CS 4622 Computer Networks Lecture 1 Dr. Clincy Lecture 1.

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Network Protocols and Communications Introduction to Networks.
Advertisements

OSI Model OSI MODEL.
Chapter 5: TCP/IP and OSI Business Data Communications, 5e.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
1 William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
PROTOCOLS AND ARCHITECTURE Lesson 2 NETS2150/2850.
Protocols and the TCP/IP Suite Chapter 4 (Stallings Book)
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Chapter 4 : TCP/IP and OSI Business Data Communications, 4e.
Protocols and the TCP/IP Suite
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Network Protocols and Communications Introduction to Networks.
OIS Model TCP/IP Model.
Chapter 5: TCP/IP and OSI Business Data Communications, 6e.
Chapter 2 TCP/ IP PROTOCOL STACK. TCP/IP Protocol Suite Describes a set of general design guidelines and implementations of specific networking protocols.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 01 Instructor: Dr. Li-Chuan Chen TA: Waqar Ishaq Date: 08/25/2003.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Protocols and the TCP/IP Suite
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Network Protocols and Communications Introduction to Networks.
Introduction and Overview Chapter 1. Why Study TCP/IP? Forms global Internet base technology Has accommodated explosive growth well Protocols work over.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications 1.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
Internet SecurityInternet Security Dr. ClincyLecture1 CS 4491 Internet Security Dr. Clincy Networking Fundamentals Note: I am still “tweaking” your syllabus.
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
1 Chapters 2 & 3 Computer Networking Review – The TCP/IP Protocol Architecture.
Advanced Higher Computing Computer Networking Topic 1: Network Protocols and Standards.
Dr. ClincyLecture1 Chapter 2 (handout 1– only sections 2.1, 2.2 and 2.3) 1 of 10 Dr. Clincy Professor of CS Exam #3 Monday (3/14/16): Opened Book, No Computer,
CS6027CS6027 Dr. ClincyLecture 11 CS 6027 Advanced Computer Networking.
Computer Engineering and Networks, College of Engineering, Majmaah University Protocols OSI reference MODEL TCp /ip model Mohammed Saleem Bhat
Computer Networking A Top-Down Approach Featuring the Internet Introduction Jaypee Institute of Information Technology.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Lecture 3 : Network Architectures 1.
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
Chapter 3: Network Protocols and Communications
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Chapter 3: Network Protocols and Communications
Protocols and the TCP/IP Suite
Lecture (2).
Computer Networks.
Network Architecture Layered system with alternative abstractions available at a given layer.
CHAPTER 2 THE OSI MODEL.
Layered Architectures
Lecturer, Department of Computer Application
CS 6027 Advanced Computer Networking
DEPARTMENT OF COMPUTER SCIENCE
Dr. Clincy Professor of CS
Chapter 2 (Handout 1– only sections 2.1, 2.2 and 2.3)
Protocol Architectures
Protocols and the TCP/IP Suite
Data and Computer Communications by William Stallings Eighth Edition
Ch1: Introduction Ch 2: TCP/IP and OSI
Dr. Clincy Professor of CS
Chapter 2 (handout 1– only sections 2.1, 2.2 and 2.3)
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
OSI Model OSI MODEL.
Chapter 2. Protocols and Architecture
Introduction to TCP/IP
Protocols and the TCP/IP Suite
Computer Networking A Top-Down Approach Featuring the Internet
Dr. Clincy Professor of CS
EEC4113 Data Communication & Multimedia System Chapter 1: Introduction by Muhazam Mustapha, July 2010.
OSI Reference Model Unit II
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Unit – III Network Essentials
Presentation transcript:

CS 4622 Computer Networks Lecture 1 Dr. Clincy Lecture 1

Introduction and Overview Just 50 years ago, networks were proprietary (ie. IBM, HP, DEC, etc) Both the software (protocols or rules) and hardware used to make a network functional were proprietary. Also, the networks’ technologies (components) were designed for a specific purpose in mind (ie. Business, manufacturing, high/low-speed, small/large capacity, etc..) The certain applications could run on certain type networks Larger corporations would typically have many different disjointed computer networks - company mergers caused this problem too (wasn’t perceived as a problem then) Engineers and Scientists (or whomever) could have 3-4 terminals on his/her desk for different uses Customer would have to go to a specific vendor for an application or network upgrade Dr. Clincy Lecture 1

Introduction and Overview Back in the 70’s and early 80’s, there was a big push to make communication systems or networks “open” “open” means “non-proprietary” - instead of the “specifications” being known only by the vendor, the specs would be be publicly known By having publicly published specifications, all of the various vendors could design and manufacture network components that were compatible and interchangeable Why was this a good thing ???? (Even if you were a network-component-producing company with a significant market share) Dr. Clincy Lecture 1

Introduction and Overview Answer: would drive more (1) computer, (2) software application and (3) network usage - therefore, drive more revenue for all Answer: more efficiency for businesses, government, etc.. Also, what happened with the computer industry as it relates to OS’s ??? Dr. Clincy Lecture 1

Introduction and Overview The idea behind having “open systems” is to have the ability to interconnect many different networks into a single network. The technology that allows this is called “Internetworking” Internetworking provides: The Interconnection of heterogeneous (different) networks Set of communication standards/protocols that make the interconnected heterogeneous networks interoperate (river, language scenario) Internetworking “hides” the details of the underlying hardware and allow the network nodes to communicate independent of their physical connection (or hardware) Internetworking can be called “internet technology” – notice to lower case “i” on internet Dr. Clincy Lecture 1

