Introduction to Networking & NTP

Size: px
Start display at page:

Download "Introduction to Networking & NTP"

Transcription

1 Introduction to Networking & NTP

2 Agenda Basic Network Elements Time Transfer Basics How time is transferred Accuracy limitations Test data review Live demo Typical Time Distribution Strategies Time hierarchies Peering Example networks The simplicity of configuration

3 The OSI Model Open Systems Interconnect (OSI) Reference Model Divides network communications into seven layers Each step corresponds to a step in the network transmission process Notes: First, you need rules to build a network by, this is known as the OSI Model. Those of you who know this model may be groaning, because it s like beginning with the heaviest thing. We ll talk about little pieces. The Open Systems Interconnect Reference Model describes how network transactions occur. How applications interface with the network stack (the OSI model is the network stack), all the way from bits and bytes to your browser. It divides communications into seven layers, each layer corresponds to a step in getting data across the network.

4 OSI Layers (a.k.a. the Stack ) 7. Application Layer: Interface between program applications and the network 6. Presentation Layer: reformats data to and from layers 7 and 4. Handles compression and encryption. 5. Session Layer: maintains connection between sender and receivers, handles security issues 4.Transport Layer: creates & sequences packets, handles retransmissions 3. Network Layer: defines logical addresses (router level) 2. Data Link Layer: groups data into frames 1. Physical Layer: translates bits into signals (switch & hub level) Notes: The stack is composed of these 7 layers. In the old days we used to talk about these layers as if they were more mysterious. Now it s built into everything from your phone, to application software. We won t focus on every layer. The application layer is important because it interfaces between the program UI and the network. The Physical layer is the ones and zeroes. It s literally your cable connecting to the back of the computer. In the world of network time transfer (NTP) we focus on layers 1-3, and since NTP is a protocol we interface with applications like SymmTime. Our activities today will focus on the transport layer and below. Switches and hubs operate at the physical layer. Routers operate at the network layer.

5 Basic Network NOTES: A crossover cable is as basic as a network gets. However, if I was to connect my computer to yours through a crossover cable, it would work just like the most elaborate LAN although it s not a particularly useful model unless you are trying to transfer data from one computer to the other.

6 Figurative Network Notes: As we add more elements, we get more complex collection of cables. Each computer on a LAN is directly connected to every other computer. If I want to add another computer, I need to add exponentially more connections. If I want to add another PC and a server, the connections now grow from 1 to 3 to 6. In this basic model, whenever any computer wants to send a message, the message goes out to all the other computers. You can imagine what happens when all of them want to send a message at about the same time. It can get unwieldy very quickly.

7 Concentrating Nodes Notes: So to simplify things, we move to a hub. You can find them at the computer store for 20 dollars. The hub aggregates all the cable connections into a common box. This works at the physical layer. With the hub, as with the direct connection model, all nodes see all traffic. This can lead to collisions. A hub does not add latency to NTP time traffic delivery.

8 Expanding the Network Notes: If you want to expand to the network, just add more hubs. It simplifies the layout of an extensive physical network. Hubs can be located near natural clusters of computers, and a single long cable can be used to link the hubs. However, the traffic problem will be more pronounced as a hub-only network grows. You start getting packet collisions when computers simultaneously try to send packets. When a computer sends a packet, it will temporarily abandon the transfer if it senses traffic on the line. If there are too many computers on the network, and if they re all backing off a random amount of time then trying to resend their packet, the number of collisions will grow dramatically (this generally happens above 40% utilization of the network capacity). IT administrators generally like to run between 25% and 40% network utilization. In high-speed military applications (real-time, mission-critical systems), they don t like to get above 20% utilization.

9 Improving Efficiency Switches: read physical (MAC) destination address and direct each packet to appropriate machine or subnet. Gradually replacing hubs No impact on NTP accuracy A subnet (short for subnetwork ) is an identifiably separate part of an organization s network. Typically, a subnet may represent all the machines at one geographic location or on the same local area network (LAN). Having an network divided into subnets allows it to be connected to the Internet with a single shared network address. Notes: Switches read the unique physical address (Ethernet MAC address) of every computer connected to it, and keeps track of it. The connection occurs at the physical layer. Switches do what their name describes when data comes in that is bound for a device on its MAC address list, it switches the packet to that device. The switching occurs with little latency (300ms for example). Switches do not noticeably degrade NTP accuracy. The advantage of switches is that they reduce the number of collisions on the line. Data is directed more purposefully. As the price of switches drops, hubs are rapidly being replaced in network infrastructure. Another driver of switch use is the growth of VoIP an application where data collision will compromise real-time communication. Switches also allow you to create subnets and divide your network into manageable segments.

