet and token ring networks. They look similar to RJ-11 modular phone

connectors, but are larger.

• Coaxial Cable

This is a high-capacity cable used for communication and video networks.

Copyright © 2002 Terry Felke 11/13/02 Page Network-15

Page 16: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

Coaxial (coax) is two-wire cable where the inner wire is the conductor and the

metal sheath around it is a ground. In general, coax provides higher bandwidth

than twisted pair cable.

o Thick Coaxial Cable (thicknet)

This coax works well for environments such as hospitals where machines

produce electromagnetic radiation that would interfere with other types of

cable. It does not bend easily but has a maximum segment length of 500

meters.This is usually used in networks to transmit at 10 Megabits per

second.

o Thin Coaxial Cable (thinnet)

This is an ethernet standard for smaller networks. It is more flexible and

easier to install. The maximum segment length for thinnet is 185 meters.

This is usually used in older networks to transmit at 10 Megabits per

second.

• Fiber Optic Cables

This type of cable can transmit data much faster than other cable types – in the

range of gigabits per second. Fiber Optic Cables consist of two strands: one to

receive and one to send. The transmission of data is sent as pulses of light and

can travel for miles without degrading. Fiber Optic Cables are expensive

compared to other transmission media types.

• Wireless

A Wireless LAN is one in which a mobile user can connect to a local area

network using a wireless (radio) connection. Each node on the wireless LAN

needs a wireless NIC transceiver. The IEEE 802.11 standard specifies the

technologies for wireless LANs.

Copyright © 2002 Terry Felke 11/13/02 Page Network-16

Page 17: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

The wireless access point device shown above is physically connected to a

network with cable, allowing one or more remote PCs with wireless NICs to

receive the signals from the wireless access point and access the network.

You have studied network topologies, operating systems, and components. You

may be wondering how the computers connected to networks communicate with each

other. This is accomplished by networking protocols – rules for network communication.

Common Networking Protocols

A protocol is a standard set of rules that allow a client and server to

communicate. Both the client and the server must follow the same set of rules, or

protocols, in order to communicate. Protocols are often based on industry standards or

international standards. Commonly used protocols are described below:

• TCP/IP

TCP/IP, Transmission Control Protocol/Internet Protocol, has been adopted as

the official protocol of the Internet. The current version is TCP/IP version 4. A

newer version, known as IPv6 is currently being tested.

CP and IP have different functions that work together to ensure reliable

communication over the Internet.

The purpose of TCP is to ensure the integrity of the communication. TCP

breaks messages and files into multiple "packets". These contain information

such as the destination, source, sequence number, and checksum values.

Copyright © 2002 Terry Felke 11/13/02 Page Network-17

Page 18: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

IP then takes over and uses IP addressing to send each packet over the

Internet using the best path at the particular time. When the destination address

is reached, TCP verifies the integrity of each packet using the checksum,

requests a resend if a packet is damaged, and reassembles the file or message

from the multiple packets.

As mentioned above, IP routes each packet to the correct destination

address. What actually happens is that the packet gets fowarded to the next

closest router (a hardware device designed to move network traffic) until it

reaches its destination.

Each device connected to the Internet has a unique numeric IP address.

IPv4 uses 32-bit addressing – this results in a decimal number in the format of

xxx.xxx.xxx.xxx, where each “xxx” is a value from 0 to 255. The IP address may

correspond to a domain name. For example, at the time this was written the IP

address of Yahoo! was 216.115.108.245.

Copyright © 2002 Terry Felke 11/13/02 Page Network-18

Page 19: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

You can enter this number in the Address text box in a Web Browser (as shown

in Figure12.18), press Enter, and the Yahoo home page will display. Of course –

it’s much easier to type yahoo.com which is why the Domain Name System was

created in the first place!

Other protocols that are part of the TCP/IP suite include User Datagram

Protocol (UDP), Internet Control Message Protocol (ICMP), and Address

Resolution Protocol (ARP).

• IPX/SPX

This is a protocol developed by Novell and once dominated LANs and WANs.

IPX, Internetwork Packet Exchange, handles network addressing and routing.

SPX, Sequenced Packet Exchange, provides reliability and ensures that the

packets arrive undamaged.

IPX/SPX is used mainly with Novell products. Even though IPX/SPX is not

supported on the Internet, it is widely used for private networks and WANs.

