Computer Networking Yishay Mansour Nir Andelman (http://www.cs.tau.ac.il/~andelmni)

Slides:



Advertisements
Similar presentations
Protocol Layering An Engineering Approach to Computer Networking.
Advertisements

Protocol Layering An Engineering Approach to Computer Networking.
OSI Model OSI MODEL.
TA: Xifan Zheng Welcome to CPSC 441!
Chapter 2 Network Models.
Lecture 2 Protocol Layers CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger.
H. Levy, Sadna P2P Sadna Advanced Internet applications and Systems: Peer to Peer Hanoch Levy & Hillel Avni ( hanoch at cs.tau.ac.il,
Networking Based on the powerpoint presentation of Computer Networking: A Top Down Approach Featuring the Internet, Third Edition, J.F. Kurose and K.W.
Chapter 1 Read (again) chapter 1.
EE 4272Spring, 2003 EE4272: Computer Networks Instructor: Tricia Chigan Dept.: Elec. & Comp. Eng. Spring, 2003.
1: Introduction1 Protocol “Layers” Networks are complex! r many “pieces”: m hosts m routers m links of various media m applications m protocols m hardware,
Review on Networking Technologies Linda Wu (CMPT )
Oct 18, 2009 Computer Networking Yishay Mansour (mansour at cs.tau.ac.il)mansour at cs.tau.ac.il Teaching Assistant: Hillel Avni 1.
1 Computer Networking Yehuda Afek (afek at cs.tau.ac.il)afek at cs.tau.ac.il Adopted the slides from Yishay Mansour Teaching Assistant: Yahav Nussbaum.
Introduction© Dr. Ayman Abdel-Hamid, CS4254 Spring CS4254 Computer Network Architecture and Programming Dr. Ayman A. Abdel-Hamid Computer Science.
Protocol Layering Peer and Layer entities Customer A and B are peers Postal worker A and B are peers.
1 Computer Networking. 2 Today’s Networks are complex! t hosts t routers t links of various media t applications t protocols t hardware, software Tomorrow.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Gursharan Singh Tatla Transport Layer 16-May
OIS Model TCP/IP Model.
1 Protocol Interaction (ISO’s Open Systems Interconnection (OSI model)) the 7 layers.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Data Communications and Networks
Computer Networking Introduction, Part II.
Review: – computer networks – topology: pair-wise connection, point-to-point networks and broadcast networks – switching techniques packet switching and.
Chapter 1 Overview Review Overview of demonstration network
Chapter 2 Network Models
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
CS 381 Introduction to computer networks Chapter 1 - Lecture 4 2/10/2015.
1: Introduction1 Internet History r 1961: Kleinrock - queueing theory shows effectiveness of packet- switching r 1964: Baran - packet- switching in military.
Course info1 1 st Semester 2007 MI305 Computer Networks  Instructor: Jen-Liang Cheng   Office: H501-1( 福田樓 )  Lectures:
1 Protocol “Layers” Networks are complex! r many “pieces”: m hosts m routers m links of various media m applications m protocols m hardware, software Question:
Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
ECE 4400:427/527 - Computer Networks Spring 2015 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 3: Network Architectures Dr. Nghi.
Computer Networks. Introduction Computer Network2 A History Lesson of Networking 1969 – ARPANET, first packet switched network consist of UCLA, Stanford,
Spring 2006Computer Networks1 Chapter 2 Network Models.
CPSC 411 Tutorial TA: Fang Wang. Fang Wang 9:00am-5:00pm, Mon-Fri.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
TCP/IP Network.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
CS 3830 Day 6 Introduction 1-1. Announcements  Program 2 posted this afternoon (due date will be week of 9/24) Introduction 1-2.
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
William Stallings Data and Computer Communications
Internet History CS 4244: Internet Programming Dr. Eli Tilevich.
1: Introduction1 Introduction 3. 1: Introduction2 Delay in packet-switched networks packets experience delay on end-to-end path r four sources of delay.
1 Networking. 2 Network “... communication system for connecting end-systems” End-systems a.k.a. “hosts” PCs, workstations dedicated computers network.
1: Introduction1 Protocol “Layers” Networks are complex! r many “pieces”: m hosts m routers m links of various media m applications m protocols m hardware,
Protocol Suits and Layering Models OSI Model Dr. Abraham UTPA.
Net 221D:Computer Networks Fundamentals
1 Protocol Layering Myungchul Kim Tel:
Lecture # 02 Network Models Course Instructor: Engr. Sana Ziafat.
Lect. 1: Oct 14, 2013 Computer Networking Prof. Hanoch Levy (hanoch at cs.tau.ac.il )hanoch at cs.tau.ac.il Teaching Assistant: Allon Wagner 1.
Lecture 1: Facts of network technologies developments
Lecture # 02 Network Models Course Instructor: Engr. Sana Ziafat.
Computer Engineering and Networks, College of Engineering, Majmaah University Protocols OSI reference MODEL TCp /ip model Mohammed Saleem Bhat
Introduction to Communication Networks 1/ Introduction to Communication Networks Amit Dvir Lecture 1 Introduction and Layering.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Computer Networks.
An Aleksandar,   Accounts have been created for any students in EECS 340 who did not already have one.  Physical access to the labs has.
OSI Protocol Stack Given the post man exemple.
Protocol “Layers” Question: Networks are complex! many “pieces”: hosts
ECE 4400:427/527 - Computer Networks Spring 2017
An Engineering Approach to Computer Networking
Network Architecture Models
Protocol “Layers” Question: Networks are complex! many “pieces”: hosts
Protocol “Layers” Question: Networks are complex! many “pieces”: hosts
Protocol “Layers” Question: Networks are complex! many “pieces”: hosts
Computer Networking.
Unit – III Network Essentials
Presentation transcript:

