Networking.

Slides:



Advertisements
Similar presentations
Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
Advertisements

OSI Model OSI MODEL.
OSI Model OSI LAYER / MODEL.
Open System Interconnection
Lecture 2 Protocol Layers CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger.
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Chapter 2 Network Models.
TCP/IP Reference Model Host To Network Layer Transport Layer Application Layer Internet Layer.
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Lecturer: Tamanna Haque Nipa
Introducing Network Standards Open Systems Interconnection (OSI) Model IEEE 802.x Standard Device Drivers and OSI 1.
Lecture 1 Internet CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger and Daniel Zappala Lecture 1 Introduction.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Layer Architecture Layer architecture simplifies the network design. It is easy to debug network applications in a layered architecture network. The network.
The OSI Model An ISO (International standard Organization) that covers all aspects of network communications is the Open System Interconnection (OSI) model.
COMPUTER NETWORKS Ms. Mrinmoyee Mukherjee Assistant Professor
The OSI Model.
Lecture 1 Internet CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger and Daniel Zappala Lecture 2 Introduction.
Lecture 3 Overview. Protocol An agreed upon convention for communication both endpoints need to understand the protocol. Protocols must be formally defined.
INTRODUCTION TO NETWORKS & OSI MODEL T.RAMYAAPI/EIEKLNCE.
William Stallings Data and Computer Communications
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
Open System Interconnection Describe how information from a software application in one computer moves through a network medium to a software application.
1 Networking. 2 Network “... communication system for connecting end-systems” End-systems a.k.a. “hosts” PCs, workstations dedicated computers network.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
Protocol Suits and Layering Models OSI Model Dr. Abraham UTPA.
Protocol Layering Chapter 11.
1 Netprog: OSI Reference Model Networking. 2 Network “... communication system for connecting end-systems” End-systems a.k.a. “hosts” PCs, workstations.
OSI Model. Open Systems Interconnection (OSI) is a set of internationally recognized, non proprietary standards for networking and for operating system.
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Mr. Sathish Kumar. M Department of Electronics and Communication Engineering I’ve learned that people will forget what you said, people will forget what.
The OSI Model. History of OSI Model ISO began developing the OSI model in It is widely accepted as a model for understanding network communication.
Computer Engineering and Networks, College of Engineering, Majmaah University Protocols OSI reference MODEL TCp /ip model Mohammed Saleem Bhat
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
Network Models.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
The OSI Model Prof. Choong Seon HONG.
Chapter 4 Introduction to Network Layer
Click to edit Master subtitle style
OSI NETWORK MODEL.
ISO/OSI Model and Collision Domain
Lecturer, Department of Computer Application
TCP/IP Transmission Control Protocol / Internet Protocol
DEPARTMENT OF COMPUTER SCIENCE
Lecture 2 Overview.
Introduction to Protocol and Layer
Network Concepts Devices
CPE 401 / 601 Computer Network Systems
IP - The Internet Protocol
Chapter 3: Open Systems Interconnection (OSI) Model
Chapter 4 Introduction to Network Layer
IP - The Internet Protocol
Lecture 2: Overview of TCP/IP protocol
OSI Model OSI MODEL.
IP - The Internet Protocol
Network Architecture Models
Networking.
EEC4113 Data Communication & Multimedia System Chapter 1: Introduction by Muhazam Mustapha, July 2010.
OSI Reference Model Unit II
IP - The Internet Protocol
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Virtual LAN (VLAN).
Bridge Software A bridge connects networks and forwards frames from one network to another. PORTS A B E F BRIDGE C D G H.
Unit – III Network Essentials
Presentation transcript:

Networking

Network ... communication system for connecting end-systems PCs, workstations dedicated computers network components

Multiaccess vs. Point-to-point Multiaccess means shared medium. many end-systems share the same physical communication resources (wire, frequency, ...) There must be some arbitration mechanism. Point-to-point only 2 systems involved no doubt about where data came from !

Multiaccess Point-to-point

LAN - Local Area Network connects computers that are physically close together ( < 1 mile). high speed multi-access Technologies: Ethernet 10 Mbps Token Ring 16 Mbps FDDI 100 Mbps

WAN - Wide Area Network connects computers that are physically far apart. ‘long-haul network’ typically slower than a LAN. typically less relaiable than a LAN. point-to-point Technologies: telephone lines Satellite communications

MAN - Metropolitan Area Network Larger than a LAN and smaller than a WAN - example: campus-wide network - multi-access network Technologies: coaxial cable microwave

Internetwork Net A Net B Connection of 2 or more distinct (possibly dissimiliar) networks. Requires some kind of network device to facilitate the connection. Net A Net B

OSI Reference Model Layered model: 7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data Link 1. Physical

The Physical Layer Responsibility: Issues: transmission of raw bits over a communication channel. Issues: mechanical and electrical interfaces time per bit distances

The Data Link Layer - Data Link Control Responsibility: provide an error-free communication link Issues: framing (dividing data into chunks) header & trailer bits addressing 10110110101 01100010011 10110000001

The Data Link Layer - The MAC sublayer Medium Access Control - needed by mutiaccess communications. MAC provides DLC with ‘virtual wires’ on multiaccess networks.

The Network Layer Responsibilities: Issues: path selection between end-systems (routing). subnet flow control. translation between different network types. Issues: packet headers virtual circuits

The Transport Layer Responsibities: Issues: provides virtual end-to-end links between peer processes. fragmentation & reassembly end-to-end flow control Issues: headers error detection reliable communication

The Session Layer Responsibilities: establishes, manages, and terminates sessions between applications. service location lookup Many protocol suites do not include a session layer.