• NetBEUI

NetBEUI (pronounced “net-boo-ee”) is a protocol used for Microsoft peer-to-peer

networks. The acronym stands for Network Basic Input/Output System Extended

User Interfaces. NetBEUI was originally developed by IBM.

• Apple-Talk

Apple-Talk is proprietary and is only used in Apple networks.

• Data Link Control (DLC)

This protocol was also originally developed by IBM. It was later adopted by

Hewlett-Packard to connect laser printers to LANs.

• Systems Network Architecture (SNA)

This is IBM's mainframe network architecture and was introduced in 1974. It is

Copyright © 2002 Terry Felke 11/13/02 Page Network-19

Page 20: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

still widely used within mainframe networks.

Large networks often use both TCP/IP and IXP/SPX. Small peer-to-peer

networks sometimes use NetBEUI. As a web developer it will not be your role to select a

protocol for the network. However, you may need to work with a test web server. In this

case the network protocol must support TCP/IP.

You have been introduced to common networking protocols. However, we still

haven’t discussed how the communication between client and server takes place. Let’s

take a look at the OSI Reference Model, a conceptual model that describes this process.

OSI Reference Model

The International Organization for Standardization developed the OSI/RM, Open

Systems Interconnect Reference Model, in the early 1980s. This is a conceptual model

that describes how information from a software application in one computer moves

through a network medium to a software application in another computer. The OSI/RM is

composed of seven layers. Each layer specifies particular network functions.

OSI Layers

Layer

Number

Layer

Name

Function Network

Components

7 Application This layer processes end-user and

end-application protocols: telnet,

ftp, http, smtp, pop3.

Client or Server

Computer

6

Presentation

Application data is either packed

or unpacked to be ready by the

running application. Protocol

conversions,

Client or Server

Computer

Copyright © 2002 Terry Felke 11/13/02 Page Network-20

Page 21: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

encryption/decryption and

graphics expansion occur at this

layer.

5 Session Provides for two communicating

presentation entities to exchange

data with each other.

Client or Server

Computer

4 Transport This is where TCP lives! This layer

ensures data reliability and

integrity.

Client or Server

Computer.

3

Network IP protocol is at this layer.

Provides a means to establish,

maintain and terminate network

connections. All routers in a

network operate at this layer.

Routers and Layer 3

Switches (Routing

switches) operate at

this layer. Brouters

operate at layer 3 and

layer 2.

2

Data Link

This layer defines the access

strategy for sharing the physical

medium, including data link and

media access issues. Protocols

such as PPP live here. The MAC

address – the six-byte number

unique to each NIC – may be

used by this layer

Network devices such

as bridges and

switches operate at

this layer.

Brouters operate at

layer 3 and layer 2.

LAN switches forward

traffic based on MAC

address at this layer

1 Physical This layer defines the physical and The NICs, repeaters,

Copyright © 2002 Terry Felke 11/13/02 Page Network-21

Page 22: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

electrical characteristics of the

network.

hubs, and switching

hubs run at this layer –

passing strings of

zeros and ones down

the pipe.

Packets and the OSI

The illustration in Figure 12.17 showed a very basic packet structure. Recall that a

packet is a piece of information transmitted on a network. When a web browser is used

to visit a web site, the request is placed in one or more packets that travel through the

Internet. The figure below illustrates the process of a packet taking this journey.

The request begins at the Application Layer (Layer 7) and moves down through the

layers to the Physical Layer (Layer 1). The layers of protocols can each add their Header

Copyright © 2002 Terry Felke 11/13/02 Page Network-22

Page 23: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

to the packet. Once the Physical Layer is reached, the message (consisting of the

packet and its associated Headers) is transmitted as bits (1s and 0s) across the network.

Once received at the destination address, the Headers are stripped off and processed

by each layer until the data is presented to the host application such as a web browser,

web server, or email application.

Internet Architecture Layers

The OSI/RM is a conceptual reference model for network architecture. The

architecture of the Internet has used TCP/IP since 1983. The table below lists both the

standard OSI/RM model and the Internet Protocol Suite of the TCP/IP Stack. Notice how

the functions of the top three layers of the OSI are combined into a single Application

Layer in the Internet Protocol Suite.