10 Isolating Subnets Routers have physical addresses on each subnet. Uses a router table to direct traffic to destinations located outside subnet based on logical addresses (Layer 3, IP addresses). Can have a substantial impact on NTP accuracy due to buffering of data (store & forward) Notes: We now introduce routers many of us use routers at home to buffer and distribute our high-speed internet connections to computers within our homes. Routers have a physical address on each subnet. At home, the router has a physical address on your home network. The router also provides an address to your ISP. That way the router can participate in both subnets. This is done because there a finite number of IP (Internet Protocol) addresses far fewer than the number of computers. Subnets allow us to reuse and allocate the addresses as needed (in this case, assigned by the ISP). A router uses a router table to direct traffic. If a switch fails to direct traffic, it sends it to the router (like sending a letter to the post office). The router forwards the packet to the another router toward the destination. Routers are packet buffering devices and can have a significant device on NTP accuracy. The latency can be significant and unpredictable. Interesting note: What happens when the router buffer fills? That s right, it just throws the packets away. That s why we have TCP/IP (Transmission Control Protocol over Internet Protocol) to make sure that packets still get sent, even if the router dumps them.

11 Internetworking Notes: Our network s starting to get more complex. All the traffic gets shared among Hubs. Switches decide if it recognizes any of the destinations. If not, the switch sends it to the Gateway Address (the router s address). Then the router decides how to send the data on.

12 TTM Network Notes: Here s an example of the Symmetricom TT&M network. It was built in 2000 when switches were expensive so hubs are more common. There are hubs in every part of the building. An from 1st floor West gets seen by every computer on the floor. If it gets sent to another group, a switch transfers it to the mail server. The switches eliminate collisions between the data in different regions of the building. Production has its own subnet, placed behind a router. NTP servers are tested there. The router isolates the development group from the corporate network and also prevents experimental devices from taking down or slowing the network. The R&D lab is also behind a router (as a result of a blaster test flooding the entire network with packets). Also behind the primary switch are servers, license servers, time servers, data servers, etc.). Santa Rosa is connected to San Jose by dual T1 lines (each routed along different sides of San Francisco Bay). They connect to a router in San Jose and a switch to provide mutual protection. From San Jose, we connect to a firewall, then the DMZ (the area where ntp1.symmetricom.com exist and can be subject to computer hacks), and then through a final router to the Internet.

13 LAN vs WAN Speeds LAN Speeds (Ethernet most common) 10 Mbps (10BaseT) 100 Mbps (100BaseT) 1000 Mbps (Gigabit Ethernet, 1000BaseT) High speed, low latency devices Equipment: Hubs & Switches WAN Speeds Built on telecom infrastructure and widely populated with routers. Equipment: modems, routers DSL: 3 Mbps tops, typically 768 Kbps depending on distance from central office. Lower speed, higher latency devices Cable: 1-3 Mbps T1 (most common enterprise digital connection): Mbps Notes: Bottom Line: LANs are blazingly fast. WANs are not. Not only do WAN connections have narrower pipes, but there are many routers on WANS introducing latencies to the network.

14 Time Transfer Basics

15 The Toaster Analogy Time servers are network toasters. Without bread there is no toast, likewise without time clients requesting the time there is no network synchronization. Notes: The benefit of synchronization takes place at the client. Without the time client, there is no synchronization between computers.

16 How Time is Transferred with NTP Assumes symmetric path latency for outbound and return paths Notes: NTP is a client-originated protocol. The client originates the time transfer process. A small (60-90 bytes) packet is created. The client adds its own time stamp (Originate Time Stamp) and sends it to the server. The instant the server gets the packet, it time stamps it (Receive Time Stamp). That packet can sit with the server a bit. The time server does not have to replay instantaneously. Then the server adds another time stamp (Transmit Time Stamp) and sends it back to the client. The time the client receives the packet along with the three packet time stamps is used to calculate the Client Time Offset. The client clock is then adjusted by the offset. One assumption: This assumes that the network latency is symmetric on both the path to and from the time server. On a LAN this may be relatively true because LANs tend to be very fast. However, an Internet-based transaction may use different router-buffered paths. Over a LAN, the synch may be accuracy between 1-2 ms. In a WAN, the swing could be as great as 1-30 ms.