Computer Networking Yishay Mansour Nir Andelman (

Course Information Lectures: Tuesday 9-12 Exercises: Wendsday Web site: An Engineering Approach to Computer Networking / Keshav Computer Networks / Tanenbaum Data Networks / Bertsekas and Gallager A Top-down Approach to Computer Networking / Kurouse-Ross Books:

Practical Information Homework assignment: Mandatory Both theoretical and programming Done in pairs Grades: Final Exam: 60% February 5 and October 18 theory exercises: 20% Programming exercises: 20%

Motivation Today ’ s economy manufacturing, distributing, and retailing goods but also creating and disseminating information publishing banking film making …. part of the ‘ information economy ’ Future economy is likely to be dominated by information!

Information? A representation of knowledge Examples: books bills CDs Can be represented in two ways analog (atoms) digital (bits) the Digital Revolution convert information as atoms to information as bits use networks to move bits around instead of atoms

The Challenges t represent all types of information as bits. t move the bits u In large quantities, u everywhere, u cheaply, u Securely, u with quality of service,  ….

Today’s Networks are complex! t hosts t routers t links of various media t applications t protocols t hardware, software Tomorrow ’ s will be even more!

This course ’ s Challenge To discuss this complexity in an organized way, that will make today ’ s computer networks (and their limitations) more comprehensive. identification, and understanding relationship of complex system ’ s pieces. Problems that are beyond a specific technology

Early communications systems I.e. telephone point-to-point links directly connect together the users wishing to communicate use dedicated communication circuit if distance between users increases beyond the length of the cable, the connection is formed by a number of sections connected end-to-end in series.

Data Networks set of interconnected nodes exchange information sharing of the transmission circuits= "switching". many links allow more than one path between every 2 nodes. network must select an appropriate path for each required connection.

Networking Issues - Telephone  Addressing - identify the end user phone number = country code + city code + exchange + number  Routing - How to get from source to destination. Telephone circuit switching: Based on the phone number.  Information Units - How is information sent telephone Fixed sampling rate. not self descriptive! have to know where and when a sample came

Networking Issues - Internet  Addressing - identify the end user IP addresses , Refer to a host interface = network number + host number  Routing- How to get from source to destination Packet switching: move packets (chunks) of data among routers from source to destination independently.  Information Units - How is information sent. Self-descriptive data: packet = data + metadata (header).

Telephone networks support a single, end-to- end quality of service but is expensive to boot Internet supports no quality of service but is flexible and cheap A future network will have to support a range of service qualities at a reasonable cost

History : Early packet-switching principles 1961: Kleinrock - queuing theory shows effectiveness of packet-switching 1964: Baran - packet-switching in military networks 1967: ARPAnet – conceived by Advanced Research Projects Agency 1969: first ARPAnet node operational 1972: ARPAnet demonstrated publicly NCP (Network Control Protocol) first host-host protocol first program ARPAnet has 15 nodes

History : Internetworking, new and proprietary nets 1970: ALOHAnet satellite network in Hawaii 1973: Metcalfe ’ s PhD thesis proposes Ethernet 1974: Cerf and Kahn - architecture for interconnecting networks late70 ’ s: proprietary architectures: DECnet, SNA, XNA late 70 ’ s: switching fixed length packets (ATM precursor) 1979: ARPAnet has 200 nodes

