Computer Network Architectures and Protocols SECOND EDITION

Similar documents
Basic Concepts in Information Theory and Coding. The Adventures of Secret Agent 00111

Modeling and Analysis of Computer Communications Networks

HIGH-SPEED COMMUNICATION NETWORKS

Network Performance Analysis

Engineering of computer networking protocols : an historical perspective

COMMUNICATION SYSTEMS The State of the Art

Introduction. Communication

COSO Enterprise Risk Management

Introduction to Internetworking

ARCHITECTURE AND CAD FOR DEEP-SUBMICRON FPGAs

Chapter 1: Introduction

Switching on our smartphone and sending an to a friend living 5000 km from our home is something that we take for granted, but that involves a

The Internet of Things

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD

FINITE FIELDS FOR COMPUTER SCIENTISTS AND ENGINEERS

Computer Science Workbench. Editor: Tosiyasu L. Kunii

COMPONENT-ORIENTED PROGRAMMING

TIME-CONSTRAINED TRANSACTION MANAGEMENT. Real-Time Constraints in Database Transaction Systems

Guide to RISC Processors

Fundamentals of Operating Systems. Fifth Edition

xiii A. Hayden Lindsey IBM Distinguished Engineer and Director, Studio Tools Foreword

Visualization in Supercomputing

MULTIMEDIA TOOLS AND APPLICATIONS

Research Directions in Database Security

COMPUTATIONAL DYNAMICS

Guide to OSI and TCP/IP Models

Introduction to Computer Networking

Introduction to Information Science and Technology 2017 Networking I. Sören Schwertfeger 师泽仁

Optical Network Design and Modelling

FUZZY DATABASES Principles and Applications

Graphics Programming in c++

Optical Burst Switched Networks

INFORMATION SECURITY FOR MANAGERS

MOBILE AND PERSONAL COMMUNICATION SERVICES AND SYSTEMS

Delivering the Mail. Your Name Keyboarding II xx Period Mr. Behling. Current Date

Using MSC/NASTRAN: Statics and Dynamics

L1: Introduction to Communication Networks (Telegraph & Telephone) Outline

INVERSE PROBLEMS IN GROUNDWATER MODELING

PERFORMANCE ANALYSIS OF REAL-TIME EMBEDDED SOFTWARE

Exploiting Distributed Resources in Wireless, Mobile and Social Networks Frank H. P. Fitzek and Marcos D. Katz

Computer Networks. Introduction to Network. Dr. Adel Gaafar Abd Elrahim

High Performance Datacenter Networks

High-Speed Networking: A Systematic Approach to High-Bandwidh Low-Latency Communication

TASK SCHEDULING FOR PARALLEL SYSTEMS

Chapter 1 Introduction 1.1

Chapter Two. The OSI Model

The History and the layers of the OSI Model 30 - October

High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication

Facilitator. Introduction to IT Networking for Facilities Managers. Class Logistics

Lecture (03) Circuit switching

Programming with Turing and Object Oriented Turing

"Charting the Course... ITIL 2011 Operations Support Analysis (OSA) Certification Program. Course Summary

Is IPv4 Sufficient for Another 30 Years?

Functional Programming in R

Software Development for SAP R/3

Microprocessor Theory

C++ Programming for Programmers

MASTERING COBOL PROGRAMMING

b) Diverse forms of physical connection - all sorts of wired connections, wireless connections, fiber optics, etc.

Tutorials and Practicals 31W6 ADMINISTRIVIA. A Communications Model. Communications and Networks. Simplified Communications

OSI Layers (Open System Interconnection)

CPS221 Lecture: Layered Network Architecture

Lesson 1: Network Communications

INTRUSION DETECTION AND CORRELATION. Challenges and Solutions

VIDEO CODING. The Second Generation Approach

Fig (1) client and Server network

Data Communications. From Basics to Broadband. Third Edition. William J. Beyda

Microsoft Word 2013 Introductory By Misty E Vermaat

A Structured Programming Approach to Data

Understanding TeleCom Networks Today II The World of Data

Internetworking Models The OSI Reference Model

MULTIMEDIA DATABASE MANAGEMENT SYSTEMS

An Introduction to Programming with IDL

I. Announcments II. What does ICANN (Internet Corporation for Assigned Names and Numbers) do? a. Draws up a contract with each registry b.