17 NTP Time Transfer Limitations Notes: Let s look at delay. The stack delay might be on the order of microseconds at each end. The majority occurs on the transit data path. Also, NTP is often not a priority task in the operating system which can cause further delay. The primary contributor to an inaccurate clock offset error correction though will be the asymmetric network delays. These delays are worse when time is being retrieved over the Internet.

18 Contributors to Time Offsets From Time Servers IP stack delays ~ low milliseconds, 100 s of microseconds Routers ~10 s to 100 s of milliseconds Buffer delays Asymmetrical path latency Client computer oscillator drift Infrequent client clock updates Notes: Again, IP stack delay is minimal, and the routers can add significant (and asymmetric) latency. You can also contribute to the error by having a client clock that drifts and is not updated frequently. The left window shows the results of updating a PC system clock every 30 seconds. The clock was reasonably accurate (97% of the time the client clock was not adjusted). The outlier at the high end is a conflict with the Windows Time Service (WTS). Every 6 hours, the WTS would correct the clock to an inaccurate time (off by ~10 ms). Then the accurate clock would correct it 30 seconds later. (See slide 31 for a larger graph of this data). The right window is a real-time test. Different time servers around the country showed different latencies, as would be expected. However, the experiment was done on a Sunday afternoon, so many of these latencies were mitigated. Still, there were a few ms offsets to a server as close as San Jose from Santa Rosa (100 miles). If you sync to an outlier and then drift, you can get inaccurate time.

19 Accuracy Customers Require Source: Customer Survey March 2004 Source: MSR/Distr. Survey March 2004 Notes: When customers were surveyed, most (88%) felt that it was OK if they were synchronized within a millisecond of the correct time. These are customers who own time servers. If you ask Symmetricom personnel, we thought as a group that customers had to have at least a millisecond accuracy. We may be overestimating many customers real needs.

20 Protocols Notes: UDP is a connectionless, fire and forget protocol. Time protocols are all UDP. If you are transferring a file or seeing a web page, it s TCP. TCP assures that the data gets through.

21 UDP/IP vs TCP/IP Transport IP: Internet Protocol Best effort protocol TCP: Transmission Control Protocol Connection oriented connect - send - check - send/resend check disconnect Best for moving data or control: web pages, , telnet, etc. UDP: User Datagram Protocol Connectionless Send only fire & forget * Time is generally transferred using UDP * Better to retry (using UDP) at a later time than to subject time packets to the TCP error checking/resending latencies Time clients will retry if no packet received back from time server (seconds to minutes before retry) Notes: Both TCP and UDP are using Internet Protocol (which we remember is best effort, where packets can be thrown away by routers). TCP is connection-oriented where the packet transfer is verified via the protocol. That s important if you are sending an or an important file. With a time packet, you want to minimize latency; and it doesn t really matter if the packet gets dropped. The longer the packed is held, the less valuable it is. Time marches on. If the client doesn t get a response, it tries again with another packet at a later time.

22 Typical Time Distribution Strategies

23 General Time Distribution Notes: A basic time distribution system. Here we have two Stratum 0 sources (GPS, ACTS dial-up) that connect to Stratum 1 servers (the time servers that Symmetricom sells), by radio, satellite or modem. Anything below can be a client or another time server. This system is reasonably robust. Each client has dual connections to a server in the next Stratum. If one connection or device fails (perhaps the first Stratum 0 Primary reference loses its GPS antenna), a second source of equal validity is brought on-line. Any element can be removed, and the accuracy of the time network is preserved.

24 Peering Notes: This system is functional, but slightly less robust This configuration uses NTP peering where time servers in the same Stratum measure each others time. The Stratum 0 reference here has no redundancy, but its connection does. If the left Stratum 1 server has it s connection severed (perhaps the cable is disconnected), it gets time from a secondary connection to another Stratum 1 server in the system. Because it is not connecting directly to the Primary reference, the Stratum 1 server is now considered to be Stratum 2. In turn, it s clients become relegated to Stratum 3. Peering is better than no redundancy, and is better than falling back to an unknown source outside the network.

25 A Basic NTP Network Notes: This network is not robust. There s a single primary connection to a single Network Time Server. If the connection to the server fails, or GPS is disconnected, then all clocks on the network will start drifting.

26 A Robust NTP Network Notes: This network is far more robust. Redundant Stratum 1 time servers are connecting to independent GPS Stratum 0 sources. The Stratum 1 servers are also peered. Any component can be removed without compromising time accuracy.

