Network.... communication system for connecting end- systems. End-systems a.k.a. hosts PCs, workstations dedicated computers network components

Similar documents
8. Networks. Why networked embedded systems General network architecture. Networks. Internet-enabled embedded systems Sensor networks

CS-461 Internetworking. Dr. Mohamed Aboutabl

Computer Networks (Introduction to TCP/IP Protocols)

Communication Networks - 3 general areas: data communications, networking, protocols

Digital Communication Networks

1: Review Of Semester Provide an overview of encapsulation.

Data Communication and Network. Introducing Networks

TCP/IP THE TCP/IP ARCHITECTURE

Networking interview questions

Data & Computer Communication

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

ITEC 3800 Data Communication and Network. Introducing Networks

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Defining Networks with the OSI Model. Module 2

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking

Bridging and Switching Basics

ES623 Networked Embedded Systems

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

CCNA Exploration1 Chapter 7: OSI Data Link Layer

Outline: Connecting Many Computers

COMPONENTS OF DATA COMMUNICATION

Revision of Previous Lectures

Network Architecture Models

Chapter 2 Network Models 2.1

The Data Link Layer. 32 PART I Networking Basics

CCNA Guide to Cisco Networking, Third Edition

QUESTION BANK EVEN SEMESTER

Introduction to Open System Interconnection Reference Model

Module 2 Overview of Computer Networks

Module 2 Overview of. Computer Networks

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

Layer 2 functionality bridging and switching

Chapter 7. Local Area Network Communications Protocols

Network Architecture. TOC Architecture

EEC-484/584 Computer Networks

Network Models. Behrouz A. Forouzan Data communication and Networking Fourth edition

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS

Communicating over the Network

Data Networks. Lecture 1: Introduction. September 4, 2008

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

Question 7: What are Asynchronous links?

ก ก Information Technology II

OSI and TCP/IP Models

AppleTalk. Chapter Goals. Introduction CHAPTER

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution)

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

Point-to-Point Network Switching. Computer Networks Term B10

Chapter -4 OSI Reference Model

Computer Networks Question Bank

Internetwork Basic. Possible causes of LAN traffic congestion are

CS1302-COMPUTER NETWORKS UNIT I -DATA COMMUNICATION PART A

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan

Introduction to LAN Protocols

Contents. Introduction to Networking. Preface...i. Introduction... xix

Additional Material. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Information Network I/No.

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

Peer entities. Protocol Layering. Protocols. Example

CHAPTER -1. Introduction to Computer Networks

Internet Architecture and Protocol

ISO/OSI Model and Collision Domain NETWORK INFRASTRUCTURES NETKIT - LECTURE 1 MANUEL CAMPO, MARCO SPAZIANI

Network Model. Why a Layered Model? All People Seem To Need Data Processing

Raj Jain. The Ohio State University Columbus, OH

Introduction to Networking. Operating Systems In Depth XXVII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved.

Cisco Cisco Certified Network Associate (CCNA)

Guide to Networking Essentials, 6 th Edition. Chapter 6: Network Reference Models and Standards

Introduction to Protocols

Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER

QUESTION BANK ENGINEERS ACADEMY. Computer Networks Computer Network Basics Segentation is done in. 12. Session layer is used for

Local Area Network(LAN)

Communication Networks

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

Internetwork Protocols

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

ECE 650 Systems Programming & Engineering. Spring 2018

CS3600 SYSTEMS AND NETWORKS

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Principles behind data link layer services:

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

Introduction and Layered Network Architecture. EEE 538 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

Internetworking Models The OSI Reference Model

Chapter 2 Network Models 2.1

Introduction to LAN Protocols

Networks: Access Management

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Review of Network Technologies

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

Connecting to the Network

NetWare Protocols. Background. Technology Basics CHAPTER

Networking Background

Transcription:

Networking 1

Network... communication system for connecting end- systems End-systems a.k.a. hosts PCs, workstations dedicated computers network components 2

Multiaccess vs.. Point-to-point Multiaccess means shared medium. many end-systems share the same physical communication resources (wire,( wire, frequency,...) There must be some arbitration mechanism. Point-to-point only 2 systems involved no doubt about where data came from! 3

Multiaccess Point-to-point 4

LAN - Local Area Network connects computers that are physically close together ( < 1 mile). high speed multi-access Technologies: Ethernet 10 Mbps,, 100Mbps Token Ring 16 Mbps FDDI 100 Mbps 5

WAN - Wide Area Network connects computers that are physically far apart. long-haul network. typically slower than a LAN. typically less reliable than a LAN. point-to-point Technologies: telephone lines Satellite communications 6

MAN - Metropolitan Area Network Larger than a LAN and smaller than a WAN - example: campus-wide network - multi-access network Technologies: coaxial cable microwave 7

Internetwork Connection of 2 or more distinct (possibly dissimilar) networks. Requires some kind of network device to facilitate the connection. Net A Net B 8

OSI Reference Model Layered model: 7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data Link 1. Physical 9

The Physical Layer Responsibility: transmission of raw bits over a communication channel. Issues: mechanical and electrical interfaces time per bit distances 10

The Data Link Layer - Responsibility: Data Link Control provide an error-free communication link Issues: framing (dividing data into chunks)» header & trailer bits addressing 10110110101 01100010011 10110000001 11

The Data Link Layer - The MAC sublayer Medium Access Control - needed by mutiaccess communications. MAC provides DLC with virtual wires on multiaccess networks. 12

