Access to the Web. Coverage. Basic Communication Technology. CMPT 165: Review

Similar documents
The Internet and the World Wide Web

DATA COMMUNICATION AND NETWORKS

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS

PART IV. Internetworking Using TCP/IP

ECS 15; Lectures 17 and 18. The Internet. What is the internet, and how does it work? TA feedback

ITP 140 Mobile Applications Technologies. Networks

Special expressions, phrases, abbreviations and terms of Computer Networks

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers

Twelfth Edition. Chapter 8: Wired and Wireless Communication. Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1

WAN Technologies CCNA 4

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 3. The Basics of Networking

Computers: Tools for an Information Age. Chapter 7 Networking: Computer Connections

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

Networks. Computer Technology

Typical Network Uses

Internetworking Models The OSI Reference Model

ITP 140 Mobile Applications Technologies. Networks

Chapter 3. Wired and Wireless Communication. What You Will Learn... Computers Are Your Future. What You Will Learn...

Ch. 4 - WAN, Wide Area Networks

Lecture #25: Networks and Communications. Communication and Networks. What will we learn?

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network

Layer 2 functionality bridging and switching

Data & Computer Communication

Lecture 22 Overview. Last Lecture. This Lecture. Next Lecture. Internet Applications. ADSL, ATM Source: chapter 14

Lecture 8 Winter 2006 Enterprise and Personal Communications Networks

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Wireless Networks. Communication Networks

Cisco Cisco Certified Network Associate (CCNA)

A typical WAN structure includes the following components.

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

Computers Are Your Future Tenth Edition

2. LAN Topologies Gilbert Ndjatou Page 1

PPP. Point-to-Point Protocol

Networking and Internetworking 1

1: Review Of Semester Provide an overview of encapsulation.

networks List various types of networks and their

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

It is the process of sharing data, programs, and information between two or more computers.

Data Communication and Network. Introducing Networks

COMPUTER NETWORK Model Test Paper

4.2 Virtual Circuit and Datagram Networks

Chapter 1 Communication

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG

Outline: Connecting Many Computers

Chapter 2 Communicating Over the Network

UNIT-II OVERVIEW OF PHYSICAL LAYER SWITCHING & MULTIPLEXING

Network Connectivity and Mobility

Chapter Motivation For Internetworking

Introduction to Networking

Networking interview questions

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

The City School Liaquat Campus Worksheet Module 3 Class 7 Name Class/Sec Date

Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

Full file at

Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

Chapter 8 OSI Physical Layer

VoIP Dictionary, Glossary and Terminology

4.0.1 CHAPTER INTRODUCTION

Lecture (05) Network interface Layer media & switching II

ITEC 3800 Data Communication and Network. Introducing Networks

UNIT IV -- TRANSPORT LAYER

Integrated t Services Digital it Network (ISDN) Digital Subscriber Line (DSL) Cable modems Hybrid Fiber Coax (HFC)

Internet Architecture

Lecture 1 Overview - Data Communications, Data Networks, and the Internet

Full file at Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

Frequency: it refers to the number of periods in 1 s. It is formally expressed in Hertz (Hz)

CSIS Frequency Division Multiplexing. Basic Types of Multiplexing. Frequency Division Multiplexing. Frequency Division Multiplexing.

Overview of Networks

CSC Introduction to Computers and Their Applications. Background

Position of IP and other network-layer protocols in TCP/IP protocol suite

Computer Networks and the internet. Daniel Graham Ph.D

Communication Networks

UNIT- 2 Physical Layer and Overview of PL Switching

ELC 537 Communication Networks

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview

II. Principles of Computer Communications Network and Transport Layer

CHAPTER 17 - NETWORK AMD DISTRIBUTED SYSTEMS

Introduction to Internetworking

2/29/2012. Part 1: Networking overview Part 2: Data transfer methods Part 3: Communication Channels

Review of Network Technologies

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

BROADBAND AND HIGH SPEED NETWORKS

Unit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask

ABSTRACT. that it avoids the tolls charged by ordinary telephone service

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Communicating over the Network