27 A Less Secure NTP Network Notes: If you do not want redundant time servers, the Stratum 1 server and Stratum 2 clients can use an Internet Time Server as a secondary source. The disadvantage is that customers have to open up Port 123 in their firewalls, which many IT folks are loath to do ( a closed port is a good port ). It also subjects you to a time source that may well be inaccurate and unreliable.

28 Configuring for Redundancy Notes: It s easy to configure for redundancy. SymmTime and Domain Time II both allow multiple secondary and Internet time servers to be configured. With the S100, it s a simple web-based utility. Please refer to slides for screen shots of this feature.

29 Summary Time servers are great for LANs but time transfer accuracy degrades over WANs (i.e. the Internet) The achievable 1-10 millisecond time transfer accuracy meets most customer needs Good time client software is essential for synchronization success Redundant time servers and/or peering assure a robust time distribution network

30 Intro to Networking & NTP Thanks for your time questions?

31 Pentium PC Clock Drift

32 SymmTime Server Config Notes: This shows the panels in SymmTime where additional time servers are configured as fallback sources of time.

33 Domain Time II Full Client Notes: This panel shows where up to four time servers can be configured in Domain Time II. In addition there are versatile behaviors that can be selected to optimize time accuracy.

34 S100 Servers & Peers Server A persistent client mode association with the specified remote server. In this mode the local clock can be synchronized to the remote server, but the remote server can never be synchronized to the local clock. Peer A persistent symmetric-active mode association with the specified remote peer. In this mode the local clock can be synchronized to the remote peer or the remote peer can be synchronized to the local clock. This is useful in a network of servers where, depending on various failure scenarios, either the local or remote peer may be the better source of time. Notes: In the S100 network time server you can configure Servers to get the time from and operate as Stratum II (or less) server. You can also establish peer relationships with other servers. This is useful if the GPS connection is lost and time can be obtained from other time servers.

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Data & Computer Communication

Data & Computer Communication Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects

More information

Internetworking Models The OSI Reference Model

Internetworking Models The OSI Reference Model Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)

More information

Digital Communication Networks

Digital Communication Networks Digital Communication Networks MIT PROFESSIONAL INSTITUTE, 6.20s July 25-29, 2005 Professor Muriel Medard, MIT Professor, MIT Slide 1 Digital Communication Networks Introduction Slide 2 Course syllabus

More information

Defining Networks with the OSI Model. Module 2

Defining Networks with the OSI Model. Module 2 Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the

More information

ITP 140 Mobile Applications Technologies. Networks

ITP 140 Mobile Applications Technologies. Networks ITP 140 Mobile Applications Technologies Networks A First Look Under the Hood 2 3 Communication Channels Mediums for transporting data from one system to another Physical Twisted Pair (CAT-3, CAT-5/6)

More information

Chapter 2 Network Models 2.1

Chapter 2 Network Models 2.1 Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Network Models n Network Architecture: n A) Hardware: at the core of any network;

More information

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1 Internetworking Concepts Overview 2000, Cisco Systems, Inc. 2-1 2000, Cisco Systems, Inc. www.cisco.com ICND v1.0a 2-2 Objectives On completion of this chapter, you will be able to perform the following

More information

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers.

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers. Switches Routers PCs Networking 101 Introduction to Ethernet networking basics; Network types, components, configurations Servers Hubs Protocols Cat-5 UTP NICs Page 1 July 28, 2000 Network Types LAN Local

More information

Chapter 4 NETWORK HARDWARE

Chapter 4 NETWORK HARDWARE Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.

More information

Introduction to VoIP. Cisco Networking Academy Program Cisco Systems, Inc. All rights reserved. Cisco Public. IP Telephony

Introduction to VoIP. Cisco Networking Academy Program Cisco Systems, Inc. All rights reserved. Cisco Public. IP Telephony Introduction to VoIP Cisco Networking Academy Program 1 Requirements of Voice in an IP Internetwork 2 IP Internetwork IP is connectionless. IP provides multiple paths from source to destination. 3 Packet

More information

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review. THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided. 223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

Introduction to Open System Interconnection Reference Model

Introduction to Open System Interconnection Reference Model Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding

More information

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer Layering in Networked computing OSI Model TCP/IP Model Protocols at each layer Learning outcomes Understand the need of layering in Networked computing Understand the OSI model and the tcp/ip model Understand

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Principles behind data link layer services

Principles behind data link layer services Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Lecture 4 Audio Transcript Slide 1 Welcome to Networking and Health Information Exchange, ISO Open System Interconnection

