Computer networks. Topologies Point to point Bus (rail) Ring Tree, star, etc.

Slides:



Advertisements
Similar presentations
1 ICS 156: Lecture 2 (part 2) Data link layer protocols Address resolution protocol Notes on lab 2.
Advertisements

Networks Terminology and Hardware. Network A network is a group of connected computers that can communicate with each other to share information and equipment,
Computer Networks Ethernet I Professor Hui Zhang
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Network Certification Preparation. Module - 1 Communication methods OSI reference model and layered communication TCP/IP model TCP and UDP IP addressing.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Ethernet Kenneth Castelino. Network Architecture - Protocols Physical: Actual signal transmission Data-Link: Framing / Error Detection Network: Routing.
Internetworking Fundamentals (Lecture #4) Andres Rengifo Copyright 2008.
1 NETWORKING TECHNOLOGIES (II) BUS Abdou Illia, Fall 2010 (October 20, 2010)
1 NETWORKING TECHNOLOGIES (II) BUS Abdou Illia, Spring 2007 (Week 9, Thursday 3/8/2007)
Network Concepts. Networks LAN WAN Main Concepts n Protocol n Media n Topology.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
04/26/2004CSCI 315 Operating Systems Design1 Computer Networks.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
Review on Networking Technologies Linda Wu (CMPT )
Network Architecture for Cyberspace
Core 3: Communication Systems. On any network there are two types of computers present – servers and clients. By definition Client-Server architecture.
COMPUTER NETWORKS.
Chapter 2 Review of Computer Network Technology
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
Chapter 6 High-Speed LANs Chapter 6 High-Speed LANs.
Review: Medium Access Control Sublayer –What is the problem to be addressed in this sublayer? –Protocols that allow collision Pure ALOHA Slotted ALOHA.
TC 361 Data Networking Test Review
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Chapter 5 Networks Communicating and Sharing Resources
© NOKIADEFAULT.PPT / / AO page: 1 IP in LANs.
Data Communication & Computer Networks
SIMS-201 Computer Networks. 2 Introduction to Computer Networks Chapter 19 The Local Area Network  Overview.
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Fundamentals CE
ITED 328 Lecture 4 12 Feb 2004 Loosely covering Chapter 5 Internet and LAN Technology.
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
Lecture 9 Networked Systems Network Operating Systems Introduction to Sockets TCP Client-Server Applications.
The Infrastructure Technologies. Communication All communications require: Transmitters/Senders and receivers Transmission medium Rules of communication.
Chapter 2 Communications Networks. Introduction Look at: –Telephony Networks (2.2) –OSI Reference Model(2.3) –The Internet (2.4) –Asynchronous Transfer.
Introduction network Protocol
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.
Data Link Layer Moving Frames. Link Layer Protocols: ethernet, wireless, Token Ring and PPP Has node-to-node job of moving network layer.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
Day10 LAN. Why? Allow more than one machine to share –Resources –Internet connectivity –Information.
1 IEEE 802 LANs Following the success of CDMA technologies ALOHA & Ethernet, IEEE standardized CDMA/CD technology as IEEE LAN Also standardized are.
Networks. Ethernet  Invented by Dr. Robert Metcalfe in 1970 at Xerox Palo Alto Research Center  Allows group of computers to communicate in a Local.
Ch 13. Wired LANs: Ethernet IEEE Standards Project 802 launched in 1985 – To set standards to enable intercommunication among equipment from a variety.
CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler.
 2004 Deitel & Associates, Inc. All rights reserved. Chapter 16 – Networking Outline 16.1Introduction 16.2Network Topology 16.3Network Types 16.4TCP/IP.
Lecture 6 Networked Systems Network Operating Systems Introduction to Sockets HTTP – FTP – TCP - UDP Client-Server Model.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
Data and Computer Communications Eighth Edition by William Stallings Chapter 15 – Local Area Network Overview.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
1 NETWORKING TECHNOLOGIES (II) BUS Abdou Illia, Fall 2008 (November 4, 2008)
SIMS-201 Computer Networks.
Data Link Layer Lower Layers Local Area Network Standards
Chapter 16 – Networking Outline 16.1 Introduction
Chapter 5 Link Layer and LANs
Computer networks.
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Data Transmission and Computer Communications ECE: 412
أ.كمال عيد كلية المعلمين حائل
Protocol layering and data
Computer Network Overview
TCP/IP Protocol Suite: Review
Network Architecture for Cyberspace
SIMS-201 Computer Networks.
Protocol layering and data
Presentation transcript:

Computer networks

Topologies Point to point Bus (rail) Ring Tree, star, etc.