Cerf and Kahn ’ s internetworking principles: minimalism, autonomy - no internal changes required to interconnect networks best effort service model stateless routers decentralized control Defines today ’ s Internet architecture

History : new protocols, proliferation of networks 1983: deployment of TCP/IP 1982: SMTP protocol defined 1983: DNS defined for name-to-IP-address translation 1985: FTP protocol defined 1988: TCP congestion control new national networks: CSnet, BITnet, NSFnet, Minitel 100,000 hosts connected to confederation of networks

History : commercialization and WWW early 1990 ’ s: ARPAnet decomissioned 1991: NSF lifts restrictions on commercial use of NSFnet (decommissioned, 1995) early 1990s: WWW hypertext [Bush 1945, Nelson 1960 ’ s] HTML, http: Berners-Lee 1994: Mosaic, later Netscape late 1990 ’ s: commercialization of WWW

Demand and Supply Huge growth in users The introduction of the web Faster home access Better user experience. Infrastructure Significant portion of telecommunication. New evolving industries Although, sometimes temporary setbacks

Internet: Users

Users around the Globe (2002)

Users around the Globe (2005)

Technology: Modem speed

Today ’ s options Modem: 56 K ISDN: 64K – 128K Frame Relay: 56K ++ Today High Speed Connections All are available at 5Mb (2005) Cable, ADSL, Satellite.

Coming soon:

Today

Protocol Layers A way for organizing structure of network The idea: a series of steps  … Or at least our discussion of networks

To: Yishay From: Vered Haifa TLV BGN JFK Transport Handling Routing To: Boston From: TLV Shipment 792 Pack. 3 of 3 To: Yishay From: Vered To: Boston To: Yishay From: Vered Shipment 792 Pack. 3 of 3 To: Boston From: TLV To: Yishay From: Vered To: Yishay From: Vered Shipment 792 Pack. 3 of 3 Shipment 792 Pack. 2 of 3 Shipment 792 Pack. 1 of 3 To: Yishay From: Vered

To: Yishay From: Vered To: Yishay From: Vered To: Yishay From: Vered To: Yishay From: Vered Shipment 792 Pack. 3 of 3 Shipment 792 Pack. 2 of 3 Shipment 792 Pack. 1 of 3 N.Y. Boston JFK To: Yishay From: Vered To: Yishay From: Vered Shipment 792 Pack. 3 of 3 To: Boston From: TLV To: Boston Shipment 792 Pack. 3 of 3 To: Boston From: TLV

Layers: Person delivery of parcel Post office counter handling Ground transfer: loading on trucks Airport transfer: loading on airplane Airplane routing from source to destination each layer implements a service via its own internal-layer actions relying on services provided by layer below Peer entities

Advantages of Layering explicit structure allows identification & relationship of complex system ’ s pieces layered reference model for discussion modularization eases maintenance & updating of system change of implementation of layer ’ s service transparent to rest of system

Protocols A protocol is a set of rules and formats that govern the communication between communicating peers set of valid messages meaning of each message Necessary for any function that requires cooperation between peers

A protocol provides a service For example: the post office protocol for reliable parcel transfer service Peer entities use a protocol to provide a service to a higher-level peer entity for example, truck drivers use a protocol to present post offices with the abstraction of an unreliable parcel transfer service Protocols

Protocol Layers A network that provides many services needs many protocols Some services are independent, But others depend on each other A Protocol may use another protocol as a step in its execution for example, ground transfer is one step in the execution of the example reliable parcel transfer protocol This form of dependency is called layering Post office handling is layered above parcel ground transfer protocol.

Open protocols and systems A set of protocols is open if protocol details are publicly available changes are managed by an organization whose membership and transactions are open to the public A system that implements open protocols is called an open system International Organization for Standards (ISO) prescribes a standard to connect open systems open system interconnect (OSI) Has greatly influenced thinking on protocol stacks

ISO OSI reference model Reference model formally defines what is meant by a layer, a service etc. Service architecture describes the services provided by each layer and the service access point Protocol architecture set of protocols that implement the service architecture compliant service architectures may still use non- compliant protocol architectures

The seven Layers Presentation Application Session Transport Network Data Link Physical Presentation Application Session Transport Network Data Link Physical Network Data Link Physical End system Intermediate system

The seven Layers - protocol stack Presentation Application Session Transport Network Data Link Physical Presentation Application Session Transport Network Data Link Physical data DH+data+DT bits data AH PH SH TH Network Data Link Physical dataNH Session and presentation layers are not so important, and are often ignored Session and presentation layers are not so important, and are often ignored