More information

Chapter 6: Network Communications and Protocols

Chapter 6: Network Communications and Protocols Learning Objectives Chapter 6: Network Communications and Protocols Understand the function and structure of packets in a network, and analyze and understand those packets Understand the function of protocols

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Introduction Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) Computer Networking A background of important areas

More information

ISO/OSI Model and Collision Domain NETWORK INFRASTRUCTURES NETKIT - LECTURE 1 MANUEL CAMPO, MARCO SPAZIANI

ISO/OSI Model and Collision Domain NETWORK INFRASTRUCTURES NETKIT - LECTURE 1 MANUEL CAMPO, MARCO SPAZIANI ISO/OSI Model and Collision Domain NETWORK INFRASTRUCTURES NETKIT - LECTURE 1 MANUEL CAMPO, MARCO SPAZIANI ISO/OSI Model ISO: International Organization for Standardization OSI: Open Systems Interconnection

More information

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3 Slide 1 Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 2 Unit

More information

1: Review Of Semester Provide an overview of encapsulation.

1: Review Of Semester Provide an overview of encapsulation. 1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

Internet Design Principles and Architecture

Internet Design Principles and Architecture Internet Design Principles and Architecture Venkat Padmanabhan Microsoft Research 2 April 2001 Venkat Padmanabhan 1 Lecture Outline A brief history of the Internet How is the Internet different from the

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

WL5041 Router User Manual

WL5041 Router User Manual TECOM WL5041 Router User Manual TECOM CO., LTD. March 2003 2003 by TECOM CO., LTD. All rights reserved. Printed in Taiwan Table of contents Package Contents--------------------------------------- 2 Installing

More information

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model) Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.

More information

Networking and Internetworking 1

Networking and Internetworking 1 Networking and Internetworking 1 Today l Networks and distributed systems l Internet architecture xkcd Networking issues for distributed systems Early networks were designed to meet relatively simple requirements

More information

Configuring your VLAN. Presented by Gregory Laffoon

Configuring your VLAN. Presented by Gregory Laffoon Configuring your VLAN Presented by Gregory Laffoon 1 Overview of Networking Terms Networking Terms Overview OSI Model Defines a networking framework for implementing protocols in seven layers Control is

More information

ITP 140 Mobile Applications Technologies. Networks

ITP 140 Mobile Applications Technologies. Networks ITP 140 Mobile Applications Technologies Networks A First Look Under the Hood 2 3 Communication Channels Mediums for transporting data from one system to another Physical Twisted Pair (CAT-3, CAT-5/6)

More information

Networking By: Vince

Networking By: Vince Networking 192.168.1.101 By: Vince Disclaimer I am NOT a Networking expert you might ask questions that I don t know the answer to Networking is hard to teach but I know how to do your homeworks so that

More information

Revision of Previous Lectures

Revision of Previous Lectures Lecture 15 Overview Last Lecture Local area networking This Lecture Wide area networking 1 Source: chapters 8.1-8.3, 17.1, 18.1, 18.2 Next Lecture Wide area networking 2 Source: Chapter 20 COSC244 Lecture

More information

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained

More information

INTRODUCTION. What You Need to Read. What this LANbook Covers

INTRODUCTION. What You Need to Read. What this LANbook Covers Qwest DSLSM LANbook INTRODUCTION What You Need to Read If you are self-installing Qwest DSL on a local area network in your home or business, start with Chapter 1: Welcome to the Qwest DSL LANbook on page

More information

Data Communication and Network. Introducing Networks

Data Communication and Network. Introducing Networks Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect

More information

ITEC 3800 Data Communication and Network. Introducing Networks

ITEC 3800 Data Communication and Network. Introducing Networks ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You

More information

CSCI Computer Networks

CSCI Computer Networks CSCI-1680 - Computer Networks Chen Avin (avin) Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Peterson & Davie, Rodrigo Fonseca Administrivia Sign and hand in Collaboration

More information

CS 3640: Introduction to Networks and Their Applications

CS 3640: Introduction to Networks and Their Applications CS 3640: Introduction to Networks and Their Applications Fall 2018, Lecture 2: More layering and the end-to-end principle. Instructor: Rishab Nithyanand Teaching Assistant: Md. Kowsar Hossain 1 Today in

More information

CCNA Guide to Cisco Networking, Third Edition

CCNA Guide to Cisco Networking, Third Edition Review Questions 1. Which of the following best describes the Presentation layer? b. Translates, encrypts, or prepares data from the Application layer for network transmission c. Handles routing information

