CS6027CS6027 Dr. ClincyLecture 11 CS 6027 Advanced Computer Networking.

Slides:



Advertisements
Similar presentations
Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
Advertisements

OSI Model OSI MODEL.
OSI Model OSI LAYER / MODEL.
Chapter 5: TCP/IP and OSI Business Data Communications, 5e.
1 William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
Chapter 2 Network Models.
PROTOCOLS AND ARCHITECTURE Lesson 2 NETS2150/2850.
Protocols and the TCP/IP Suite Chapter 4 (Stallings Book)
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Chapter 4 : TCP/IP and OSI Business Data Communications, 4e.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Protocols and the TCP/IP Suite
EE 4272Spring, 2003 EE4272: Computer Networks Instructor: Tricia Chigan Dept.: Elec. & Comp. Eng. Spring, 2003.
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
Chapter 2 Network Models.
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
OIS Model TCP/IP Model.
Lecturer: Tamanna Haque Nipa
Chapter 5: TCP/IP and OSI Business Data Communications, 6e.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Lecture 1 The OSI Model Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
OSI AND TCP/IP MODELS. Outline Introduction OSI Model TCP/IP Model IPv4 vs. IPv6.
OSI Model Honolulu Community College Cisco Academy Training Center
Presentation on Osi & TCP/IP MODEL
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Protocols and the TCP/IP Suite
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
William Stallings Data and Computer Communications 7 th Edition Data Communications and Networks Overview Protocols and Architecture.
Layer Architecture Layer architecture simplifies the network design. It is easy to debug network applications in a layered architecture network. The network.
The OSI Model An ISO (International standard Organization) that covers all aspects of network communications is the Open System Interconnection (OSI) model.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
COMPUTER NETWORKS Ms. Mrinmoyee Mukherjee Assistant Professor
The OSI Model.
Internet SecurityInternet Security Dr. ClincyLecture1 CS 4491 Internet Security Dr. Clincy Networking Fundamentals Note: I am still “tweaking” your syllabus.
Spring 2006Computer Networks1 Chapter 2 Network Models.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
William Stallings Data and Computer Communications
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
Chapter 4 : TCP/IP and OSI Business Data Communications, 4e.
Network Models.
TCP/IPTCP/IP Dr. ClincyLecture 21 Ch 2: TCP/IP and OSI Lecture 2.
Protocol Suits and Layering Models OSI Model Dr. Abraham UTPA.
Data Communication Network Models
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Week #8 OBJECTIVES Chapter #5. CHAPTER 5 Making Networks Work Two Networking Models –OSI OPEN SYSTEMS INTERCONNECTION PROPOSED BY ISO –INTERNATIONAL STANDARDS.
Dr. ClincyLecture1 Chapter 2 (handout 1– only sections 2.1, 2.2 and 2.3) 1 of 10 Dr. Clincy Professor of CS Exam #3 Monday (3/14/16): Opened Book, No Computer,
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Computer Network Lab. 1 3 장 OSI 기본 참조 모델 n OSI : Open System Interconnection n Basic Reference Model : ISO-7498 n Purpose of OSI Model ~ is to open communication.
Computer Engineering and Networks, College of Engineering, Majmaah University Protocols OSI reference MODEL TCp /ip model Mohammed Saleem Bhat
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Lecture 3 : Network Architectures 1.
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
Network Models.
Lecturer, Department of Computer Application
CS 6027 Advanced Computer Networking
DEPARTMENT OF COMPUTER SCIENCE
CS 4622 Computer Networks Lecture 1 Dr. Clincy Lecture 1.
Chapter 2 (Handout 1– only sections 2.1, 2.2 and 2.3)
Protocols and the TCP/IP Suite
Dr. Clincy Professor of CS
Ch1: Introduction Ch 2: TCP/IP and OSI
Chapter 2 (handout 1– only sections 2.1, 2.2 and 2.3)
Chapter 15 – Part 2 Networks The Internal Operating System
OSI Model OSI MODEL.
Protocols and the TCP/IP Suite
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Unit – III Network Essentials
Presentation transcript:

CS6027CS6027 Dr. ClincyLecture 11 CS 6027 Advanced Computer Networking

CS6027CS6027 Dr. ClincyLecture 12 Introduction and Overview Just 50 years ago, networks were proprietary (ie. IBM, HP, DEC, etc) Both the software (protocols or rules) and hardware used to make a network functional were proprietary. Also, the networks’ technologies (components) were designed for a specific purpose in mind (ie. Business, manufacturing, high/low- speed, small/large capacity, etc..) The certain applications could run on certain type networks Larger corporations would typically have many different disjointed computer networks - company mergers caused this problem too (wasn’t perceived as a problem then) Engineers and Scientists (or whomever) could have 3-4 terminals on his/her desk for different uses Customer would have to go to a specific vendor for an application or network upgrade

CS6027CS6027 Dr. ClincyLecture 13 Introduction and Overview Back in the 70’s and early 80’s, there was a big push to make communication systems or networks “open” “open” means “non-proprietary” - instead of the “specifications” being known only by the vendor, the specs would be be publicly known By having publicly published specifications, all of the various vendors could design and manufacture network components that were compatible and interchangeable Why was this a good thing ???? (Even if you were a network-component-producing company with a significant market share)

CS6027CS6027 Dr. ClincyLecture 14 Introduction and Overview Answer: would drive more (1) computer, (2) software application and (3) network usage - therefore, drive more revenue for all Answer: more efficiency for businesses, government, etc.. Also, what happened with the computer industry as it relates to OS’s ???

CS6027CS6027 Dr. ClincyLecture 15 Introduction and Overview The idea behind having “open systems” is to have the ability to interconnect many different networks into a single network. The technology that allows this is called “Internetworking” Internetworking provides: –The Interconnection of heterogeneous (different) networks –Set of communication standards/protocols that make the interconnected heterogeneous networks interoperate (river, language scenario) Internetworking “hides” the details of the underlying hardware and allow the network nodes to communicate independent of their physical connection (or hardware) Internetworking can be called “internet technology” – notice to lower case “i” on internet

CS6027CS6027 Dr. ClincyLecture 16 Introduction and Overview Some time ago, the government realized the benefit of internet technology and funded a research project through an agency called ARPA – Advanced Research Projects Agency Through ARPA support, the “open” system specs were realized. These open specs were called “TCP/IP Internet Protocol Suite”, commonly called “TCP/IP” TCP – Transmission Control Protocol – dealt with higher level issues like segmentation, reassembly and error detection. IP – Internetworking Protocol – dealt with datagram routing TCP/IP was heavenly sent in that: (1) previously disjointed networks WITHIN companies could now function as a single network and (2) it facilitated communications amongst geographically dispersed sites With TCP/IP, the Internet was born. Notice the “I” on Internet – called the Global Internet Global Internet interconnects over 170 million nodes – testimonial for TCP/IP

CS6027CS6027 Dr. ClincyLecture 17 Introduction and Overview Bottom Line: what makes TCP/IP so great and unique from other network protocols ??: –Network Technology Independence – independent of a particular vendor’s hardware –Universal Interconnection – any 2 computers connected to the internet can communicate – each computer has a unique internationally recognized address –End-to-End Acknowledgements – acknowledgements between the source and destination versus intermediate nodes –Application Protocol Standards – TCP/IP provides services (or software) to applications needing lower level communication services We will cover each of these attributes in detail throughout the course Internet uses TCP/IP

CS6027CS6027 Dr. ClincyLecture 18 Introduction and Overview Read more details about the history in your book (Chapter 1) Who is responsible the Internet ?. Internet Architecture Board (IAB) IAB coordinates the research and development in relation to the TCP/IP protocols. The organization decides which protocols are required and sets policies Each member of the IAB chaired an Internet Task Force responsible for investigating a set of problems or issues each (there were 10 task forces) The chairman of the IAB was called the Internet Architect

CS6027CS6027 Dr. ClincyLecture 19 Introduction and Overview In 1989, the IAB was re-organized due to commercial usage increases The original IAB researchers were moved under the Internet Research Task Force – their focus is longer term research The Internet Engineering Task Force is more concerned about short-term issues and is mostly comprised of industry types The Internet Engineering Task Force Chairman and managers of each “working group” forms the Internet Engineering Steering Group – this group is responsible for coordination In 1992, a group called the Internet Society (ISOC) was form to encourage participation on the Internet.

