95-702 OCT Master of Information System Management 1 Organizational Communications and Distributed Object Technologies Networking & Internetworking Routing.

Slides:



Advertisements
Similar presentations
NETWORKING AND INTERNETWORKING
Advertisements

IST 201 Chapter 9. TCP/IP Model Application Transport Internet Network Access.
Chapter 2 Network Models.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
OCT Master of Information System Management 1 Organizational Communications and Distributed Object Technologies Lecture 3: Internetworking.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Slides for Chapter 3: Networking and Internetworking From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 4, © Pearson.
Slides for Chapter 3: Networking and Internetworking
Chapter 1 Read (again) chapter 1.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Introduction To Networking
Slides for Chapter 3: Networking and Internetworking From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 4, © Pearson.
Slides for Chapter 3: Networking and Internetworking From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 4, © Pearson.
Review on Networking Technologies Linda Wu (CMPT )
OCT1 Internetworking Basics Sources: “Computer Networks” by Peterson and Davie “Distributed Systems” by Coulouris, Dollimore, Kindberg.
ECS 152A 1. Introduction. A Communications Model Source —generates data to be transmitted Transmitter —Converts data into transmittable signals Transmission.
1 Version 3.0 Module 10 Routing Fundamentals and Subnetting.
Chapter 2 Network Models.
COMPUTER NETWORKS.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Lecturer: Tamanna Haque Nipa
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Module 4 - Networking MIS5122: Enterprise Architecture for the IT Auditor.
Networking and Internetworking Jenhui Chen Assistant Professor
From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, © Addison-Wesley 2012 Slides for Chapter 3: Networking.
TCP/IP Reference Model For more notes and topics visit: eITnotes.com.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Cisco 1 - Networking Basics Perrine. J Page 19/17/2015 Chapter 9 What transport layer protocol does TFTP use? 1.TCP 2.IP 3.UDP 4.CFTP.
Network Technologies & Principles 1 Communication Subsystem. Types of Network. Principles of Network. Distributed Protocols.
Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
Distributed System MK- Networking and Internetworking Moh. Noor Al ‘Azam
1 Next Few Classes Networking basics Protection & Security.
Slides for Chapter 3: Networking and Internetworking From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 3, © Addison-Wesley.
Spring 2006Computer Networks1 Chapter 2 Network Models.
CSE 6590 Department of Computer Science & Engineering York University 111/9/ :26 AM.
Chapter 3: Networking and Internetworking 1. Introduction Networking issues for distributed systems: Performance,scalability,reliability,security,mobility,
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
William Stallings Data and Computer Communications
1 Chapter Overview Network Communications The OSI Reference Model.
1 Chapter Overview Network Communications The OSI Reference Model.
CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing
1 OSI and TCP/IP Models. 2 TCP/IP Encapsulation (Packet) (Frame)
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
نظام المحاضرات الالكترونينظام المحاضرات الالكتروني.
Slides for Chapter 3: for CS Only Networking and Internetworking Pages –
TCP/IP Protocol Suite and IP Addressing Presented By : Dupien AMS.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Distributed Systems CS
Scaling the Network: The Internet Protocol
Part I. Overview of Data Communications and Networking
OSI Protocol Stack Given the post man exemple.
Slides for Chapter 3: Networking and Internetworking
TCP/IP Protocol Suite: Review
Slides for Chapter 3: Networking and Internetworking
Networking B.Ramamurthy Chapter 3 12/5/2018 B.Ramamurthy.
Networking B.Ramamurthy Chapter 3 1/11/2019 B.Ramamurthy.
System Models and Networking Chapter 2,3
TCP/IP Protocol Suite: Review
System Models and Networking Chapter 2,3
Distributed Systems CS
Slides for Chapter 3: Networking and Internetworking
Scaling the Network: The Internet Protocol
Slides for Chapter 3: Networking and Internetworking
Distributed Systems CS
Presentation transcript:

OCT Master of Information System Management 1 Organizational Communications and Distributed Object Technologies Networking & Internetworking Routing Reference: Ch.3 -- Coulouris Book