OSI Layer Internet Protocol

Suite

Function

Application

Presentation

Session

Application

This layer processes end-user and end-application

protocols: telnet, ftp, http, smtp, pop3. Application

data is either packed or unpacked to be ready by

the running application. Protocol conversions,

graphics expansion, and encryption/decryption

occur at this layer. Provides for two communicating

presentation entities to exchange data with each

other.

Transport TCP/UDP This layer ensures data reliability and integrity.

Network

IP Provides a means to establish, maintain and

terminate network connections. All routers in a

network operate at this layer

Copyright © 2002 Terry Felke 11/13/02 Page Network-23

Page 24: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

Data Link

Data Link This layer defines the access strategy for sharing

the physical medium, including data link and media

access issues. Protocols such as PPP live here.

Network devices such as bridges and switches

operate at this layer.

Physical Physical This layer defines the physical and electrical

characteristics of the network. The NIC cards and

interfaces on the routers run at this level – passing

strings of zeros and ones to the communications

media.

Internet Protocol Suites are defined, standardized, and revised by the IETF using

Requests for Comments (RFC). If you are interested in viewing the RFCs related to

Internet Protocols, visit http://www.rfc-editor.org/rfcxx00.html.

The role of IP (Internet Protocol) in establishing network communication, or

Internet Addressing, was mentioned above. How does the request for a web page

entered in your browser find the correct web server in the Internet? How are the

computers identified? Let’s take a look at Internet Addressing.

Internet Addressing

When a web page is requested, the IP part of TCP/IP places the requesting IP

Address in the Header (along with other information) and the message packet is sent (by

routers) to the IP address of the web server. The TCP/IP protocol at the web server

responds and transmits the web page packets to back to the requestor's IP Address (by

way of routers).

Copyright © 2002 Terry Felke 11/13/02 Page Network-24

Page 25: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

Internet Protocol uses classes of addresses to uniquely identify hosts and

networks on the Internet or any network that uses TCP/IP protocol. An IPv4 Address is a

32-bit (binary digit) number. It is represented by four decimal numbers separated by

periods, called dotted decimal, in the format xxx.xxx.xxx.xxx. Each group of “xxx” is a

decimal number ranging from 0 to 255 that represents 8 bits (binary digits) and is called

an "octet". This provides for a potential 232 or approximately 4 billion IP Addresses.

An IP Address has two parts: the network portion and the host or workstation

portion. IP Network Addresses are assigned by ICANN (http://www.icann.org), the

Internet Corporation of Assigned Names and Numbers. They are categorized by

Address Classes, which can support different numbers of hosts and workstations.

• Class A is intended for large networks with potentially millions of devices. Class

A IP Addresses range from 0.xxx.xxx.xxx to 126.xxx.xxx.xxx. The network portion

is the first octet and the host portion uses the remaining three octets.

27.135.134.209 is an example of a Class A IP Address.

• Class B is intended for medium-sized networks with potentially thousands of

devices. Class B IP Addresses range from 128.0.xxx.xxx to 191.255.xxx.xxx. The

network portion is the first two octets and the host portion uses the last two

octets. 132.35.134.209 is an example of a Class B IP Address.

• Class C is intended for small networks with no more than 254 devices. Class C

IP Addresses range from 192.0.0.xxx to 223.255.255.xxx. The network portion is

the first three octets and the host portion is the last octet. 208.35.134.209 is an

example of a Class C IP Address.

A table depicting the network and host portions of Class A, Class B, and Class C

IP Addresses is shown below.

8 bits xxx

8 bits xxx

8 bits xxx

8 bits xxx

Copyright © 2002 Terry Felke 11/13/02 Page Network-25

Page 26: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

Class A Network Host Host Host

Class B Network Network Host Host

Class C Network Network Network Host

• Class D addresses are multicast addresses. Class D IP Addresses range from

224.0.0.0 to 239.0.0.0.

• Class E is an experimental class. Its IP Addresses range from 240.0.0.0 to

247.0.0.0.

A table that describes the number of networks and hosts in Class A, Class B, and Class

C is shown below.