Postal network Application: people using the postal system Session and presentation: chief clerk sends some priority mail, and some by regular mail ; translator translates letters going abroad. mail clerk sends a message, retransmits if not acked postal system computes a route and forwards the letters datalink layer: letters carried by planes, trains, automobiles physical layer: the letter itself

Internet protocol stack application: supporting network applications ftp, smtp, http transport: host-host data transfer tcp, udp network: routing of datagrams from source to destination ip, routing protocols link: data transfer between neighboring network elements ppp, ethernet physical: bits “ on the wire ” application transport network link physical

application transport network Link physical application transport network Link physical source destination M M M M H t H t H n H t H n H l M M M M H t H t H n H t H n H l message segment datagram frame Protocol layering and data

Physical layer Moves bits between physically connected end-systems Standard prescribes coding scheme to represent a bit shapes and sizes of connectors bit-level synchronization Internet technology to move bits on a wire, wireless link, satellite channel etc.

Datalink layer Reliable communication over a single link. Introduces the notion of a frame set of bits that belong together Idle markers tell us that a link is not carrying a frame Begin and end markers delimit a frame Internet a variety of datalink layer protocols most common is Ethernet others are FDDI, SONET, HDLC

Datalink layer (contd.) Datalink layer protocols are the first layer of software Very dependent on underlying physical link properties Usually bundle both physical and datalink in hardware. Ethernet (broadcast link) end-system must receive only bits meant for it need datalink-layer address also need to decide who gets to speak next these functions are provided by Medium ACcess sublayer (MAC)

Network layer Carries data from source to destination. Logically concatenates a set of links to form the abstraction of an end-to-end link Allows an end-system to communicate with any other end-system by computing a route between them Hides idiosyncrasies of datalink layer Provides unique network-wide addresses Found both in end-systems and in intermediate systems

Network layer types In datagram networks provides both routing and data forwarding In connection-oriented network separate data plane and control plane data plane only forwards and schedules data (touches every byte) control plane responsible for routing, call- establishment, call-teardown (doesn ’ t touch data bytes)

Internet network layer is provided by Internet Protocol found in all end-systems and intermediate systems provides abstraction of end-to-end link segmentation and reassembly packet-forwarding, routing, scheduling unique IP addresses can be layered over anything, but only best-effort service Network layer (contd.)

At intermediate systems participates in routing protocol to create routing tables responsible for forwarding packets schedules the transmission order of packets chooses which packets to drop Network layer (contd.) At end-systems primarily hides details of datalink layer segments and reassemble detects errors

Transport layer Reliable end-to-end communication. creates the abstraction of an error-controlled, flow-controlled and multiplexed end-to-end link (Network layer provides only a ‘ raw ’ end-to-end service) Some transport layers provide fewer services e.g. simple error detection, no flow control, and no retransmission Internet TCP provides error control, flow control, multiplexing UDP provides only multiplexing

Transport layer (contd.) Error control GOAL: message will reach destination despite packet loss, corruption and duplication ACTIONS: retransmit lost packets; detect, discard, and retransmit corrupted packets; detect and discard duplicated packets Flow control match transmission rate to rate currently sustainable on the path to destination, and at the destination itself Multiplexes multiple applications to the same end-to-end connection adds an application-specific identifier (port number) so that receiving end-system can hand in incoming packet to the correct application

Session layer Not common Provides full-duplex service, expedited data delivery, and session synchronization Internet doesn ’ t have a standard session layer

Duplex if transport layer is simplex, concatenates two transport endpoints together Expedited data delivery allows some messages to skip ahead in end-system queues, by using a separate low-delay transport layer endpoint Synchronization allows users to place marks in data stream and to roll back to a prespecified mark Session layer (cont.)

Presentation layer Usually ad hoc Touches the application data (Unlike other layers which deal with headers) Hides data representation differences between applications characters (ASCII, unicode, EBCDIC.) Can also encrypt data Internet no standard presentation layer only defines network byte order for 2- and 4-byte integers

Application layer The set of applications that use the network Doesn ’ t provide services to any other layer

Discussion Layers break a complex problem into smaller, simpler pieces. Why seven layers? Need a top and a bottom  2 Need to hide physical link; so need datalink  3 Need both end-to-end and hop-by-hop actions; so need at least the network and transport layers  5

Introduction and Layering1 Data Link: Multi Access2 Hubs, Bridges and Routers3 Scheduling and Buffer Management4 Switching Fabrics5 Routing6 Reliable Data Transfer7 End to End Window Based Protocols8 Flow Control9 Multimedia and QoS10 Network Security11 Distributed Algorithms12 Course outline