CS6027CS6027 Dr. ClincyLecture 110 Introduction and Overview Documentation of TCP/IP is placed in online repositories and made available at no charge – you will be responsible for collecting some of this documentation The final and official TCP/IP documents start out as an Internet draft (working document) Upon recommendation from Internet authorities, the draft may be published as a Request for Comment (RFC) Each RFC is edited, assigned a number and made available to all interested parties. RFC’s go through maturity levels and are organized according to their requirement level The six maturity levels are: proposed standard, draft standard, Internet standard, historic, experimental and informational RFC’s are classified into 5 requirements levels: required, recommended, elective, limited use and not recommended You can secure RFC’s: regular mail, , ftp or Internet (

CS6027CS6027 Dr. ClincyLecture 111 Introduction and Overview

CS6027CS6027 Dr. ClincyLecture 112 Introduction and Overview Protocols – set of rules that governs data communications – defines what is communicated, how it is communicated and when it is communicated Protocol elements are: –Syntax – structure or format of the data (order of the bits) –Semantics – meaning of each section of bits – how to interpret the pattern of bits –Timing – deals with (1) when the data should be sent and (2) how fast it should be sent (ie. a Tx can overload a Rx and therefore data can be lost or mis-interpreted) More clarity: the TCP/IP protocol allows one to specify data communications without understanding the details of the underlying hardware.

CS6027CS6027 Dr. ClincyLecture 113 Why Study OSI? Still an excellent model for conceptualizing and understanding protocol architectures More granularity in functionality - more functional delineation Key points: –Modular –Hierarchical (chain of command, pecking order) –Boundaries between layers (called interfaces) NOTE: the protocols or functionality with in the layer could change however, the interface remains the same – this facilitates the flexibility

CS6027CS6027 Dr. ClincyLecture 114 OSI Reference Model ? OSI – Open Systems Interconnection Set of rules of how to transmit data across a network at the lower levels of the model protocols define the electrical and physical standards at the lower levels, the bit ordering, the transmission of the bits, and error detecting and correcting are defined at the higher levels of the model, the protocols define the data formatting, message syntax, dialogue management, message sequences and info presentation

CS6027CS6027 Dr. ClincyLecture 115 Advantages of Layering Easier application development Network can change without all programs being modified Breaks complex tasks into subtasks Each layer handles a specific subset of tasks Communication occurs –between different layers on the same node or stack (INTERFACES) –between similar layers on different nodes or stacks (PEER-TO-PEER PROCESSES

CS6027CS6027 Dr. ClincyLecture 116 OSI’s Layered Approach Example Top Layer Some Intermediate Layer Bottom Layer Top Layer Some Intermediate Layer Bottom Layer Network ANetwork B Network interfaces, raw bits Facilitate the actual communications Actual commands invoked, presentation How does peer-to-peer communication work ?

CS6027CS6027 Dr. ClincyLecture 117 OSI Open Systems Interconnection Developed by ISO (International Organization for Standardization) Contains seven layers Application Presentation Session Transport Network Data Link Physical

CS6027CS6027 Dr. ClincyLecture 118 OSI Reference Model ? Bottom 3 layers Bottom 3 layers responsible for getting the info to the destination (Bottom 3 layers): at the lower levels of the model protocols define the electrical and physical standards (Bottom 3 layers) at the lower levels, the bit ordering, the transmission of the bits, and error detecting and correcting are defined Top 4 layers at the higher levels of the model, the protocols define the data formatting, message syntax, dialogue management, message sequences and info presentation

CS6027CS6027 Ch 2: TCP/IP and OSI Lecture 2 Dr. ClincyLecture 219

CS6027CS6027 OSI Physical Layer Responsible for transmission of bits Always implemented through hardware Encompasses mechanical, electrical, and functional interfaces Encoding issues: how 0’s and 1’s are converted to signals Transport medium: Coaxial, Twisted Pair, Optical, etc.. Transmission Rate/Data Rate – how fast to send bits Transmission mode: transmission direction (simplex, duplex) Physical Topology: network layout Dr. ClincyLecture 220

CS6027CS6027 OSI Data Link Layer Responsible for error-free, reliable transmission of data Framing, Flow control, Error control (detection/correction) Makes use of physical address because with in the same network Dr. ClincyLecture 221 Network Layer Data Link Layer Physical Layer Actually sends the packets (groups of frames) from node to node using a routing algorithm Takes raw data (bits) and transform them into frames, error control, etc. Transmit and receive the raw data (bits)