Class

Network Octets Number of Networks

Host Octets Number of Host Addresses

A 0.xxx.xxx.xxx to

126.xxx.xxx.xxx

127

xxx.0.0.1 to

xxx.255.255.254

16 million

B 128.0.xxx.xxx to

191.255.xxx.xxx

16,000

xxx.xxx.0.1 to

xxx.xxx.255.254

65,534

C 192.0.0.xxx to

223.255.255.xxx

2 million xxx.xxx.xxx.1 to

xxx.xxx.xxx.254

254

Since Class A IP Addresses are meant for large networks, their address structure

can accommodate the largest number of hosts. Class C is useful for smaller networks.

Notice how many more IP Addresses can be accommodated with Class A IP address

than a Class C IP Address. If you are curious about who has been assigned a particular

network IP Address, check out the ARIN database at

http://www.arin.net/whois/index.html.

Copyright © 2002 Terry Felke 11/13/02 Page Network-26

Page 27: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

Did you notice some numbers "missing" from the discussion of IP Addresses?

There are some special IP Addresses reserved for private networks, loopback

addresses and broadcast address purposes.

• Private IP Addresses are used on private TCP/IP networks that are isolated

from the Internet. The IP Address ranges are: 10.0.0.0 to 10.255.255.255,

172.16.0.0 to 172.31.255.555, and 192.168.0.0 to 192.168.255.255.

• The Broadcast Address is 255.255.255.255. Messages with this IP Address as

the destination is sent to all hosts on a network.

• The Loopback Address is 127.0.0.1. Use this when you need to test your own

workstation. If your workstation is running a web server and you type

http://127.0.0.1 in your web browser, you will access your web site.

• The IP Address 0.0.0.0 is currently unassigned and is used temporarily when a

computer requests an IP Address to be dynamically assigned to it.

The IP Addresses above are standard, but another method is in place to work

around the limitations of the IP Address Classes. This method is called CIDR (Classless

Inter-Domain Routing). CIDR is a method to allocate and specify the Internet addresses

for inter-domain routing more flexibly than with the original system of IP Address

classes. CIDR is now the routing system used by virtually all gateway hosts on the

Internet's backbone. An overview of CIDR can be found at

http://public.pacbell.net/dedicated/cidr.html.

Although CIDR has helped, with the increasing numbers of mobile phones,

automobiles, and PDAs connected to the Internet there is a danger of running out of IP

Addresses. That is where the next version of IP, IPv6, saves the day.

Copyright © 2002 Terry Felke 11/13/02 Page Network-27

Page 28: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

IPv6

IPv6, Internet Protocol Version 6, is the most recent version of the Internet

Protocol. IPv6 was designed as an evolutionary set of improvements to the current IPv4

and is backwardly compatible with it. Service providers and Internet users can update to

IPv6 independently without having to coordinate with each other.

IPv6 provides for more Internet Addresses because the IP address is lengthened

from 32 bits to 128 bits. This means that there are potentially 2128 unique IP Addresses

possible, or approximately 340,282,366,920,938,463,463,347,607,431,768,211,456.

(Now there will be enough IP addresses for everyone’s PC, notebook, cell phone, pager,

PDA, automobile, toaster, etc.!) Another improvement in IPv6 is the provision for three

types of addressing: unicast (one host to one other host), anycast (one host to the

nearest of multiple host), and multicast (one host to multiple hosts).

For more information on IPv4 and IPv6 Internet Addressing, view the whitepaper

at http://www.3com.com/solutions/en_US/ncs/501302.html.

This chapter continues with a discussion of how to configure your computer or

workstation to use TCP/IP on a network.

TCP/IP Workstation Configuration

There are a number of configurations needed when setting up a computer to use

TCP/IP, including IP Address, Subnet Mask, Default Gateway, and DHCP Client. This

section discusses those terms and settings. To configure a Windows PC to use TCP/IP,

the Network Properties Dialog Box is used. Select Start, Settings, Control Panel,

Network to display the Network Properties Dialog Box, shown below.

Copyright © 2002 Terry Felke 11/13/02 Page Network-28

Page 29: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

To close the dialog box without saving any inadvertent changes, click the Cancel button.

To view and configure the TCP/IP Properties, highlight the TCP/IP entry that

corresponds to your NIC in the Network Components select box and then click the

Properties button.

Your network administrator determines how IP addresses are assigned on the

network. The IP address of your computer may be a specific, static address. Another

option is to configure each computer to request and obtain an IP address each time it

connects to the network. The next section takes a look at Subnet Masks, which are

needed for static IP addressing.