More information

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK OSI Model Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK What is OSI Model? Open Systems Interconnection Reference Model Developed in 1984 by the International Standards

More information

Lecture A4 Network / Internet. Computing and Art : Nature, Power, and Limits CC 3.12: Fall 2007

Lecture A4 Network / Internet. Computing and Art : Nature, Power, and Limits CC 3.12: Fall 2007 Lecture A4 Network / Internet Computing and Art : Nature, Power, and Limits CC 3.12: Fall 2007 Instructor Functionalia Chipp Jansen, chipp@sci.brooklyn.cuny.edu Course Web Page http://www.sci.brooklyn.cuny.edu/~chipp/cc3.12/

More information

Lecture (02) The TCP/IP Networking Model

Lecture (02) The TCP/IP Networking Model Lecture (02) The TCP/IP Networking Model Dr. Ahmed M. ElShafee ١ Agenda Introduction to networking architecture Historical background The TCP/IP Protocol Architecture The TCP/IP Application Layer The TCP/IP

More information

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets

More information

System Programming. Introduction to computer networks

System Programming. Introduction to computer networks Content : by Dr. B. Boufama School of Computer Science University of Windsor Instructor: Dr. A. Habed adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction to Computer

More information

MODERNIZATION OF AUTOMATIC SURFACE WEATHER OBSERVING SYSTEMS AND NETWORKS TO UTILIZE TCP/IP TECHNOLOGY

MODERNIZATION OF AUTOMATIC SURFACE WEATHER OBSERVING SYSTEMS AND NETWORKS TO UTILIZE TCP/IP TECHNOLOGY MODERNIZATION OF AUTOMATIC SURFACE WEATHER OBSERVING SYSTEMS AND NETWORKS TO UTILIZE TCP/IP TECHNOLOGY Olli Ojanperä, Hannu Heikkinen and Hannu M. Heikkinen Vaisala Oyj, P.O.Box 26, FIN-00421 Helsinki,

More information

Distributed Queue Dual Bus

Distributed Queue Dual Bus Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover

More information

Network Model: Each layer has a specific function.

Network Model: Each layer has a specific function. OBJECTIVES: To discuss the OSI model and its layer architecture and to show the interface between the layers. To briefly discuss the functions of each layer in the OSI model. To introduce the TCP/IP protocol.

More information

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,

More information

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016 Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at

More information

History of TCP/IP and Internet (continued) TCP/IP. History of TCP/IP and Internet. History of TCP/IP and Internet

History of TCP/IP and Internet (continued) TCP/IP. History of TCP/IP and Internet. History of TCP/IP and Internet History of TCP/IP and Internet (continued) slide 3 TCP/IP slide 1 DARPA was the main funding agency for packet-switched research in the USA DOD began working on the Internet in the mid 1970s design a protocol

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

Full file at

Full file at Guide to Networking Essentials, Sixth Edition 2-1 Chapter 2 Network Hardware Essentials At a Glance Instructor s Manual Table of Contents Overview Objectives Tips Quick Quizzes Class Discussion Topics

More information

Fundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security

Fundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security Fundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services

More information

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services

More information

Department of Industrial Engineering. Sharif University of Technology. Contents: The role of managers in Information Technology (IT)

Department of Industrial Engineering. Sharif University of Technology. Contents: The role of managers in Information Technology (IT) Department of Industrial Engineering Sharif University of Technology Session# 14 Contents: The role of managers in Information Technology (IT) Organizational Issues Information Technology Operational and

More information

Internet Architecture & Performance. What s the Internet: nuts and bolts view

Internet Architecture & Performance. What s the Internet: nuts and bolts view Internet Architecture & Performance Internet, Connection, Protocols, Performance measurements What s the Internet: nuts and bolts view millions of connected computing devices: hosts, end systems pc s workstations,

More information

Chapter 11: Wide-Area Networks and the Internet

Chapter 11: Wide-Area Networks and the Internet Chapter 11: Wide-Area Networks and the Internet MULTIPLE CHOICE 1. MAN stands for: a. Manchester Access Network c. Metropolitan-Area Network b. Multiple-Area Network d. Multiple Access Network 2. Packet

More information

Introduction to Networking Devices

Introduction to Networking Devices Introduction to Networking Devices Objectives Explain the uses, advantages, and disadvantages of repeaters, hubs, wireless access points, bridges, switches, and routers Define the standards associated