Computer-Aided Design in Magnetics

Request for Comments: 518. SRI-ARC 19 June 1973

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?

Applied Computer Networks. Introduction (2 nd Edition) John Morton

L1: Introduction. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806

Computer Networks. General Course Information. Addressing and Routing. Computer Networks 9/8/2009. Basic Building Blocks for Computer Networks

C++ Programming for Programmers using Microsoft Visual C Professional

BSc in Telecommunications Engineering TEL3214 Computer Communication Networks

IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H

Architectural Principles

Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet Computer Networks Uses of Computer Networks...

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? Hardware view: What s the Internet?

Networking Applications

Network Protocols. Terms you ll need to understand: Techniques you ll need to master:

Digital Signal Processing System Design: LabVIEW-Based Hybrid Programming Nasser Kehtarnavaz

TELECOMMUNICATION SYSTEMS

Need For Protocol Architecture

Internet and World Wide Web. The Internet. Computers late 60s & 70s. State of computers? Internet s. Personal Computing?

SYMBOLIC COMPUTATION. Managing Editors: J. Encama~o P. Hayes Artificial Intelligence Editors: L. Bole A Bundy J. Siekmann

1.0 INTRODUCTION. Introduction to data communication and networking 1

Cambridge University Press The Elements of UML 2.0 Style Scott W. Ambler Frontmatter More information. The Elements. UML TM2.

Data Encapsulation & OSI & TCP/IP Models Week 2. Lecturer: Lucy White Office : 324

Computer Networks

DATA VISUALIZATION WITH FLASH BUILDER

FUZZY LOGIC WITH ENGINEERING APPLICATIONS

Digital Image Processing

Transcription:

Computer Network Architectures and Protocols SECOND EDITION

Applications of Communications Theory Series Editor: R. W. Lucky, A r& T Bell Laboratories Recent volumes in the series: COMPUTER COMMUNICATIONS AND NETWORKS John R. Freer COMPUTER NETWORK ARCHITECTURES AND PROTOCOLS Second Edition Edited by Carl A. Sunshine DATA TRANSPORTATION AND PROTECTION John E. Hershey and R. K. Rao Yarlagadda DEEP SPACE TELECOMMUNICATIONS SYSTEMS ENGINEERING Edited by Joseph H. Yuen DIGITAL PHASE MODULATION John B. Anderson, Tor Aulin, and Carl-Erik Sundberg DIGITAL PICTURES: Representation and Compression Arun N. Netravali and Barry G. Haskell ERROR-CORRECTION CODING FOR DIGITAL COMMUNICATIONS George C. Clark, Jr., and J. Bibb Cain FIBER OPTICS: Technology and Applications Stewart D. Personick FUNDAMENTALS OF DIGITAL SWITCHING Second Edition. Edited by John C. McDonald MODELING AND ANALYSIS OF COMPUTER COMMUNICATIONS NETWORKS Jeremiah F. Hayes MODERN TELECOMMUNICATION S E. Bryan Carne OPTICAL CHANNELS: Fibers, Clouds, Water, and the Atmosphere Sherman Karp, Robert M. Gagliardi, Steven E. Moran, and Larry B. Stotts OPTICAL FIBER TRANSMISSION SYSTEMS Stewart D. Personick PRACTICAL COMPUTER DATA COMMUNICATIONS William J. Barksdale A Continuation Order Plan is available for this series. A continuation order will bring delivery of each new volume immediately upon publication. Volumes are billed only upon actual shipment. For further information please contact the publisher.