OCT Master of Information System Management 2 Basics When we speak of a network we will be speaking about a single technology network (Ethernet, Token Ring, ATM, Point to Point, WaveLan, etc.) An internetwork is an interconnected collection of such networks. The Internet Protocol (IP) is the key toll used today to build scalable, heterogeneous internetworks

3 Types of Networks PANs (Personal Area Network )--Subcategory of LANs WPAN (wireless PAN) – PDAs, Bluetooth, Cell phones, etc. LANs (Local Area Network) - Connected by Ethernet - High-speed by a comm. medium - No routing within a segment of a cable - Segments connected with switches (i.e. token ring) WANs (Wide Area Network) – Links connected w/routers MANs (Metropolitan Area Nets) – DSL (digital subscriber line) ATM (Asynch Transfer Mode) WLANs (Wireless LAN) – IEEE (WiFi Mbps for 1.5km) WMANs (Wireless MAN) – IEEE WiMAX standard WWANs (Wireless WAN) – Mobile phone net based on GSM (Global sys Mobile)

OCT Master of Information System Management 4

Network Protocol Layers OSI - Open Systems Interconnection Reference Model first proposed by the ISO (International Standards Organization)

Network Protocol Layers (2) Some layers are revisited as data travel across a network. ClientServer Network nodes

6A-7

6A-8

OCT Master of Information System Management 9 Conceptual Layering of Protocol Software Layer n Layer 2 Layer 1 Message sent Message received Communication medium SenderRecipient

OCT Master of Information System Management 10 Encapsulation as it is Applied in Layered Protocols

OCT Master of Information System Management 11 Protocol Layers in the ISO Open Systems Interconnection (OSI) Model

12 OSI Protocol Summary LayerDescriptionExamples ApplicationProtocols that are designed to meet the communication requirements of specific applications, often defining the interface to a service. HTTP, FTP,SMTP, CORBA IIOP PresentationProtocols at this level transmit data in a network representation that is independent of the representations used in individual computers, which may differ. Encryption is also performed in this layer, if required. Secure Sockets (SSL),CORBA Data Rep. SessionAt this level reliability and adaptation are performed, such as detection of failures and automatic recovery. TransportThis is the lowest level at which messages (rather than packets) are handled. Messages are addressed to communication ports attached to processes, Protocols in this layer may be connection-oriented or connectionless. TCP,UDP NetworkTransfers data packets between computers in a specific network. In a WAN or an internetwork this involves the generation of a route passing through routers. In a single LAN no routing is required. IP,ATM virtual circuits Data linkResponsible for transmission of packets between nodes that are directly connected by a physical link. In a WAN transmission is between pairs of routers or between routers and hosts. In a LAN it is between any pair of hosts. Ethernet MAC, ATM cell transfer, PPP PhysicalThe circuits and hardware that drive the network. It transmits sequences of binary data by analogue signalling, using amplitude or frequency modulation of electrical signals (on cable circuits), light signals (on fibre optic circuits) or other electromagnetic signals (on radio and microwave circuits). Ethernet base- band signalling,ISDN

OCT Master of Information System Management 13 TCP or UDP Over IP User Datagram Protocol – Transfer Control Protocol Messages (UDP) or Streams (TCP) Application Transport Internet UDP or TCP packets IP datagrams Network-specific frames Message Layers Underlying network Network interface

Tags (port, TCP, IP, …) in headers are protocol type for the layer above that are needed for the receiving protocol stack (below) to correctly unpack the packets 14 Encapsulation in a Message Transmitted via TCP over an Ethernet Application message TCP header IP header Ethernet header Ethernet frame port TCP IP

OCT Master of Information System Management 15 The Programmer's Conceptual View of a TCP/IP Internet Transport Control ProtocolUser Datagram Protocol

OCT Master of Information System Management 16 IP Packet Layout

17 IEEE 802 Network Standards IEEE No.TitleReference 802.3CSMA/CD Networks (Ethernet) Carrier Sense Multiple Access/Collusion Detection [IEEE 1985a] 802.4Token Bus Networks[IEEE 1985b] 802.5Token Ring Networks[IEEE 1985c] 802.6Metropolitan Area Networks[IEEE 1994] Wireless Local Area Networks[IEEE 1999]

18 Example Internetwork Network 2 (Ethernet) H1H2 Router R1 Network 3 (Token Ring) H4 H5 H6 Router R2 Router R3 H7H8 Network 4 (point to point link) Network 1 (Ethernet) H3 Suppose H1 wants to send a message to H8.