CS6027CS6027 OSI Data Link Layer Dr. ClincyLecture 222

CS6027CS6027 OSI Network Layer Responsible for routing of messages through networks Concerned with type of switching used (circuit v. packet) Handles routing among different networks NOTE: with in the same network, only the DATA LINK layer is needed – amongst multiple networks, the NETWORK LAYER is needed No need for routing with in the same network (LAN) Routing across “internetworks” Makes use of logical address vs physical address because not with in same network Dr. ClincyLecture 223

CS6027CS6027 OSI Network Layer Dr. ClincyLecture 224 Transport Network Layer Data Link Layer Concerned with an error-free end-to-end flow of data Actually sends the packets (groups of frames) from node to node using a routing algorithm Takes raw data (bits) and transform them into frames

CS6027CS6027 OSI Network Layer Dr. ClincyLecture 225

CS6027CS6027 OSI Transport Layer Isolates messages from lower and upper layers Breaks down message size (segmentation) (down) and performs re-assembly (up) Monitors quality of communications channel (oversee all hops) Selects most efficient communication service necessary for a given transmission (could change over hops) Flow and Error control for Source and Sink Dr. ClincyLecture 226

CS6027CS6027 OSI Session Layer Establishes logical connections between systems (up/down) Manages log-ons, password exchange, log-offs (up/down) Terminates connection at end of session (up/down) Dr. ClincyLecture 227

CS6027CS6027 OSI Session Layer Dr. ClincyLecture 228

CS6027CS6027 OSI Presentation Layer Provides format and code conversion services Examples –File conversion from ASCII to EBDIC –Invoking character sequences to generate bold, italics, etc on a printer The source and sink could operate using different encoding schemes – the presentation layer makes the translations Security Compression Dr. ClincyLecture 229

CS6027CS6027 OSI Application Layer Provides access to network for end-user (end-user being a human being or software application) User’s capabilities are determined by what items are available on this layer (ie. remote log-in, file transfer, service, directory service, etc.) Dr. ClincyLecture 230

CS6027CS6027 Dr. ClincyLecture 231 AZ BCQT Tx Rx Intermediate Nodes What happens at the End and Intermediate Nodes ?

CS6027CS6027 Dr. ClincyLecture 232 –between different layers on the same node or stack (INTERFACE) –between similar layers on different nodes or stacks (PEER-TO-PEER PROCESSES) Recap - OSI’s Layered Approach

CS6027CS6027 Dr. ClincyLecture 233 An exchange using the OSI model Explain encapsulation and decapsulation

CS6027CS6027 COMPLEXITY TO CONSIDER Any particular node in an internetwork can be functioning as follows simultaneously: Dr. ClincyLecture 234 Tx to other internetwork nodes Rx from other internetwork nodes Intermediate node to some other internetwork nodes

CS6027CS6027 OSI in Action: Outgoing File Transfer The File Transfer Program issues a command to the Application Layer Application passes it to Presentation, which may reformat, encrypt, encode, compress, passes to Session (adds overhead) Session requests a connection, passes to Transport (adds overhead) Transport breaks file into chunks, adds error-checking and flow- control info, process-to-process, passes to Network (adds overhead) Network selects the data’s route (internetworking), passes to Data Link (adds overhead) Data Link adds error-control and flow-control info, passes to Physical (adds overhead) Physical translates bits to signal and transmits the signal, which includes information added by each layer Dr. ClincyLecture 235

CS6027CS6027 OSI in Action: Incoming File Transfer Physical receives signal and translates to bits, passes to Data Link Data Link checks for errors and performs flow control on bits, formulates bits into some formation (frames), passes to Network Network verifies routing (if intermediate node, determines next hop), passes to Transport Transport checks for errors and performs flow control on the chunks, reassembles the chunks, passes to Session Session determines if transfer is complete, may end session, passes to Presentation Presentation may reformat, perform conversions, decode, decrypt, decompress, pass to Application layer Application presents results to user (e.g. updates FTP program display) Dr. ClincyLecture 236

CS6027CS6027 US Postal System Analogy Illustrate how the US Postal System is very similar to how networking works Will help students better understand (versus memorize) networking Dr. ClincyLecture 237 Lower Layers – getting the signal from one place to the next Upper Layers – creating and interpreting the signal, data or info