Subnet Mask

A subnet mask is used to distinguish the between the network and host portions

of an IP Address on a network. Because it does this, it can be used to determine

Copyright © 2002 Terry Felke 11/13/02 Page Network-29

Page 30: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

whether a destination address is local or remote. Like an IP Address, a subnet mask is a

32-bit number. While subnet masks can be custom configured, this section will focus on

the default subnet masks. The Default Subnet Masks for Class A, B, and C IP

Addresses are shown below. Class D and Class E IP Addresses do not have hosts and

do not need subnet masks.

Class IP Address Range Default Subnet Mask

A 0.xxx.xxx.xxx to 126.xxx.xxx.xxx 255.0.0.0

B 128.0.xxx.xxx to 191.255.xxx.xxx 255.255.0.0

C 192.0.0.xxx to 223.255.255.xxx 255.255.255.0

In the table above, "255" indicates that all 8 bits in the octet are "1s" bits are on

and signifies the network portion of the IP Address. "0" indicates that all 8 bits in the

octet are "0s" and signifies the host portion of the IP Address.

For example, to configure a host on a Class C Private Network, the sample IP

Address is 192.168.56.1. The subnet mask of "255.255.255.0" indicates that the network

portion of the address is "192.168.56" and the host portion is "1".

Copyright © 2002 Terry Felke 11/13/02 Page Network-30

Page 31: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

Default Gateway

The default gateway is usually set to the IP Address of a router to be used when

the destination is remote and not part of the Local Area Network. See the example in

Figure 12.22.

Copyright © 2002 Terry Felke 11/13/02 Page Network-31

Page 32: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

DHCP Client

DHCP (Dynamic Host Configuration Protocol) lets a network administrator

supervise and distribute IP addresses from a central point and automatically sends a

new IP address when a computer is connected to the network. When an organization

sets up its computer users with a connection to the Internet, an IP address must be

assigned to each machine. Without DHCP, the IP address must be entered manually at

each computer. DHCP dynamically assigns a new IP address each time the computer is

connected to the network. The advantage of DHCP is that is more efficiently utilizes IP

host addresses by allocating them only when they are needed. The screen shot in

Figure 12.22 shows a request to obtain an IP Address automatically.

Copyright © 2002 Terry Felke 11/13/02 Page Network-32

Page 33: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

Your network administrator or Internet service provider will supply you with the

values for these configuration settings. However, what if everything doesn't work

perfectly? What are some methods to use to identify the problem? The next section

discusses standard networking diagnostic tools and utilities.

Diagnostic Tools

This section will introduce some commands and utilities that are helpful when

troubleshooting a network or a website. They are run from a Command window.

Select Start, Programs, MS-DOS Prompt to open a Command Window to try the

diagnostic tools below.

Copyright © 2002 Terry Felke 11/13/02 Page Network-33

Page 34: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

It's Not Working?

Depending on your school's computer lab security settings, you may not be able

to access a Command window. Even if you can display a Command Window, your

school may have blocked some of these commands for security reasons.

Command Window Hints

Command or Key

Combination

Purpose

cls Clears the screen in the Command Window

Ctrl + C Cancels processing in the Command Window

exit Closes the Command Window

> file name This directs the output of a command to the file name you

specified. For example: “ping yahoo.com > myping.txt” will send

the output of the ping command to a text file named “myping.txt”.

| more This directs the output of a command to the “more” utility, which

will display one screen at a time and prompt you for “more”. For

example: “tracerte yahoo.com | more” will allow you to page

through the trace route display.

The ping Utility

This is used to test connectivity between source and destination systems. Ping

stands for Packet Internet Groper. Ping determines whether or not there is a connection

between the source system (your computer) and the destination system (the website or

network you are trying to reach).

The syntax is:

Copyright © 2002 Terry Felke 11/13/02 Page Network-34

Page 35: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

ping IP Address

or

ping Domain Name

Try launching a Command Window and typing "ping yahoo.com". A sample

screen shot is shown below. This shows the IP Address of Yahoo! and the time needed

for the packet to travel the round trip from your computer to Yahoo! and again. This is

measured four times.

If you are connected to a network, try pinging the computer you are using. Test your own

TCP/IP configuraion by trying the Loopback address, 127.0.0.1. Your result should be

similar to the one shown below.