Data Communication. Chapter # 1: Introduction. By: William Stalling

Tutorial 2 : Networking

Digital Communication Networks

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE

CS1302 / Computer Networks

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER

Chapter 12. Network Organization and Architecture

CHAPTER 8 NETWORKS: COMMUNICATING AND SHARING RESOURCES

What is the difference between unicast and multicast? (P# 114)

Lecture 2 Communication services The Trasport Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

August AppleTalk tunneling, which allows AppleTalk data to pass through foreign networks and over point-to-point links

Transcription:

Access to the Web CMPT 165: Review Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University December 5, 2011 Access to the Web requires: a computer (of some kind) a connection to the Internet special software on the computer Internet communication software (invisible to the user) application software (visible to the user), called a browser. 1 CMPT 165: Introduction to the Internet and the WWW: Review 2 Coverage Basic Communication Technology The usefulness of a technology is determine, in part, by its coverage: If no one else has a communication service, it s useless; if everyone else has the service, it becomes a necessity. Coverage ranges between local service not available to everyone limited usefulness universal service available to everyone limited usefulness Coverage is affected by availability: to whom is the technology available? affordability: what is the initial and subsequent financial risk? Analog to Digital conversion Modulation/Demodulation Sharing Packet Switching (sharing a transmission path). Routers Connecting to the Internet CMPT 165: Introduction to the Internet and the WWW: Review 3 CMPT 165: Introduction to the Internet and the WWW: Review 4

Analog Signals Digital Signals The term analog refers to the fact that a signal is analogous of the signal it represents. Figure 1: An analog electrical signal represents the pressure variations of a sound wave. The process of taking individual values on a continuous signal at regular time intervals is called sampling. Music on compact discs is stored digitally. The sampling rate is typically 44,100 samples per second (or 44.1 khz). Microphone and speaker s are analog devices because they record and play an exact analog of sound: Analog signals are continuous in time. A continuous signal cannot be stored, or processed, in a computer since it would require an infinite amount of data. Analog signals must therefore be discretized, or digitized, to produce a a finite set of numbers, for computer use. Figure 2: A digital, or sampled, signal. CMPT 165: Introduction to the Internet and the WWW: Review 5 CMPT 165: Introduction to the Internet and the WWW: Review 6 Representing a Digital Signal Bits Computers represent data (sound, music, text, numbers, video, image) or operating instructions in binary form. The binary system is based on the number 2; each bit position in the group is worth 2 times as much as the position to the right. The binary number 1001 is evaluated as 1 2 3 +0 2 2 +0 2 1 +1 2 0 = 9 Other systems include octal and hexadecimal. The smallest unit of memory is the bit, representing the position, either on or off, of an electronic switch inside the computer hardware. A bit can represent either 0 or 1 depending on the state of the switch. The term bit is a contraction of the term binary digit. Two bits can assume 4 unique patterns/values: Binary form Decimal form 00 0 01 1 10 2 11 3 In general, n bits can assume 2 n unique values. The byte is nearly always defined as 8 bits and can therefore assume 2 8 = 256 unique values. CMPT 165: Introduction to the Internet and the WWW: Review 7 CMPT 165: Introduction to the Internet and the WWW: Review 8

Error Checking Modulation Interference from natural phenomena, distortion from electrical or magnetic interference can cause damage or loss of data. A parity bit is an extra bit added to a code before transmission to help the hardware detect errors. It is set to 1: if a sequence has an odd number of 1 bits 0: if a sequence has an even number of 1 bits. Checksum is a technique for detecting damaged bits. The software sends the sum of the numbers in the message. If a message consists of the numbers the software sends 1, 3, 5 1, 3, 5, 9 When the messages arrives, the receiving software sums all the values except the last, and then checks to ensure the sum equals the last value. Modulation was discovered as a means of transmitting voice (and other signals). To transmit a signal, the sender must have a device called a modulator, which uses 2 signals: carrier: a basic electrical signal that oscillates back and forth; a high-frequency periodic waveform modulator: a second signal containing the information being transmitted, which modulates or changes the carrier slightly. 1 0.5 0 0.5 1 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 1 0.5 0 0.5 1 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Figure 3: An example of amplitude modulation. CMPT 165: Introduction to the Internet and the WWW: Review 9 CMPT 165: Introduction to the Internet and the WWW: Review 10 Modem Connecting Computers The receiver must have a device called a demodulator, which performs the reverse function known as demodulation. The demodulator is tuned to the expected frequency and recovers the modulator, by measuring how much the incoming signal deviates from the expected carrier frequency. A is a modulator and a demodulator. Before two computers in the Internet can communicate, a must be installed at each end of the connection. How/why do we connect computers? LAN technologies were motivate by 2 trends: 1. computers had grown smaller and less expensive (goodbye expensive mainframes!) 2. computers helping with ordinary office tasks Low-cost computers meant most organizations could now have several computers. Data transfer would usually involve removable media storage devices (magnetic tapes or disks). Computer A Computer B 1 transmission line 2 Figure 4: Two computers/ s connected by a transmission line. Modems allow for data to be sent between them in both directions. CMPT 165: Introduction to the Internet and the WWW: Review 11 CMPT 165: Introduction to the Internet and the WWW: Review 12