Computer Network Architectures and Protocols SECOND EDITION Edited by Carl A. Sunshine Unisys West Coast Research Center Santa Monica, California PLENUM PRESS. NEW YORK AND LONDON

Library of Congress Cataloging in Publication Data Computer network architectures and protocols / edited by Carl A. Sunshine. - 2nd ed. p. cm. - (Applications of communications theory) Includes bibliographical references. ISBN-13: 978-1-4612-8093-4 e-isbn-13: 978-1-4613-0809-6 DOl: 10.1007/978-1-4613-0809-6 1. Computer network protocols. 2. Computer network architectures. I. Sunshine, Carl A. II. Series. TK5105.5.C638 1989 89-35230 004.6-dc20 CIP 1989, 1982 Plenum Press, New York Softcover reprint of the hardcover 1st edition 1989 A Division of Plenum Publishing Corporation 233 Spring Street, New York, N.Y. 10013 All rights reserved No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, microfilming, recording, or otherwise, without written permission from the Publisher

To Vint Cerf and Harvey Gold

Contributors Paul Bartoli AT&T Bell Laboratories, Holmdel, New Jersey 07733 H. V. Bertine AT & T Bell Laboratories, Holmdel, New Jersey 07733 Abhay K. Bhushan Xerox Corporation, El Segundo, California 90245 Gregor V. Bochmann Departement d'iro, University of Montreal, Montreal H3C 317, Canada David E. Carlson AT& T Bell Laboratories, Holmdel. New Jersey 07733 James W. Conard Conard Associates, Costa Mesa. California 92626 John Day Motorola, Inc., Schaumburg, Illinois 60196 Harold C. Folts Omnicom, Inc., Vienna, Virginia 22180 Dennis G. F rahmann Xerox Corporation, El Segundo, California 90245 Mario Gerla Computer Science Department, UCLA, Los Angeles, California 90024 James P. Gray IBM Corporation, Research Triangle Park, North Carolina 27709 vii

viii Contributors Leonard Kleinrock Computer Science Department, UCLA, Los Angeles, California 90024 Daniel A. Pitt IBM Corporation, Research Triangle Park, North Carolina 27709 Diane P. Pozefsky IBM Corporation, Research Triangle Park, North Carolina 27709 Antony Rybczynski Data Networks Division, Northern Telecom, Ottawa, Ontario K2C 3T1, Canada Mischa Schwartz Center for Telecommunications Research, Columbia University, New York, New York 10027 Thomas E. Stern Center for Telecommunications Research, Columbia University, New York, New York 10027 Carl A. Sunshine Unisys, West Coast Research Center, Santa Monica, California 90406 Fouad A. Tobagi Computer Systems Laboratory, Stanford University, Stanford, California 94305 Ronald P. Uhlig Northern Telecom Inc., Richardson, Texas 75081 Charles E. Young AT& T Bell Laboratories, Holmdel, New Jersey 07733

Preface This is a book about the bricks and mortar from which are built those edifices that will permeate the emerging information society of the future-computer networks. For many years such computer networks have played an indirect role in our daily lives as the hidden servants of banks, airlines, and stores. Now they are becoming more visible as they enter our offices and homes and directly become part of our work, entertainment, and daily living. The study of how computer networks function is a combined study of communication theory and computer science, two disciplines appearing to have very little in common. The modern communication scientist wishing to work in this area soon finds that solving the traditional problems of transmission, modulation, noise immunity, and error bounds in getting the signal from one point to another is just the beginning of the challenge. The communication must be in the right form to be routed properly, to be handled without congestion, and to be understood at various points in the network. As for the computer scientist, he finds that his discipline has also changed. The fraction of computers that belong to networks is increasing all the time. And for a typical single computer, the fraction of its execution load, storage occupancy, and system management problems that are involved with being part of a network is also growing. It is the objective of this book to provide a comprehensive text and reference volume that can be used in education, research, and development in this combined field of computer networks. The aim is to cover both theory and practice in a style that is instructive but highly readable. To this end, the majority of the volume is devoted to a presentation of structural principles and architectural concepts, with emphasis on the OSI international standards, and illustrated with brief examples from currently operatix