The Network Layer Responsibilities: path selection between end-systems (routing). subnet flow control. translation between different network types. Issues: packet headers virtual circuits 13

The Transport Layer Responsibilities: provides virtual end-to-end links between peer processes. fragmentation & reassembly end-to-end flow control Issues: headers error detection reliable communication 14

The Session Layer Responsibilities: establishes, manages, and terminates sessions between applications. service location lookup Many protocol suites do not include a session layer. 15

The Presentation Layer Responsibilities: data encryption data compression data conversion Many protocol suites do not include a Presentation Layer. 16

The Application Layer Responsibities: anything not provided by any of the other layers Issues: application level protocols appropriate selection of type of service 17

Layering & Headers Each layer needs to add some control information to the data in order to do it s job. This information is typically prepended to the data before being given to lower layers. Once the lower layers deliver the data and control information - the peer layer uses the control information. 18

Headers Process DATA Process Transport H DATA Transport Network H H DATA Network Data Link H H H DATA Data Link 19

What are the headers? Physical: : no header - just a bunch of bits. Data Link: address of the receiving endpoints address of the sending endpoint length of the data checksum. 20

Network layer header protocol suite version type of service length of the data packet identifier fragment number time to live protocol header checksum source network address destination network address 21

Connecting Networks Repeater: Bridge: Router: Gateway: physical layer data link layer network layer network layer and above. 22

Repeater Copies bits from one network to another Does not look at any bits Allows the extension of a network beyond physical length limitations REPEATER 23

Bridge Copies frames from one network to another Can operate selectively - does not copy all frames (must look at data-link headers). Extends the network beyond physical length limitations. BRIDGE 24

Router Copies packets from one network to another. Makes decisions about what route a packet should take (looks at network headers). ROUTER 25

Gateway Operates as a router Data conversions above the network layer. Conversions: encapsulation - use an intermediate network translation - connect different application protocols encrpyption - could be done by a gateway 26

Encapsulation Example Gateway Gateway Provides service connectivity even though intermediate network does not support protocols. 27

Translation Gateway Translate from red protocol to brown protocol 28

Encryption gateway Secure Network Encryption/Decryption Gateways Secure Network GW??? GW Insecure Network 29

Hardware vs.. Software Repeaters are typically hardware devices. Bridges can be implemented in hardware or software. Routers & Gateways are typically implemented in software so that they can be extended to handle new protocols. Many workstations can operate as routers or gateways. 30

Byte Ordering Different computer architectures use different byte ordering to represent multibyte values. 16 bit integer: Low Byte High Byte Address A Address A+1 High Byte Low Byte 31

Byte Ordering Little-Endian Big-Endian Low Byte High Byte High Byte Low Byte Addr A Addr A+1 Addr A Addr A+1 IBM 80x86 DEC VAX DEC PDP-11 IBM 370 Motorola 68000 Sun 32

Network Byte Order Conversion of application-level data is left up to the presentation layer. But hold on!!! How do lower level layers communicate if they all represent values differently? (data length fields in headers) A fixed byte order is used (called network byte order) ) for all control data. 33

Multiplexing.. to combine many into one. Many processes sharing a single network interface. A single process could use multiple protocols. More on this when we look at TCP/IP. 34

Modes of Service connection-oriented vs.. connectionless sequencing error-control flow-control byte stream vs.. message based full-duplex vs.. half-duplex. 35

Connection-Oriented vs. Connectionless Service A connection-oriented service includes the establishment of a logical connection between 2 processes. establish logical connection transfer data terminate connection. Connectionless services involve sending of independent messages. 36

Sequencing Sequencing provides support for an order to communications. A service that includes sequencing requires that messages (or bytes) are received in the same order they are sent. 37

Error Control Some services require error detection (it is important to know when a transmission error has occurred). Checksums provide a simple error detection mechanism. Error control sometimes involves notification and retransmission. 38

Flow Control Flow control prevents the sending process from overwhelming the receiving process. Flow control can be handled a variety of ways - this is one of the major research issues in the development of the next generation of networks (ATM). 39

Byte Stream vs.. Message Byte stream implies an ordered sequence of bytes with no message boundaries. Message oriented services provide communication service to chunks of data called datagrams. 40

Full- vs.. Half-Duplex Full-Duplex services support the transfer of data in both directions. Half-Duplex services support the transfer of data in a single direction. 41

Many service modes/features such as flow control and error control can be done either: End-to-End vs.. Hop-toHop between endpoints of the communication. -or- between every 2 nodes on the path between the endpoints. 42

End-to-End Process A Process B 43

Hop-by-Hop Process A Process B 44

Buffering Buffering can provide more efficient communications. Buffering is most useful for byte stream services. Process A Send Buffer Recv. Buffer Process B 45

Addresses Each communication endpoint must have an address. Consider 2 processes communicating over an internet: the network must be specified the host must be specified the process must be specified. 46

Addresses Physical Layer: no address necessary Data Link Layer - address must be able to select any host on the network. Network Layer - address must be able to provide information to enable routing. Transport Layer - address must identify the destination process. 47

Broadcasts Many networks support the notion of sending a message from one host to all other hosts on the network. A special address called the broadcast address is often used. Some popular network services are based on broadcasting (YP/NIS, rup, rusers ) 48

Multicasting Some networks support the ability to send a message from one host to a group of hosts. In a LAN environment there are significant efficiency gains. On a WAN there is some efficiency gain (depends on the network topology and location of hosts). Usually used with unreliable services! 49