Sharing Preventing long delays In a network, there isn t a single wire connecting each communicating computer. Transmission paths must be shared. Only one data transfer can occur on a given wire at a time. What happens when one customer s order is very large? Granting one party exclusive access of a shared transport path can delay all other parties. How do we prevent delays and long wait times? Channels: use signal modulation on multiple channels, mix them, and transmit across a cable (e.g. cable company). Taking Turns: allow one computer access to the network at a time and limit the amount of data that a computer can transfer on each turn. Though it is possible to used both, most network technologies use the second idea, called packet switching. CMPT 165: Introduction to the Internet and the WWW: Review 13 CMPT 165: Introduction to the Internet and the WWW: Review 14 Packets Packet Switching The unit of data that can be transferred at one time over a network is called a packet. The packet header includes: 1. the origin address 2. the destination address 3. the position of the packet in the message (so it can be reassembled at the destination in the correct order). Though the packet size is limited, it may contain any amount of data up to the limit. A message is divided into as many packets as are needed to accommodate the message size. Computer A Computer B packet: A C 1 origin destination place in file C D C D C shared network system Computer C Computer D Figure 6: Computer A is sharing a transmission path with Computer B by taking turns sending packets. FILE F I L E PACKETS One computer will not have to wait for another computer s entire message to be transmitted before it has the opportunity to send packets. ORIGIN: computer A DESTINATION: computer B PLACE IN FILE: first Figure 5: All data is transfer across the Internet in packets. A sender divides a message or document into packets. Packet switching allows many communications to proceed simultaneously without requiring an application to wait for all other communication to complete. CMPT 165: Introduction to the Internet and the WWW: Review 15 CMPT 165: Introduction to the Internet and the WWW: Review 16

Who uses packet switching? Extending a connection to a network Packet switching can be used by many devices: printers, scanners, video cameras, etc. Both LANs and WANs use packet switching. The Internet is a packet switching system packets from many machines traverse the Internet at the same time. A receiver reassembles the original message from the packets that arrive. A computer s (usually short) connection to a LAN may be extended using: 1. two s with wires connecting them Network wire Figure 7: Two s connected by a wire 2. two s connected via the telephone system Network dial up Telephone System dial up Figure 8: Two s connected by the telephone system CMPT 165: Introduction to the Internet and the WWW: Review 17 CMPT 165: Introduction to the Internet and the WWW: Review 18 3. two optical s connected by glass fiber: Interconnecting networks Routers optical fiber optical optical Network Figure 9: Two s connected by a fiber optic cable Expanding networks it not necessarily straight forward. Several packet switching technologies exist and they all are not compatible. A computer can have multiple circuit boards connecting it to several networks (and network technologies) simultaneously. The Internet uses such a special-purpose computers to interconnect networks called routers. CMPT 165: Introduction to the Internet and the WWW: Review 19 CMPT 165: Introduction to the Internet and the WWW: Review 20