Introduction and Overview Some time ago, the government realized the benefit of internet technology and funded a research project through an agency called ARPA – Advanced Research Projects Agency Through ARPA support, the “open” system specs were realized. These open specs were called “TCP/IP Internet Protocol Suite”, commonly called “TCP/IP” TCP – Transmission Control Protocol – dealt with higher level issues like segmentation, reassembly and error detection. IP – Internetworking Protocol – dealt with datagram routing TCP/IP was heavenly sent in that: (1) previously disjointed networks WITHIN companies could now function as a single network and (2) it facilitated communications amongst geographically dispersed sites With TCP/IP, the Internet was born. Notice the “I” on Internet – called the Global Internet Global Internet interconnects over 170 million nodes – testimonial for TCP/IP Dr. Clincy Lecture 1

Introduction and Overview Bottom Line: what makes TCP/IP so great and unique from other network protocols ??: Network Technology Independence – independent of a particular vendor’s hardware Universal Interconnection – any 2 computers connected to the internet can communicate – each computer has a unique internationally recognized address End-to-End Acknowledgements – acknowledgements between the source and destination versus intermediate nodes Application Protocol Standards – TCP/IP provides services (or software) to applications needing lower level communication services We will cover each of these attributes in detail throughout the course Internet uses TCP/IP Dr. Clincy Lecture 1

Introduction and Overview Read more details about the history in your book (Chapter 1) Who is responsible the Internet ?. Internet Architecture Board (IAB) IAB coordinates the research and development in relation to the TCP/IP protocols. The organization decides which protocols are required and sets policies Each member of the IAB chaired an Internet Task Force responsible for investigating a set of problems or issues each (there were 10 task forces) The chairman of the IAB was called the Internet Architect Dr. Clincy Lecture 1

Introduction and Overview In 1989, the IAB was re-organized due to commercial usage increases The original IAB researchers were moved under the Internet Research Task Force – their focus is longer term research The Internet Engineering Task Force is more concerned about short-term issues and is mostly comprised of industry types The Internet Engineering Task Force Chairman and managers of each “working group” forms the Internet Engineering Steering Group – this group is responsible for coordination In 1992, a group called the Internet Society (ISOC) was form to encourage participation on the Internet. Dr. Clincy Lecture 1

Introduction and Overview Documentation of TCP/IP is placed in online repositories and made available at no charge – you will be responsible for collecting some of this documentation The final and official TCP/IP documents start out as an Internet draft (working document) Upon recommendation from Internet authorities, the draft may be published as a Request for Comment (RFC) Each RFC is edited, assigned a number and made available to all interested parties. RFC’s go through maturity levels and are organized according to their requirement level The six maturity levels are: proposed standard, draft standard, Internet standard, historic, experimental and informational RFC’s are classified into 5 requirements levels: required, recommended, elective, limited use and not recommended You can secure RFC’s: regular mail, e-mail, ftp or Internet (http://www.rfc-editor.org) Dr. Clincy Lecture 1

Introduction and Overview Dr. Clincy Lecture 1

Introduction and Overview Protocols – set of rules that governs data communications – defines what is communicated, how it is communicated and when it is communicated Protocol elements are: Syntax – structure or format of the data (order of the bits) Semantics – meaning of each section of bits – how to interpret the pattern of bits Timing – deals with (1) when the data should be sent and (2) how fast it should be sent (ie. a Tx can overload a Rx and therefore data can be lost or mis-interpreted) More clarity: the TCP/IP protocol allows one to specify data communications without understanding the details of the underlying hardware. Dr. Clincy Lecture 1

Why Study OSI? Still an excellent model for conceptualizing and understanding protocol architectures More granularity in functionality - more functional delineation Key points: Modular Hierarchical (chain of command, pecking order) Boundaries between layers (called interfaces) NOTE: the protocols or functionality with in the layer could change however, the interface remains the same – this facilitates the flexibility Dr. Clincy Lecture 1

OSI Reference Model ? OSI – Open Systems Interconnection Set of rules of how to transmit data across a network at the lower levels of the model protocols define the electrical and physical standards at the lower levels, the bit ordering, the transmission of the bits, and error detecting and correcting are defined at the higher levels of the model, the protocols define the data formatting, message syntax, dialogue management, message sequences and info presentation Dr. Clincy Lecture 1

Advantages of Layering Easier application development Network can change without all programs being modified Breaks complex tasks into subtasks Each layer handles a specific subset of tasks Communication occurs between different layers on the same node or stack (INTERFACES) between similar layers on different nodes or stacks (PEER-TO-PEER PROCESSES Dr. Clincy Lecture 1

OSI’s Layered Approach Example Network A Network B Actual commands invoked, presentation Top Layer Some Intermediate Layer Bottom Layer Top Layer Some Intermediate Layer Bottom Layer Facilitate the actual communications Network interfaces, raw bits How does peer-to-peer communication work ? Dr. Clincy Lecture 1

OSI Application Open Systems Interconnection Presentation Session Transport Network Data Link Physical Open Systems Interconnection Developed by ISO (International Organization for Standardization) Contains seven layers Dr. Clincy Lecture 1

OSI Reference Model ? Bottom 3 layers Top 4 layers Bottom 3 layers responsible for getting the info to the destination (Bottom 3 layers): at the lower levels of the model protocols define the electrical and physical standards (Bottom 3 layers) at the lower levels, the bit ordering, the transmission of the bits, and error detecting and correcting are defined Top 4 layers at the higher levels of the model, the protocols define the data formatting, message syntax, dialogue management, message sequences and info presentation Dr. Clincy Lecture 1