x Preface ing systems. This is followed by a detailed description of network systems developed by two leading vendors: Xerox and IBM. An effort of this scope is beyond the capabilities of any single author. Building on the framework created in the First Edition by Paul Green, the "theory" chapters have been revised to reflect current applications. Chapters dealing with the more stable lower levels of the protocol architecture have been updated. Entirely new chapters were solicited covering the emerging higher-layer OSI standards and the IBM and Xerox network systems. The result represents a collection of tutorials by outstanding experts in each area, providing a more extensive coverage of the subject than any single author could. Any summary of the present status of the computer network art must draw upon three main sources: research networks built by universities, often operating under government support; private networks provided by the computer manufacturers; and public network offerings provided by common carriers. In this volume all three sources of expertise have been tapped. Cooperation among these communities has led to the establishment of a high level of worldwide standardization on many aspects of network architectures and protocols, and these form the core of the new edition. The book is organized along the lines of the now familiar "layered" view of rietworks, which is introduced in Part I. According to this scheme, the structure within any network "node" or "machine" may be broken into layers, with the raw transmission facilities of classical communications (for example, wires or satellite links) at the bottom, and the "users" (human or program) at the top. Part II discusses the lowest layer, the physical layer, by which data are transmitted between physically connected nodes. Part III presents the data link layer, which operates to deliver entire messages or "packets" from a particular node to one of its neighboring nodes. This includes the operation of "multiaccess links" and high-speed local area networks such as Ethernet, which are in such widespread use today. In Part IV we see how packets make their way from the originating node to the destination node within the network layer, a process that can be a complex one when there are intermediate nodes and when there are many simultaneous users of network resources. Problems of routing, congestion control, and interconnecting multiple networks into "internets" are addressed. When we get to Part V, the fact that the path of the messages has been a sequence of nodes and links is no longer apparent. The higher layers deal with functions handled between end user nodes, such as error recovery, checkpointing, agreeing on a common format for exchanging data, and separating streams of data from different "conversations." Part VI presents in detail the network systems developed by Xerox and IBM. These examples illustrate how two major vendors have chosen to apply the principles described earlier in the book. Finally, Part VII summarizes another increasingly important area: how to ensure the correctness of

Preface xi computer network protocols using formal specification and validation methods. This can help guarantee that the protocol designs are free of bugs and that specific products properly implement the protocols so that they will interoperate with other equipment. Assembling this collection has taken long hours by many busy individuals. Some of the authors have borne the burden of revising their chapters several times to reflect new developments over the two-year period that the Second Edition has been underway. I wish to specially thank the Unisys Corporation and my family for supporting my own efforts on this edition. I am also grateful for the energy and patience of my colleagues, and of Sy Marchand at Plenum Press, in bearing with me through the lengthy gestation period of this volume, whose birth I hope will reflect the growing maturity and importance of computer network architectures and protocols. Santa Monica, California Carl A. Sunshine

Contents PART I: INTRODUCTION 1. A Brief History of Computer Networking.................. 3 Carl A. Sunshine 2. The Reference Model for Open Systems Interconnection John Day 7 PART II: PHYSICAL LAYER 3. Physical Interfaces and Protocols........................ 39 H. V Bertine PART III: LINK CONTROL LAYER 4. Character-Oriented Link Control........................ 83 James W Conard 5. Bit-Oriented Data Link Control......................... 107 David E. Carlson 6. Multiaccess Link Control Fouad A. Tobagi 139 PART IV: NETWORK LAYER 7. Circuit-Switched Network Layer Harold C. Foils 193 xiii

xiv 8. X.25 Packet-Switched Network Layer Antony Rybczynski Contents 211 9. Routing Protocols... 239 Mischa Schwartz and Thomas E. Stern 10. Flow Control Protocols... 273 Mario Gerla and Leonard Kleinrock 11. Network Interconnection and Gateways... 329 Carl A. Sunshine PARTV: IDGHER-LAYERPROTOCOLS 12. OSI Transport and Session Layers....................... 349 Charles E. Young 13. OSI Presentation and Application Layers... 377 Paul D. Bartoli 14. Message Handling System Standards and Office Applications 399 Ronald P. Uhlig PART VI: NETWORK ARCHITECTURE EXAMPLES 15. Xerox Network Systems Architecture... 417 Abhay K Bhushan and Dennis G. Frahmann 16. IBM's Systems Network Architecture... 449 Diane P. PozeJsky, Daniel A. Pitt, and James P. Gray PART VII: FORMAL SPECIFICATIONS AND THEIR MANIPULATION 17. Formal Methods for Protocol Specification and Validation...... 513 Gregor V Bochmann and Carl A. Sunshine INDEX OF ACRONYMS................................... 533 SUBJECT INDEX... 537