Routing and Packet Forwarding The Internet: a network of networks The router has one major task: forward packets from one network to the other. The router receives a packet sent to it across one network, and sends the packet on to its destination across another network, a process called packet forwarding Network 1 Router D E F The Internet is not a conventional network it consists of thousands of computer networks, interconnected by routers. A router is a fundamental Internet technology; because of it, the Internet can contain multiple types of networks. Backbone network is a term used to describe a major WAN to which other networks attach. A B C Network 2 Figure 10: A computer on Network 1 can send packets to a computer on a Network 2 via a router. The networks need not be the same type. CMPT 165: Introduction to the Internet and the WWW: Review 21 CMPT 165: Introduction to the Internet and the WWW: Review 22 How do individuals connect to the Internet? Early Internet Connections Routers allow multiple networks to connect to the Internet, but how do individual computers connect? A company that provides Internet access is known as an Internet Service Provider (ISP). They will charge for 1. using the internet 2. a physical connection to the Internet (a separate dedicated connection between a site and an ISP). ISPs face conflicting goals: trying to create a technology that performs well (so customers don t have to wait) but at low cost. Last Mile Problem: the final leg of delivering connectivity from an ISP to a customer. It is typically seen as expensive because fanning out wires and cable is a considerable physical undertaking. Until mid-1990s... leased digital circuit: only available technology offering a dedicated connection to the Internet Pros:availability and control (the only traffic is that of the customer Cons: very expensive, unavailable to the individual dial-up: access through the telephone system: a computer uses a and software to connect; software instructs the to place a telephone call to the number provided by the ISP. Pros: affordable and available to the individual Cons: slower; overhead in making a connection customer Telephone System permanent Internet connection ISP Internet Figure 11: A computer connected to the Internet with a dial-up connection. CMPT 165: Introduction to the Internet and the WWW: Review 23 CMPT 165: Introduction to the Internet and the WWW: Review 24

Continuous connectivity Continuous Connectivity to Individuals A dedicated (leased) circuit offered huge advantages: 1. higher speed data delivery 2. instantaneous access and continuous availability (no waiting for the telephone to be free before using the Internet). Continuous connectivity has effected the way people use the Internet. Access is no longer a time-consuming activity. CMPT 165: Introduction to the Internet and the WWW: Review 25 During 1990s, ISPs began offering: 1. Cable : uses the same wiring as cable television cable modified for digital bi-directional signals shared wiring could reduce user s bandwidth 2. DSL: Asymmetric Digital Subscriber Line (ADSL) uses the same wiring as a conventional telephone bandwidth not shared as with cable distance limitations: difficult to reach rural areas 3. Wireless access: use radio transmission (like cell phone systems) helps solve the last mile problem: a transmitter is deployed in a geographic region (often on a utility pole) and in the customer s home All designed so that data transmission does not interfere with simultaneous television/cable signals. All provide speed, continuous and instantaneous connectivity, affordability, and use of existing wiring. CMPT 165: Introduction to the Internet and the WWW: Review 26 Communication Protocol Internet Protocol (IP) As with humans, for two computers to communicate they must share a common language. A communication protocol is an agreement that specifies a common language two computers use to exchange messages. Communication is defined by specifying: the format and meaning of a computer s message conditions under which a computer should send a message how a computer should respond when a message arrives. Internet Protocol (IP) is the key communication protocol used in the Internet specifying: the rules that define how computers communicate/connect. how a packet must be formatted how a router must forward each packet toward its destination CMPT 165: Introduction to the Internet and the WWW: Review 27 CMPT 165: Introduction to the Internet and the WWW: Review 28

IP Software The Internet: A network of networks Computer hardware does not understand IP it requires IP software. Because IP is fundamental, each computer usually has a single copy of IP software that all applications share. IP Datagrams: Each packet sent across the Internet must follow the format specified by the IP and are called IP datagrams (to distinguish from packets for other networks). IP Datagrams are not limited to the packed format used by the underlying (nor any particular) network technology Any computer connected to the Internet with IP software can create an IP datagram and send it to any other computer on the Internet. CMPT 165: Introduction to the Internet and the WWW: Review 29 IP transforms a collection of networks and routers into a seamless communication system by making the Internet function like a single, large network. Figure 12: Computers connect to a seemingly single large network. Users remain unaware of the Internet s networks and routers, just as telephone subscribers remain oblivious to the wires and switches that comprise the telephone system. CMPT 165: Introduction to the Internet and the WWW: Review 30 The Internet Reality Handling IP Datagrams The Internet actually contains a complex internal physical structure that users never see. D A C E B F The internet sends an IP datagram across a single network by placing it inside a network packet, making it appear as simply data. When the network packet arrives at the next computer, the computer opens the packet and extracts the datagram to determine how to process it. When a router determines that the datagram must be sent across another network, the router creates a new network packet. Figure 13: Datagrams travelling between computers uses a physical path: either a network, or through a router to another network. A datagram travelling across the Internet must follow a physical path from one computer to another Each network technology defines its own packet format and does not understand IP datagrams. CMPT 165: Introduction to the Internet and the WWW: Review 31 CMPT 165: Introduction to the Internet and the WWW: Review 32

