Computer Networks and the Internet

998
Recent Developments
Recent Developments

Modernization in computer networking continues at a fast pace. Advances are being made on all fronts, including use of new applications, content distribution, Internet telephony, higher transmission speeds in LANs, and faster routers. But three developments merit special

Tags computer networking, network security, p2p networking
1905
The Internet Explosion: The 1990s
The Internet Explosion: The 1990s

The 1990s were ushered in with numerous events that symbolized the continued development and the soon-to-arrive commercialization of the Internet. ARPAnet, the progenitor of the Internet, ceased to exist. MILNET and the Defense Data Network had grown in the 1980s to

Tags gui interface, killer applications, server
1063
A Proliferation of Networks: 1980 - 1990
A Proliferation of Networks: 1980 - 1990

By the end of' the 1970s, about two hundred hosts were connected to the ARPAnet. By the end of the 1980s the number af hosts connected to the public Internet, a confederation of networks looking much like today's Internet, would reach a hundred thousand. The 1980s would be

Tags minitel system, host, computer network
1205
Proprietary Networks and Internetworking: 1972-1980
Proprietary Networks and Internetworking: 1972-1980

The early ARPAnet was a single, closed network. ln order to communicate with an ARPAnet host, one had to be really connected to another ARPAnet IMP. ln the early to mid-1970s additional stand-alone packet-switching networks besides ARPAnet came into being:

Tags packet switching, network, protocol
1580
History of Computer Networking and the Internet
History of Computer Networking and the Internet

So far what we have studied, presented an overview of the technology of computer networking and the Internet. You should know enough now to impress your family and friends! However, if you really want to be a big hit at the next cocktail party, you should sprinkle your

Tags circuit switching, timeshared computers, packet switching
846
The bad guys can modify or delete messages
The bad guys can modify or delete messages

We finish this brief survey of network attacks by explaining man-in-the-middle attacks. In this class of attacks, the bad guy is inserted into the communication path between two communicating entities. Let's refer to the communicating entities as Alice and Bob, which might be

Tags network attacks, protocol stack, communicating entities
878
The bad guys can masquerade as someone you trust
The bad guys can masquerade as someone you trust

It is amazingly easy (you will have the knowledge to do so shortly as you proceed through this text!) to create a packet with an arbitrary source address, packet content, and destination address and then transmit this hand-crafted packet into the Internet, which will dutifully

Tags ip spoofing, network application, packets
1847
The bad guys can sniff packets
The bad guys can sniff packets

Many users today access the Internet via wireless devices, such as WiFi-connected laptops or handheld devices with cellular Internet connections (covered in “Wireless and Mobile Networks”). While ubiquitous Internet access is very suitable and enables excellent new

Tags packet sniffer, lan, packets
1414
The bad guys can attack servers and network infrastructure
The bad guys can attack servers and network infrastructure

A large class of security threats can be classified as denial-of-service (DoS) attacks. As the name suggests, a DoS attack renders a network, host, or other piece of infrastructure unusable by legitimate users. Web servers, e-mail servers, DNS servers (discussed in "Application

Tags computer network, packets, server
1235
The bad guys can put malware into your host via the Internet
The bad guys can put malware into your host via the Internet

We connect devices to the Internet because we want to receive/send data from/to the Internet. This contains all kinds of good stuff, including Web pages, e-mail messages, MP3s, telephone calls, live video, search engine results, and so on. But, unluckily, along with all that good stuff

Tags network application, host, computer network
Page 0 of 6 « Previous 1 2 3 4 5 6 Next »

Copy Right

The contents available on this website are copyrighted by TechPlus unless otherwise indicated. All rights are reserved by TechPlus, and content may not be reproduced, published, or transferred in any form or by any means, except with the prior written permission of TechPlus.