Вы находитесь на странице: 1из 13

FN513 NETWORK PROGRAMMING

MOHAMAD FAIZ BIN BAHARUM SHAH 10DNS13F1026


MOKHTAR BIN MD ALI 10DNS13F1015
MOHAMMAD SYAFIQ BIN SHUIB 10DNS13F1013
Identify how network

communicate?
They will need a node on the network, each
computer needs a node a node can be an end point
or aredistribution point.

Also in order to have nodes or any network


communications for that matter you will need a
network topology.

Also in order to have nodes or any network


communications for that matter you will need a
network topology

Example of topology is Bus, Tree, Star, Mesh and


Ring.
The methods used by computers and networks to
communicate with each other is through network
protocols.

A network protocol is a set of rules for


communicating between computers. Protocols govern
format, timing, sequencing, and error control.
Without these rules, the computer cannot make
sense of the stream of incoming bits.

Example of network protocol is TCP, TCP/IP, UDP.


The Advantage Of OSI Layering
The standard model for networking protocols and
distributed application is the OSI model ( 7 network
layer)

Each layer performs a different set of functions and the


intent was to make each layer as independent as
possible from all other
Main Advantages Of Layering
Information Hiding.

Decoupling Changes.

Break up complex problem into smaller manageable


pieces.

Abstraction of implementation details.


1. Separation of implementation and specification.
2. Can change implementation as long as service
interface is maintained .

Can use functionality.


1. Upper layer can share lower layer functionality.
Internet
Architecture

A constantly changing collection of thousands of individual networks


intercommunicating with a common protocol

Described in its name, a short from of the compound word "inter-networking

Based in the very specification of the standard TCP/IP protocol, designed to


connect any two networks which may be very different in internal hardware,
software, and technical design.
Diagram of Internet
Architecture
Application Protocol

Application protocols govern various processes

such as the process for downloading a web page, or for sending e-mail.

The application protocol directs how these processes are done.

layered on top of a transport protocol.

provides the bytes that carry the messages and the responses for various
processes

helps reliably transport the bytes and makes sure they arrive in order.
network
communication?
Mistakes or fault happened in network communication and there
is a various ways to prevent the same things happened.

Example of security issues happened is banking hacks, spam,


threads and malicious mobile apps.

Example of ways to prevent from security issues is using Firewall


and Proxy Server.
Firewall
a) What is a firewall?
) A firewall protects networked computers from intentional hostile intrusion that
could compromise confidentiality or result in data corruption or denial of service.

b) What does a firewall do?


) A firewall examines all traffic routed between the two networks to see if it meets
certain criteria. If it does, it is routed between the networks, otherwise it is
stopped.

) Firewalls can filter packets based on their source and destination addresses and
port numbers.
Firewall Issue
Does not protect against internal threats, such as a
dishonest employee or an employee who unwittingly
cooperates with an external attacker.

When malware such as Trojans attempt to install, they


first must get past the firewall.

This can happen by way of email, for example. Once


installed, malware can actually disable the firewall and
processes used to run it, which is especially easy if you
have no anti-virus software.
Proxy Server

Aproxy serveris aserver(a computer system or an


application) that acts as anintermediaryfor requests
fromclientsseeking resources from other servers

A client connects to the proxy server, requesting some


service, such as a file, connection, web page, or other
resource available from a different server
Proxy Issue
If this proxy were located at ISP(Internet Service
Provider), Campuss, School and theres a bad employee
or staff inside, its also possible data theft happen.

When you visit such a website, the malware replicates


itself onto your system. Likewise, certain websites are
gateways for hackers, and visiting them would put all
your personal data at stake, due to the risk of hacking.

Вам также может понравиться