Internetworking Fundamentals (Lecture #1) Andres Rengifo Copyright 2008.

Slides:



Advertisements
Similar presentations
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Advertisements

1.1 Chapter 1 Introduction Lecture # 1 – 2 Ali Mustafa.
OSI MODEL Maninder Kaur
CSCI-235 Micro-Computers in Science The Network. Network Fundamentals A computer network consists of two or more computers linked together to exchange.
Packet Switching Vs Circuit Switching Packet-switched and circuit-switched networks use two different technologies for sending messages and data from one.
1 The 7 layer OSI model Sending an . 2 The seven layers.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Internetworking Fundamentals (Lecture #4) Andres Rengifo Copyright 2008.
EE 4272Spring, 2003 EE4272: Computer Networks Instructor: Tricia Chigan Dept.: Elec. & Comp. Eng. Spring, 2003.
EE 4272Spring, 2003 Protocols & Architecture A Protocol Architecture is the layered structure of hardware & software that supports the exchange of data.
Internetworking Fundamentals (Lecture #2) Andres Rengifo Copyright 2008.
Chapter 2 Network Models.
COMPUTER NETWORKS.
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
Term 2, 2011 Week 1. CONTENTS Network communications standards – Ethernet – TCP/IP Other network protocols – The standard – Wireless application.
Data Communication and Networking
SEPT, 2005CSI Part 2.2 Protocols and Protocol Layering Robert Probert, SITE, University of Ottawa.
Network Hardware for Expanding Network. Expanding Networks When do we need expansion:  Network cable is full of data movements  Printing tasks needs.
Data Communications and Networks
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Lecture 1 The OSI Model Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
1 Networks and Telecommunications. 2 Applying Telecommunications in Business TELECOMMUNICATIONS – the transmission of data between devices in different.
Chapter 7 Networking: Computer Connections. Networks n Network - a computer system that uses communications equipment to connect two or more computers.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
The OSI Model An ISO (International standard Organization) that covers all aspects of network communications is the Open System Interconnection (OSI) model.
 An ISO is a multi national body dedicated to worldwide agreement on international standards.  An ISO standard that covers all aspects of network communications.
1 Chapter 16 Protocols and Protocol Layering. 2 Protocol  Agreement about communication  Specifies  Format of messages (syntax)  Meaning of messages.
The OSI Model.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
Computer Networks. Data & Communication When we communicate we share information  Local Communication, if Face to Face  Remote, if through Telephone.
Lecturer: Tamanna Haque Nipa
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
UNIT -1. DATA COMMUNICATIONS The term telecommunication means communication at a distance. The word data refers to information presented in whatever form.
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
William Stallings Data and Computer Communications
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
Prepared by Engr.Jawad Ali BSc(Hons)Computer Systems Engineering University of Engineering and Technology Peshawar.
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
Transferring Data Around. Networks Is a series of computer systems that are linked together so that they are able to share computer power or storage facilities.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Networks. Ethernet  Invented by Dr. Robert Metcalfe in 1970 at Xerox Palo Alto Research Center  Allows group of computers to communicate in a Local.
FUNDAMENTALS OF NETWORKING
Networks Network Components. Learning Objectives Describe different media for transmitting data and their carrying capabilities. Explain the different.
Local Area Networks Honolulu Community College
SYSTEM ADMINISTRATION Chapter 2 The OSI Model. The OSI Model was designed by the International Standards Organization (ISO) as a structural framework.
WAN Transmission Media
Data Communication and Networks Chapter 5. What’s a Network? a network consists of two or more computers that are connected together to share information.
1 Protocols and Protocol Layering. 2 Protocol Agreement about communication Specifies –Format of messages –Meaning of messages –Rules for exchange –Procedures.
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Dr. ClincyLecture1 Chapter 2 (handout 1– only sections 2.1, 2.2 and 2.3) 1 of 10 Dr. Clincy Professor of CS Exam #3 Monday (3/14/16): Opened Book, No Computer,
CSCI-100 Introduction to Computing The Network. Network Fundamentals A computer network consists of two or more computers linked together to exchange.
Network Processing Systems Design
Network Hardware for Expanding Network
Lecture (2).
CS408/533 Computer Networks Text: William Stallings Data and Computer Communications, 6th edition Chapter 1 - Introduction.
Local Area Networks Honolulu Community College
Packet Switching Datagram Approach Virtual Circuit Approach
CHAPTER 2 THE OSI MODEL.
Chapter 3: Open Systems Interconnection (OSI) Model
ECE 4450:427/527 - Computer Networks Spring 2017
Introduction and Overview
Protocols and Protocol Layering
Protocols and Protocol Layering
Presentation transcript:

Internetworking Fundamentals (Lecture #1) Andres Rengifo Copyright 2008

What is a communication system? It is composed of both hardware and software that allows users to exchange information. Information is referred to as graphics, text, video, audio, data, etc. First communication system developed was the telephone system. –It was used as the model to all data communication systems. –The idea behind the system is that it should be very reliable, efficient and it should provide the services that it advertises.

What is a communications system? (Cont.) What devices are necessary to make up a communication system? –A source –A transmitter –A Transmission system or cloud –A receiver –A destination

What is a communication system? (Cont.) A source creates the actual data to be transported across a network. Applications such as software, word processors, etc will create the information which will traverse the network. A transmitter takes this information and encodes it using the right signaling mechanism according to the physical topology. It merely encodes the information but it does not change it.

What is a communication system? (Cont.) A transmission system is usually referred to as the cloud. A receiver takes that encoded signal that has all the information content and decodes it so that it can be provided to the final destination. A destination takes the information provided by the network and interprets it using applications accordingly.