The Presentation Layer Responsibilities: data encryption data compression data conversion Many protocol suites do not include a Presentation Layer.

The Application Layer Responsibities: Issues: anything not provided by any of the other layers Issues: application level protocols appropriate selection of type of service

Layering & Headers Each layer needs to add some control information to the data in order to do its job. This information is typically prepended to the data before being given to lower layers. Once the lower layers deliver the the data and control information - the peer layer uses the control information.

Headers Process DATA Process Transport H DATA Transport Network H H Data Link H H H DATA Data Link

What are the headers? Physical: no header - just a bunch of bits. Data Link: address of the receiving endpoints address of the sending endpoint length of the data checksum.

Network layer header protocol protocol suite version header checksum source network address destination network address protocol suite version type of service length of the data packet identifier fragment number time to live

Connecting Networks Repeater: physical layer Bridge: data link layer Router: network layer Gateway: network layer and above.

Repeater Copies bits from one network to another Does not look at any bits Allows the extension of a network beyond physical length limitations REPEATER

Bridge Copies frames from one network to another Can operate selectively - does not copy all frames (must look at data-link headers). Extends the network beyond physical length limitations. BRIDGE

Router Copies packets from one network to another. Makes decisions about what route a packet should take (looks at network headers). ROUTER

Gateway Operates as a router Data conversions above the network layer. encapsulation - use an intermediate network translation - connect different application protocols encrpyption - could be done by a gateway

Encapsulation Example Gateway Gateway Provides service connectivity even though intermediate network does not support protocols.

Translation Gateway Translate from red protocol to brown protocol

Encryption/Decryption Encryption gateway Secure Network Secure Network Encryption/Decryption Gateways ? GW GW ? ? Insecure Network

Hardware vs. Software Repeaters are typically hardware devices. Bridges can be implemented in hardware or software. Routers & Gateways are typically implemented in software so that they can be extended to handle new protocols. Many workstations can operate as routers or gateways.

Byte Ordering Different computer architectures use different byte ordering to represent multibyte values. 16 bit integer: Low Byte Address A High Byte High Byte Address A+1 Low Byte

Byte Ordering Little-Endian IBM 80x86 DEC VAX DEC PDP-11 Big-Endian Motorola 68000 Sun Low Byte High Byte High Byte Low Byte Addr A Addr A+1 Addr A Addr A+1

Network Byte Order Conversion of application-level data is left up to the presentation layer. How do lower level layers communicate if they all represent values differently ? (data length fields in headers) A fixed byte order is used (called network byte order) for all control data.

Multiplexing ‘to combine many into one’ Many processes sharing a single network interface. A single process could use multiple protocols. More on this when we look at TCP/IP.

Modes of Service connection-oriented vs. connectionless sequencing error-control flow-control byte stream vs. message based full-duplex vs. half-duplex.

Connection-Oriented vs. Connectionless Service A connection-oriented service includes the establishment of a logical connection between 2 processes. establish logical connection transfer data terminate connection. Connectionless services involve sending of independent messages.

Sequencing Sequencing provides support for an order to communications. A service that includes sequencing requires that messages (or bytes) are received in the same order they are sent.

Error Control Some services require error detection (it is important to know when a transmission error has occured). Checksums provide a simple error detection mechanism. Error control sometimes involves notification and retransmission.

Flow Control Flow control prevents the sending process from overwhelming the receiving process. Flow control can be handled a variety of ways - this is one of the major research issues in the development of the next generation of networks (ATM).

Byte Stream vs. Message Byte stream implies an ordered sequence of bytes with no message boundaries. Message oriented services provide communication service to chunks of data called datagrams.

Full- vs. Half-Duplex Full-Duplex services support the transfer of data in both directions. Half-Duplex services support the transfer of data in a single direction.

End-to-End vs. Hop-toHop Many service modes/features such as flow control and error control can be done either: between endpoints of the communication. -or- between every 2 nodes on the path between the endpoints.

End-to-End Process A Process B

Hop-by-Hop Process A Process B

Buffering Bufferring can provide more efficient communications. Buffering is most useful for byte stream services. Process A Send Buffer Recv. Buffer Process B

Addresses Each communication endpoint must have an address. Consider 2 processes communicating over an internet: the network must be specified the host must be specified the process must be specified.

Addresses Physical Layer: no address necessary Data Link Layer - address must be able to select any host on the network. Network Layer - address must be able to provide information to enable routing. Transport Layer - address must identify the destination process.

Broadcasts Many networks support the notion of sending a message from one host to all other hosts on the network. A special address called the ‘broadcast address’ is often used. Some popular network services are based on broadcasting (YP/NIS, rup, rusers )

Bridge Software A bridge connects networks and forwards frames from one network to another. PORTS A B E F BRIDGE C D G H

Selective Forwarding BRIDGE A B C D E F G H If A sends a frame to E - the frame must be forwarded by the bridge. If A sends a frame to B - there is no reason to forward the frame.

Bridge Database The bridge needs a database that contains information about which hosts are on which network. The realistic options are: The system administrator can create and maintain the database. The bridge can acquire the database on the fly. Hard to add new computers Some loss of efficiency

Learning the host mapping The bridge forwards packets for which it does not know which network the destination is on. Everytime the bridge forwards a packet it can record the network on which the sender is located. Each host mapping expires when it is unused for a ‘long’ period of time.

Learning Bridge A host can be moved to another network. New hosts can be added at any time. Requires no setup information from humans.

What is the problem ? Bridge 1 1 D A E B F C Bridge 2 1