Copyright © 2002 Terry Felke 11/13/02 Page Network-35

Page 36: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

The tracert Utility

This is used to determine the path or route between the source and destination

systems. It also shows the time in milliseconds between hops in the route. Each “hop” is

the next router in the path to the destination.

The syntax is:

tracert IP Address

or

tracert Domain Name

Try launching a Command Window and typing "tracert isoc-chicago.org". A

sample screen shot is below and shows the path from the source computer, located on a

network in the suburban Chicago area to the destination computer, located in downtown

Chicago.

If you prefer a more visual listing, try out the Visual Trace Route Application at

http://www.visualroute.com/server.html.

Copyright © 2002 Terry Felke 11/13/02 Page Network-36

Page 37: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

The netstat Command

This is used to display the contents of data structures related to the network. The

options will vary with the Operating System. Launch a Command Window and type

"netstat -?" to determine the options available to you.

The syntax is:

netstat

or

netstat options

A screen shot of "netstat -a" to display all connections and listening ports is

shown below for a computer named "peace".

The ipconfig Command

The ipconfig Command is used with Windows NT and Windows 2000 (but also

works with Windows 95 and Windows 98). This is used to display the IP Configuration.

The syntax is:

ipconfig options

or

Copyright © 2002 Terry Felke 11/13/02 Page Network-37

Page 38: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

ipconfig /All

The parameter "/All" will display all the IP-related configuration information. See a

sample screen shot below

The winipcfg Command

The winipcfg Command is used with Windows 95, Windows 98, and Windows

Me. This is used to display a dialog box that shows the network IP Configuration for your

computer.

The syntax is:

winipcfg

Another way to launch this command is to select Start, Run, and type in

"winipcfg", click OK.

A screen shot of the IP Configuration is shown below.

The arp Command

The purpose of the arp command is to display Address Resolution Protocol

(ARP) information. ARP is used to resolve software addresses (such as IP Addresses)

to hardware addresses (such as MAC or Adapter Addresses).

The syntax to display the Arp cache is:

arp -a

Copyright © 2002 Terry Felke 11/13/02 Page Network-38

Page 39: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

This section has provided you with an overview of tools that can be used to

diagnose web site and network problems. As a web developer, you may need to use

these tools when connectivity problems initially occur. Contact your network

administrator or network engineer to resolve the problems. Your network administrator

may need to analyze the network traffic to investigate the problem. Commercial tools

that perform this function are described next.

Network Analyzers

Commercial applications can be purchased that will monitor, capture, and

analyze network traffic. These can be useful in establishing a baseline and monitoring

the state of the network over time. They are also helpful in troubleshooting network

slowdowns and bottlenecks. A partial screen shot of a packet viewed with an analyzer is

shown below.

More information about network analyzers may be found at Sniffer

(http://sniffer.com), Agilent (http://www.network-analyzer.com/) and

Ethereal (http://ethereal.planetmirror.com/).

Copyright © 2002 Terry Felke 11/13/02 Page Network-39

Page 40: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

The next section completes our overview of networking concepts with a

discussion of port numbers and servers used on the Internet.

Port Numbers

When using TCP/IP, a Port Number is used by a client program (such as a web

browser) to specify a particular server program (such as a web server). Certain

applications that use TCP/IP such as the Web protocol, HTTP, have ports with pre-

assigned numbers. These are "well known ports" that have been assigned by the

Internet Assigned Numbers Authority (IANA). Other application processes are given port

numbers dynamically for each connection.

Port numbers range from 0 to 65535. Ports 0 to 1023 are reserved for use by

certain privileged services. For example, port 80 is the default for HTTP, port 20 and port

21 are reserved for FTP, port 25 is reserved for SMTP. See the IANA list of Well Known

Port Numbers at http://www.iana.org/assignments/port-numbers.

Servers Used on the Internet

In a traditional client/server network, the purpose of the server is to share files,

databases, and applications with the client nodes on the network. With an

interconnected network of computer networks – the role of the server becomes more

diversified and there are a number of types of servers used. This section discusses the

more common types of servers.

• File Server

The purpose of a file server is to store data files and programs on a network.

• Print Server

The purpose of a print server is to allow multiple users to print to the same

physical printer. A print queue stores print requests until they are transmitted to

the printer.