Direction of information simplex half duplex duplex (full-duplex)

Addressing P-P: no need for addressing Star with central controller (master):  each client (slave) has own cable  M->S, S->M directions needs no address in message  S->S needs address Bus, ring, tree:  target address is part of message, everyone gets message, only target reads it

Network access Random access systems can have collisions  Solving these means a delay - not necessarily fixed time - can give max limit for delay Time slot (TDM) and token ring systems have no collisions  can guarantee transfer speed, timing, priorities both kinds have different optimal utilization scenarios

Network access AlohaNet (1971, originally radio system for Hawaii islands): random access; M-S with frequency duplex (one freq for terminals, another frequency for central station) Collision Detection: if didn’t get answer, decided there was a collision, then send message again after random time interval

Network access Slotted Aloha: can only transmit in fixed time slots (TDM) CSMA (Carrier Sense Multiple Access): listens to channel before sending message (eg. Ethernet AX.25, etc.)

Routing (path selection) Fix line Subscriber line (on a public phone system eg.) Packet switching (on a public phone/network system)

Packet switching

Hierarchy systems can build upon each other (in layers) (look up ISO-OSI network layers model, Internet), each has different properties/functions Eg. bottom Ethernet or Token ring, on top of it IP, on top of it TCP or UDP all have own data frame and addressing

Hierarchy

LAN standards (Local Area Network) (Ethernet) Token ring Token bus Wireless LAN (Wi-Fi) Bluetooth (->ZigBee, WirelessHART, MiWi stb)

802.x- medium coaxial cables (RG58) (needs terminator resistor!) UTP (Unshielded Twisted Pair) Optical fiber Radiowaves (wireless)

802.x- Addressing MAC: Media Access Control 6byte address, eg. 01:23:45:67:89:ab physically coded address of network cards (NIC,network interface controller) it’s not the IP address! if many network cards in a computer -> each has its MAC address can be multicast or broadcast address „The EUI-48 is expected to have its address space exhausted by the year „

802.3 (Ethernet) Nodes identified by MAC address CSMA/CD 10 / 100 Mbps ; Gbps Manchester-code differential transmission

Ethernet frame

Token ring, token bus Logical ring can be made over a physically bus topology (each node knows the address of neighbours) empty frame goes around the network the host owning the token can write into this frame, then passes it

TCP/IP- IP Internet Protocol packet switched,unreliable, connection- less service „datagram” (packet)

TCP/IP - IPv4 IPv4  4 byte, eg  max 2^32 address  practically all used up  to ease problems, sub-networks were developed where same address intervals are re-used; this makes addressing btw sub- networks harder

TCP/IP- IPv6 128 bit – about 3.4×10 38 address eg. 2001:0db8:85a3:0042:1000:8a2e:0370:7334 will last for a longer time harder to remember  already used but switchover still didn’t happen

TCP/IP - TCP puts message back together from the packets (can arrive in different order) asks again for missing pieces  reliable can have several logical ports on one physical connection

TCP/IP - UDP no error correction,no asking again for missing frames unreliable but faster than TCP eg. audio/video „stream” – speed („real- time”) is more important than bit error rate

Internet Basic idea: decentralized network, has to work even if several nodes fail originally military uses – ARPANET universities and research centers joined soon has a main backbone network with overseeing organizations ISP (internet service providers) are at end points of backbone to provide connection for end users

Internet DNS (Domain name server) URL (universal resource locator)

Internet framing (ethernet-ip-tcp)