More information

EE-379 Embedded Systems and Applications Introduction to Ethernet

EE-379 Embedded Systems and Applications Introduction to Ethernet EE-379 Embedded Systems and Applications Introduction to Ethernet Cristinel Ababei Department of Electrical Engineering, University at Buffalo Spring 2013 Note: This course is offered as EE 459/500 in

More information

Network Protocols - Revision

Network Protocols - Revision Network Protocols - Revision Luke Anderson luke@lukeanderson.com.au 18 th May 2018 University Of Sydney Overview 1. The Layers 1.1 OSI Model 1.2 Layer 1: Physical 1.3 Layer 2: Data Link MAC Addresses 1.4

More information

CSE/EE 461 Lecture 16 TCP Congestion Control. TCP Congestion Control

CSE/EE 461 Lecture 16 TCP Congestion Control. TCP Congestion Control CSE/EE Lecture TCP Congestion Control Tom Anderson tom@cs.washington.edu Peterson, Chapter TCP Congestion Control Goal: efficiently and fairly allocate network bandwidth Robust RTT estimation Additive

More information

Lecture (02) The TCP/IP Networking Model

Lecture (02) The TCP/IP Networking Model Agenda ١ Lecture (02) The TCP/IP Networking Model Dr. Ahmed M. ElShafee Introduction to networking architecture Historical background The TCP/IP Protocol Architecture The TCP/IP Application Layer The TCP/IP

More information

Wireless-G Router User s Guide

Wireless-G Router User s Guide Wireless-G Router User s Guide 1 Table of Contents Chapter 1: Introduction Installing Your Router System Requirements Installation Instructions Chapter 2: Preparing Your Network Preparing Your Network

More information

Data Networks. Lecture 1: Introduction. September 4, 2008

Data Networks. Lecture 1: Introduction. September 4, 2008 Data Networks Lecture 1: Introduction September 4, 2008 Slide 1 Learning Objectives Fundamental aspects of network Design and Analysis: Architecture: layering, topology design, switching mechanisms Protocols:

More information

In this lecture we cover a number of networking issues pertinent to the support of distributed computing. Much of the material is covered in more

In this lecture we cover a number of networking issues pertinent to the support of distributed computing. Much of the material is covered in more In this lecture we cover a number of networking issues pertinent to the support of distributed computing. Much of the material is covered in more detail in CS 168, and many slides are taken from there.

More information

Lecture 2. Computer Networks Models. Network Models 1-1

Lecture 2. Computer Networks Models. Network Models 1-1 Lecture 2 Computer Networks Models Network Models 1-1 Agenda Introduction to the Internet Reference Models for Computer Networks The OSI Model The TCP/IP Model Network Models 1-2 Announcements Bonus -

More information

Next Steps Spring 2011 Lecture #18. Multi-hop Networks. Network Reliability. Have: digital point-to-point. Want: many interconnected points

Next Steps Spring 2011 Lecture #18. Multi-hop Networks. Network Reliability. Have: digital point-to-point. Want: many interconnected points Next Steps Have: digital point-to-point We ve worked on link signaling, reliability, sharing Want: many interconnected points 6.02 Spring 2011 Lecture #18 multi-hop networks: design criteria network topologies

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview IT114 NETWORK+ Course Objectives Upon successful completion of this course, the student will be able to: 1. Identify the devices and elements of computer networks; 2. Diagram network models using the appropriate

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking Lecture 2 The OSI model Chapter 2, specifically pages 42-58 Dave Novak School of Business Administration, University of Vermont Sources: 1) Network+ Guide to Networks, Dean 2013 2) Comer, Computer Networks

More information

Introduction to Networking

Introduction to Networking Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI

More information

Chapter 2 Network Models 2.1

Chapter 2 Network Models 2.1 Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 2-1 LAYERED TASKS We use the concept of layers in our daily life. As an example,

More information

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements? 95 Chapter 7 TCP/IP Protocol Suite and IP Addressing This chapter presents an overview of the TCP/IP Protocol Suite. It starts with the history and future of TCP/IP, compares the TCP/IP protocol model

More information

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. The Internet 9.1 Introduction The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. Associated with each access network - ISP network, intranet,

More information

SUBJECT: DATA COMMUNICATION AND NETWORK SEMESTER: V SEMESTER COURSE: BCA SUBJECT TEACHER: Dr.K.Chitra Assistant Professor, Department of Computer