Copyright © 2002 Terry Felke 11/13/02 Page Network-40

Page 41: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

• Web Server

Web servers use HTTP and listen for web page requests on Port 80, the port

assigned to HTTP. Popular web server software includes Apache Web Server,

Microsoft Internet Information Server, Personal Web Server, and iPlanet Server.

• Proxy Server

The purpose of a proxy server is to act as an intermediary between a network

host and the destination server. Proxy servers perform a number of functions,

including security, content filtering, and caching. A proxy server can act as a

firewall and allow only HTTP traffic through to the network.

• Media Server

A media server transmits streaming audio and streaming video. Streaming media

formats generally use UDP (User Datagram Protocol) instead of TCP. UDP is

well suited to transmitting pieces of data quickly. It does not retransmit data if

there is an error. This is acceptable for video and audio because small errors in

the transmission will unlikely be noticed. A popular streaming media server is

RealNetworks RealSystem.

• Domain Name System Server

The Domain Name System (DNS) was developed to translate host computer

names into IP Addresses. It corresponds the domain names typed in Web

browsers to the physical computers connected to the Internet. For example,

“yahoo.com” translates to 216.115.108.243. The Domain Name System is

decentralized; there is no single Domain Name database. Rather, the DNS is

distributed on name servers all over the Internet.

• FTP

An FTP (File Transfer Protocol) server is used to upload and download files from

Copyright © 2002 Terry Felke 11/13/02 Page Network-41

Page 42: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

a computer connected to the Internet. Sending files with FTP is quicker than

using HTTP or sending them as attachments to email.

• News Server

The purpose of a news server is to provide access to newsgroups and to allow

the creation of new newsgroups. News severs use the Network News Transfer

Protocol (NNTP). In order to access a news group, a user needs to launch a

news reader application such as Microsoft Outlook or Netscape Communicator.

• Certificate Server

The purpose of a certificate server is to validate keys that act as a form of

identification on the Internet or an Intranet. Keys and certificates will be

discussed in Chapter 13.

• Mail Server

The purpose of a mail server is to store and forward email messages. Several

protocols are used. SMTP (Simple Mail Transfer Protocol) is used to send email.

POP3 (Post Office Protocol) and IMAP (Internet Message Access Protocol) are

used to receive email messages.

• Transaction Server

A transaction server is a program that runs on an Internet or other network server

and manages application and database transactions on behalf of a client

computer user.

• Database Management System

A database management system (DBMS), sometimes just called a database

manager, is a program that lets one or more computer users create and access

data in a database. In a web application, the DBMS will frequently be on a

Copyright © 2002 Terry Felke 11/13/02 Page Network-42

Page 43: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

separate machine from the web server in order to maximize the processing of

both.

MIME Types

MIME (Multi-Purpose Internet Mail Extensions) is a set of rules that allow

mulitmedia documents to be exchanged among many different computer systems. MIME

was initially intended to extend the original Internet e-mail protocol, but it is also used by

HTTP. MIME provides for the exchange of seven different media types on the Internet:

audio, video, image, application, message, multipart, and text. MIME also uses subtypes

to further describe the data. The MIME type of a web page is "text/html". MIME types of

gifs and jpeg images are image/gif and image/jpeg respectively.

A Web server determines the MIME type of a file before it is transmitted to the

Web Browser. The MIME type is sent along with the document. The Web browser uses

the MIME type to determine how to display the document.

Summary

This chapter provided an overview of networking concepts. As a web developer

you should have a general understanding of networking terms related to the Web and

Internet. This makes you a more well-rounded professional and better able to

communicate with the network administrators and network engineers you will need to

work with during your career.

For a more detailed study of networking concepts, consider taking a course in

Networking. Another good way to learn about networking is to actually do it! If you've got

two computers at home, you can connect them in a peer-to-peer network and start

learning hands-on!

Visit the course web site at http://www.webdevfoundations.net for examples,

updated information, and the links listed in this chapter.

Copyright © 2002 Terry Felke 11/13/02 Page Network-43

Page 44: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

Review Questions

Multiple Choice. Choose the best answer.