IP Addresses (Syntax) Communicating on different networks Recall that computers (including routers) connected to the Internet are assigned a unique IP address. One computer must know the address of another computer before it can communicate with it. An IP address is stored in four bytes (or 32 bits) which means there are only 2 32 possible addresses When displayed by an application it is written as 4 decimal numbers, such as: 128.10.2.1 Mostly however, humans use names to specify a computer rather than a numeric address. Example: C1 communicates with C3 on a different network: IP software on C1 must create an IP datagram: header specifies the sender (C1) and receiver s (C3) IP address Since C1 and C3 are on different networks, the IP datagram must pass through a router The router examines the destination address to determine where to send it The router sends it either across a network to another router (which repeats the above step) or if it can, across the network to C3. CMPT 165: Introduction to the Internet and the WWW: Review 33 CMPT 165: Introduction to the Internet and the WWW: Review 34 Network Congestion and Delivery Error TCP helps IP guarantee delivery If two networks with the same capacity, A and B respectively, are connected to a third network D with the same capacity, packets from A and B cannot flow to network D at full speed. When cars from two lanes merge into a single lane, the traffic slows down or stops completely (traffic jam!). On the Internet, datagrams are discarded! Though routers have memory and can store data during temporary congestion, if datagrams continue to arrive faster than they can leave, the router discards them until congestion clears. Packet switching systems, like those used in the Internet, need additional communication software to ensure that data is delivered Transmission Control Protocol (TCP) is the second major communication protocol (after IP) Because packet switching hardware can become overrun with datagrams, TCP is needed to improve the Internet s reliability. As most computers attached to the Internet run IP software, most also run TCP software. Both work so well together, and are so important, the entire set of communication protocols the Internet uses is known as TCP/IP protocol suite. TCP checks for lost datagrams. Since there are usually multiple paths datagrams can take ( detouring around failed routers or networks that are down), they don t necessarily arrive at their destination in the right order. TCP automatically checks incoming datagrams and puts the data back in order. TCP also checks for duplicate datagrams and only accepts the first copy to arrive. CMPT 165: Introduction to the Internet and the WWW: Review 35 CMPT 165: Introduction to the Internet and the WWW: Review 36

Handling lost datagrams TCP/IP TCP handles lost datagram by using timers and acknowledgements. When data arrives at its final destination, the receiver s TCP software sends an acknowledgment back to the source to confirm delivery. Whenever TCP software sends data, it starts a timer using the computer s internal clock: if an acknowledgement arrives before the timer expires, TCP cancels the timer if the timer expires before an acknowledgment arrives, TCP assumes the datagram was lost and resends. TCP s strategy is adaptable: if the destination is close to the source, TCP only waits a short time before resending, if it is far, TCP waits longer. TCP measures current delays on the Internet and adjusts the timeout mechanism. Although TCP and IP can be used separately, they were designed at the same time to work as part of a unified system, without duplicating the work done by each. A computer connected to the Internet needs BOTH TCP and IP software. IP provides a way to transfer a packet from its source to its destination. TCP handles problems like datagram loss or delivery out of order. Together they provide a reliable way to send data across the Internet. Vendors aften sell a single package that includes software for TCP, IP and a few related communication protocols. Collectively, the set is known as TCP/IP software. CMPT 165: Introduction to the Internet and the WWW: Review 37 CMPT 165: Introduction to the Internet and the WWW: Review 38