19 H1 To H8 H1 R1R2 R3 H8 TCP IP ETH IP ETH IP ETHFDDI IP FDDIPPP ETHPPP Protocol Layering Net Address (source) Host Address (H8) (destination) data ETHIP FDDIIP PPPIP ETHIP R1 R2 R3 FDDI-Fiber Distributed data Interface Net AddressHost Address IP of H8

OCT Master of Information System Management 20 IP Requires that lower level protocols provide services… And therefore was designed to be undemanding… In this way, IP can make use of a wide variety of underlying networks

OCT Master of Information System Management 21 IP Has an addressing scheme which identifies each host on the internetwork Has a best effort datagram delivery model Many of the technologies that IP runs on were invented well after IP was defined.

22 Addressing Every Ethernet device has a network adapter with a 48-bit globally unique ID. Each manufacturer is assigned 24 bits. The other 24 bits are assigned by the manufacturer. These addresses have little structure and provide very few clues as to their location. IP addresses have a network part and a host part Suppose H1 has the IP address of H8

OCT Master of Information System Management 23 Network 2 (Ethernet) H1H2 Router R1 Network 3 (Token Ring) H4 H5 H6 Router R2 Router R3 H7H8 Network 1 (Ethernet) H3 Has the IP address of H8 Has a fixed Ethernet address as well as an IP address for its network interface Each host on this network has the same IP network address and a different host IP address This interface has the same IP network address as H8 These interfaces have the same IP network address because they are on the same network These interfaces have the same IP network address as H6 Net AddressHost Address

24 IP Addressing Every IP datagram contains the IP address of the destination host The “network part” of an IP address uniquely identifies a single physical network that is part of the larger Internet All hosts and routers that share the same network part of their address are connected to the same physical network and can thus communicate with each other by sending frames over the network Every physical network that is part of the Internet has at least one router that, by definition, is also connected to at least one other physical network; this router can exchange packets with hosts or routers on either network

25 Network 2 (Ethernet) H1H2 Router R1 Network 3 (Token Ring) H4 H5 H6 Router R2 Router R3 H7H8 Network 1 (Ethernet) H3 H1 has the IP address of H8 Does H8 have the same network part address as my interface? No, so choose the router. Net AddressHost Address

26 Network 2 (Ethernet) H1H2 Router R1 H3 H1 has the IP address of H8. Does H8 have the same network part address as my interface? No, so choose the router. But, how is this decision made? Suppose this is a /24-bit network. The leftmost 24 bits represent the network identifier. The remaining 8 bits represent the 2^8 hosts. Therefore, H1 has a subnet mask of H1 performs a bitwise and of the subnet mask with H8’s 32-bit IP address. If the result does not match H1’s network Identifier then H8 is a foreign machine.

27 Network 2 (Ethernet) H1H2 Router R1 Network 3 (Token Ring) H4 H5 H6 Router R2 Router R3 H7H8 Network 1 (Ethernet) H3 R1 has the IP address of H8. Does H8 have the same network part address as any of R1’s interfaces? No, so choose the router R2.

28 Network 2 (Ethernet) H1H2 Router R1 Network 3 (Token Ring) H4 H5 H6 Router R2 Router R3 H7H8 Network 1 (Ethernet) H3 R2 has the IP address of H8. Does H8 have the same network part address as any of my interfaces? No, so choose the best router - R3.

29 Network 2 (Ethernet) H1H2 Router R1 Network 3 (Token Ring) H4 H5 H6 Router R2 Router R3 H7H8 Network 1 (Ethernet) H3 R3 has the IP address of H8. Does H8 have the same network part address as any of R3’s interfaces? Yes, so find its Ethernet address via ARP and send the packet.

OCT Master of Information System Management 30 ARP Address Resolution Protocol Converts IP 32-bits –> into network address (physical address) 48-bits. The IP address needs to be translated to a link level address that is specific to the particular type of network. For example, Ethernet addresses are 48 bits.