What are the key functions needed when designing a communication network? Utilization Congestion Control mechanisms Flow control Error detection and error correction mechanisms Hand-shake processes Recovery mechanisms Security schemes Network management

Key functions (Cont.) Maintaining the proper utilization on a network is important. Multiple users will be sending data at the same time. –These communication flows cannot interfere with each other so as not to drop any information. –When a system is heavily utilized, data is lost due to oversubscription. It is important to provide the proper bandwidth allocation to allow data not to be dropped. –Usually the interconnection between networks is design to be a very high speed link between two points.

Key Functions (Cont.) Congestion Control Mechanisms are necessary in order to prevent data loss. –Data is throttle back between systems in order to prevent the overflowing and possible data corruption. –It is basically an advanced buffering scheme which is agreed to between two systems.

Key Functions (Cont.) Flow control is a method where two devices or entities “agree” ahead of time to exchange data at a specific rate given a specific window or buffer size without dropping data. –One device tells the other “stop sending me data because I am processing data in my buffer space. When I am done, I will tell you to send” –The other side responds with “ok, I will wait, just let me know when to send the data..”

Key Functions (Cont.) Error detection and error correction mechanisms are necessary to make sure the integrity of the data sent between two points is maintained. The error mechanisms will detect that a specific bit that changed from a 1 to a 0 and the process will be able to change it back to the original bit as it was intended.

Key Functions (Cont.) Handshaking is a very important process in order to provide a clean and optimal connection between two devices. –It is a mutual agreement ahead of time (before the exchange of data) as to what buffer sizes will be in used, how fast is the data going to be sent, how much data will be sent, what protocol or language will be used, etc. –After these parameters are exchanged and agreed too, the conversation will begin.

Key Functions (Cont.) Recovery mechanisms are important in case there is a “break” in the path of the data flow. –This process should allow the communication flow to continue from the point it left off during the break without having to start again from the beginning.

Key Functions (Cont.) Security schemes are important because there is always the threat to a network with regards to attacks, viruses, denial of services, etc. Firewalls usually are implemented to protect the infrastructure both inside and outside.

Key Functions (Cont.) Network management is important because it is the process or mechanism that provides the administrator with a “health” view of the actual network. –Network management tools look for outages, possible issues on the network and ways to correct them. –Being proactive is probably the best way of managing a network because it tells the network administrator of the possibility of an outage before the users realized the issue. If the user calls complaining about the problem, it is already too late and it now becomes a reactive measure.

How is information exchanged on a given network? Data is usually converted to 1’s and 0’s as computer systems only understand this language. These data bits are then sent across different types of physical mediums such as electrical wires, fiber optic cables, microwave links, etc. –Data is not sent across the physical media as 1’s or 0’s but instead as voltages, light, or frequencies. For example, if there are wires connected to the computer, the 1’s and 0’s will be converted using a pulse mechanisms where a 1 is -3V and a 0 is +3V and this in turn creates a sinusoidal wave using electrons carried across the wiring.

How are these networks interconnected? International organizations such as the IEEE and EIA (Electronic Industries Alliance) came up with different standard ways of interconnecting devices using cabling and specific protocols to allow for that communication –For example, a printer connected to a comm port on a computer. The standard says how fast data can be transfer between the two devices, etc. –In early stages, the speeds were slow such as 2400 bps or 1200 bps. –The need to have faster communication between two network nodes gave way to improved protocols. These were referred to as data link protocols.

Campus Design (Interconnecting nodes to form a network) Cisco refers to a campus design to a network that is broken into different layers. Each layer has a function and provides specific services. –There are usually three layers to this architecture: Access Layer Distribution Layer Core Layer

Campus Design (Interconnecting nodes to form a network)

Store and Forward Mechanism When user A sends a message to user B, this information is digitized and segmented. These segments are divided into packets and sent across the network. Each intermediate node between users will take in, process the packets, and pass them along to the next node without having to wait for the entire message to arrive. When user “A” sends packet 1 to intermediate node 1 and it is received, packet 2 is already leaving user “A”. At the same time, packet 1 is leaving intermediate node 1 to intermediate node 2 while it receives packet 2 from user “A”.

Why Packetized data vs Streaming 1’s and 0’s Store and Forward process is much faster than streaming. This means user A sends the entire message to intermediate node 1, where node 1 waits for the whole message to arrive. Streaming – When data is not grouped into packets but instead is sent as a stream of 1’s and 0’s, it will only forward to intermediate node 2 once the entire message has arrived. If the string of 1’s and 0’s takes one minute to go between two directly connected nodes and each node has to wait for all the 1’s and 0’s of the stream to arrived, it will take the number of nodes in minutes plus one minute to transfer the message from user A to user B. Packetized –Instead, when the message is broken into equal size packets (i.e. 60 packets) and each packet takes one second to get between two nodes, it will take only one minute plus the number of intermediate nodes in seconds for the message to reach its destination.

Internet Topology This system is made up of millions of computers that interconnect and use common networks to transport everyone’s data. These common networks are made up of interconnections between Internet Service Providers’ (ISPs) high-speed routers and switches, which create what it is called the Internet backbone. These “backbones” allow for the transfer of data at very high speeds and provide connections to other smaller networks, which then provide connectivity to end-users. On huge communication systems like the Internet, there are also centralized points called Network Access Points (Naps), strategically located around the world to allow for the exchange of Internet traffic specific to the region. In the United States, there are multiple Naps that interconnect multiple ISPs, which in turned, connect to other networks.