SUBJECT: DATA COMMUNICATION AND NETWORK SEMESTER: V SEMESTER COURSE: BCA SUBJECT TEACHER: Dr.K.Chitra Assistant Professor, Department of Computer SUBJECT: DATA COMMUNICATION AND NETWORK SEMESTER: V SEMESTER COURSE: BCA SUBJECT TEACHER: Dr.K.Chitra Assistant Professor, Department of Computer Science Chapter - 2 Switching and Network Architecture

More information

Chapter 7. Local Area Network Communications Protocols

Chapter 7. Local Area Network Communications Protocols Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate

More information

COMS Introduction to Computers. Networking

COMS Introduction to Computers. Networking COMS 1001 Introduction to Computers Networking What's Ahead Networking layers Network Speeds Protocols, sockets, client/server Routing, DNS, Ethernet, LANs, wireless What is a Network? Loose definition:

More information

Ch. 4 - WAN, Wide Area Networks

Ch. 4 - WAN, Wide Area Networks 1 X.25 - access 2 X.25 - connection 3 X.25 - packet format 4 X.25 - pros and cons 5 Frame Relay 6 Frame Relay - access 7 Frame Relay - frame format 8 Frame Relay - addressing 9 Frame Relay - access rate

More information

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER Transport Layer The Transport layer ensures the reliable arrival of messages and provides error checking mechanisms and data

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

Chapter 5.6 Network and Multiplayer

Chapter 5.6 Network and Multiplayer Chapter 5.6 Network and Multiplayer Multiplayer Modes: Event Timing Turn-Based Easy to implement Any connection type Real-Time Difficult to implement Latency sensitive 2 Multiplayer Modes: Shared I/O Input

More information

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017 CS 43: Computer Networks Switches and LANs Kevin Webb Swarthmore College December 5, 2017 Ethernet Metcalfe s Ethernet sketch Dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology

More information

Lecture (02, 03) Networking Model (TCP/IP) Networking Standard (OSI)

Lecture (02, 03) Networking Model (TCP/IP) Networking Standard (OSI) Lecture (02, 03) Networking Model (TCP/IP) Networking Standard (OSI) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2014, Computer Networks II Agenda Introduction to networking architecture Historical

More information

- Hubs vs. Switches vs. Routers -

- Hubs vs. Switches vs. Routers - 1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing

More information

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine Computer Science Department 1 / 33 1 COS 140: Foundations

More information

CSE 461 Module 10. Introduction to the Transport Layer

CSE 461 Module 10. Introduction to the Transport Layer CSE 461 Module 10 Introduction to the Transport Layer Last Time We finished up the Network layer Internetworks (IP) Routing (DV/RIP, LS/OSPF, BGP) It was all about routing: how to provide end-to-end delivery

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

Layering and Addressing CS551. Bill Cheng. Layer Encapsulation. OSI Model: 7 Protocol Layers.

Layering and Addressing CS551.  Bill Cheng. Layer Encapsulation. OSI Model: 7 Protocol Layers. Protocols CS551 Layering and Addressing Bill Cheng Set of rules governing communication between network elements (applications, hosts, routers) Protocols define: Format and order of messages Actions taken

More information

Introduction to TCP/IP networking

Introduction to TCP/IP networking Introduction to TCP/IP networking TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute TCP : Transmission Control Protocol HTTP, FTP, ssh What is an internet? A set

More information

Introduction to Protocols

Introduction to Protocols Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These

More information

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT Network Basics Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT E-mail :Agha.m@mcit.gov.af Cell:0700148122 After this lesson,you will be able to : Define

More information

Why You Should Consider a Hardware Based Protocol Analyzer?

Why You Should Consider a Hardware Based Protocol Analyzer? Why You Should Consider a Hardware Based Protocol Analyzer? Software-only protocol analyzers are limited to accessing network traffic through the utilization of mirroring. While this is the most convenient

More information

Vorlesung Kommunikationsnetze

Vorlesung Kommunikationsnetze Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

Connectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP)

Connectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP) Lecture (07) OSI layer 4 protocols TCP/UDP protocols By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU Fall2014, Computer Networks II Introduction Most data-link protocols notice errors then discard frames

More information

Announcements. CS 5565 Network Architecture and Protocols. Outline for today. The Internet: nuts and bolts view. The Internet: nuts and bolts view

Announcements. CS 5565 Network Architecture and Protocols. Outline for today. The Internet: nuts and bolts view. The Internet: nuts and bolts view Announcements CS 5565 Network Architecture and Protocols Lecture 2 Godmar Back Created Lectures Page Created CS5565 Forum Use this to find a project partner All projects will be done in groups of up to

More information