OCT Master of Information System Management 31 Without ARP Without ARP, each host might hold a table of pairs: (IP address, Particular network address) If a host or router needs to reach a particular IP in its network it simply looks up the physical address in the table

OCT Master of Information System Management 32 ARP Each host dynamically builds up a table of mappings between IP addresses and link level addresses The ARP cache times out every 15 minutes or so and construction begins anew.

33 ARP Host A wants to contact host B on the same network. First, A checks its cache to see if it already contains the IP address, physical address pair. If it does then use the physical address. If it does not then broadcast the IP address to all hosts on this network. The matching host sends back its physical address. A then adds this mapping to its cache. Other hosts on the network will see this interaction and build tables of their own.

OCT Master of Information System Management 34 Network 2 (Ethernet) H1H2 Router R1 Network 3 (Token Ring) H4 H5 H6 Router R2 Router R3 H7H8 Network 1 (Ethernet) H3 H1 has H2’s IP address. It finds H2’s physical address with ARP.

35 DHCP Dynamic Host Configuration Protocol Ethernet addresses are globally unique and fixed during the manufacture of Ethernet devices. IP addresses cannot be configured once into a host. The IP address has a network part and a host part. (You could never move the host to a different network!) Devices need IP addresses and the address of the default router.

36 DHCP A DHCP server provides configuration information to hosts. But how does the host find a DHCP server? Service discovery: The host broadcasts a DHCPDISCOVER over UDP/IP and the DHCP server sends back a leased IP address

OCT Master of Information System Management 37 Network 2 (Ethernet) H1H2 Router R1 Network 3 (Token Ring) H4 H5 H6 Router R2 Router R3 H7H8 Network 1 (Ethernet) H3 H9 asks for an IP address using DHCP. H9 H3 contacts H9 using ARP R1 contacts H9 using ARP H8 contacts H9 using H9’s IP address

38 Routers Keep messages flowing between networks rather than within networks Come in different sizes The largest have more in common with supercomputers than office servers - MIPS processors –Addresses to Europe –Addresses to US –Addresses to Central, South America –Addresses to Asia & Pacific

OCT Master of Information System Management 39 Routing in a Wide Area Network Hosts Links or local networks A DE B C Routers

OCT Master of Information System Management 40 Initial Routing Tables for the Network Routings from DRoutings from E ToLinkCostToLinkCost A B C D E local 6 1 inf 0 1 A B C D E local inf Routings from ARoutings from BRoutings from C ToLinkCostToLinkCostToLinkCost A B C D E local inf 1 A B C D E 1 local inf 1 A B C D E - 2 local - 5 inf 1 0 1

OCT Master of Information System Management 41 RIP Routing Algorithm -- Bellman-Ford Fault on n discovered: set cost to inf for each destination using that link and execute a send Send: Each t seconds or when Tl (local table) changes, send Tl on each non-faulty outgoing link. Receive: Whenever a routing table Tr (received table) is received on link n: for all rows Rr in Tr { if (Rr.link <> n) { Rr.cost = Rr.cost + 1; // Then I too could get there with a higher cost Rr.link = n; // and I would travel through n if (Rr.destination is not in Tl) add Rr to Tl; //add new destination toTl else for all rows Rl in Tl { if (Rr.destination = Rl.destination and (Rr.cost < Rl.cost or Rl.link = n)) Rl = Rr; // Rr.cost < Rl.cost : remote node has better route // Rl.link = n : remote node is more authoritative } // if the plan is not to come through here

OCT Master of Information System Management 42 Suppose the Routers Transfer Tables as Follows: A -> B B -> A B -> C E -> C A -> D B -> E

OCT Master of Information System Management 43 Updated Routing tables Routings from DRoutings from E ToLinkCostToLinkCost A B C D E local A B C D E Routings from ARoutings from BRoutings from C ToLinkCostToLinkCostToLinkCost A B C D E local A B C D E A B C D E

OCT Master of Information System Management 44 Simplified View of the QMW Computer Science Network(1) 240= = = /29 subnet Class C Routes at the Ethernet address level Hubs don’t route or /24

OCT Master of Information System Management 45 Simplified View of the QMW Computer Science Network(2) 240= = = /29 subnet (1) Suppose we have An IP packet for Cooper (2) Hammer gets the Ethernet address using ARP. (3) Final route selected based on Ethernet address.