1. When using _____________ topology, the network nodes are connected to each

other in a circular chain.

a. Bus

b. Star

c. Ring

d. Loop

2. The purpose of a ___________________ is to manage resources on a network.

a. network operating system

b. network topology

c. network architecture

d. none of the above

3. A _________________ amplifies the incoming signal received from one network

segment and sends it to the next.

a. switch

b. hub

c. repeater

d. network interface card

4. The official protocol of the Internet is ________________.

a. OSI Reference Model

b. TCP/IP

c. star

Copyright © 2002 Terry Felke 11/13/02 Page Network-44

Page 45: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

d. none of the above

5. This is a conceptual model that describes how information from a software

application in one computer moves through a network medium to a software application

in another computer.

a. OSI Reference Model

b. TCP/IP

c. router topology

d. none of the above

6. A ___________is a group of computers connected over a dispersed geographic area.

a. Local Area Network (LAN)

b. Metropolitan Area Network (MAN)

c. Wide Area Network (WAN)

d. none of the above

7. When using ______________, a network administrator can supervise and distribute

IP addresses from a central point and automatically assign a new IP address when a

computer connects to the network.

a. DHCP

b. CGI

c. OSI

d. none of the above

8. When using TCP/IP, a ___________ is used by a client program (such as a web

browser) to specify a particular server program (such as a web server).

Copyright © 2002 Terry Felke 11/13/02 Page Network-45

Page 46: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

a. MIME type

b. subnet mask

c. hub

d. none of the above

9. Use the __________ utility to test connectivity between source and destination

systems.

a. ipconfig

b. tracert

c. ping

d. netstat

10. The major function of a ________ is to transmit streaming audio and streaming

video.

a. web server

b. media server

c. proxy server

d. domain name server

Hands-On Exercises

1. Experiment with network diagnostic tools.

a. Check out your computer configuration. Use the information provided in the

chapter as a guide and run either ipconfig or winipcfg. Do a screen print of the

results.

b. Run the ping utility on your favorite web site. Use the information provided in

the chapter as a guide. Do a screen print of the results. Notice that the ping utility

Copyright © 2002 Terry Felke 11/13/02 Page Network-46

Page 47: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

displays the IP address of the target server and sends packets to the target

server four times. Note the round-trip travel times for those packets. Why aren’t

all the times exactly the same? Explain.

c. Run the tracert utility on your favorite web site. Use the command syntax

provided in the chapter as a guide. Do a screen print of the results. Notice the

number of “hops” that were needed to travel the route between your computer

and your favorite web site. Are you surprised? Why or why not?

Web Site Case Study

There are no Case Study assignments this chapter.

Web Research A. Find out the following about the network at your school or place of employment:

• Network Topology(s)

• Network Operating System(s)

• Number of server computers

• Number of client computers

• Network address class

Create a web page that lists the results of your research. Search the Web for

background information on the Network Operating System(s) being used. Organize your

page with a table that lists the information. Place your name in an e-mail link on the web

page. Print both the source code (from Notepad) and the browser view of your web

page.

B. Wireless Access to the Web is a topic of growing importance. Search the Web and

find information to justify why your school or employer should consider wireless acces

for their local area networks. Create a web page that informs the reader about your

findings. Include URLs of the web sites you used as resources. Place your name in an e-

Copyright © 2002 Terry Felke 11/13/02 Page Network-47

Page 48: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

mail link on the web page. Print both the source code (from Notepad) and the browser

view of your web page.

C. Visit any of the web sites referenced in the chapter that interested you. Print the home

page or one other pertinent page from the site. Create a web page that discusses the

web site you visited. Your new web page will use a table for layout, and include the use

of color and images. Write a one page summary and reaction to the web site you chose

to visit. Address the following topics:

1. What is the purpose of the site?

2. Who is their intended audience?

3. Do you believe they reach their audience?

4. Was this site useful to you? Why or why not?

5. List one interesting fact or issue that this site addressed.

6. Would you encourage others to visit this site?

7. How could this site be improved?

Chapter Review Answers

1. c

2. a

3. c

4. b

5. a

6. c

7. a

8. d

9. c

Copyright © 2002 Terry Felke 11/13/02 Page Network-48

Page 49: Web Developer Foundations: Using XHTML Bonus Networking Chapter

Web Developer Foundations: Using XHTML Bonus Networking Chapter

Copyright © 2002 Terry Felke 11/13/02 Page Network-49

10. b