Introduction Chapter 1 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Network Hardware Network Software Reference.

Slides:



Advertisements
Similar presentations
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Advertisements

Chapter 2 Network Models.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Adapted from Tanenbaum's Slides for Computer Networks, 4e
Communications and Networks
99 CHAPTER COMMUNICATIONS AND NETWORKS. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 9-2 Competencies Discuss connectivity, the wireless.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
Introduction Chapter Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
The OSI Model and the TCP/IP Protocol Suite
Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.
15-1 More Chapter 15 Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of.
COM320 Computer Networks and Operating Systems Kevin Curran.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 24 November 11, 2004.
Introduction Chapter 1 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor Milos STOLIC, B.Sc. Assistant
Networks A network is a collection of computers and devices connected together via communications devices and transmission media Advantages of a network.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Network Architecture Dr. Sanjay P. Ahuja, Ph.D FIS Distinguished Professor of Computer Science School of Computing, UNF.
Presentation on Osi & TCP/IP MODEL
References Computer Networks: Andrew S. Tanenbaum, Forth edition
Definitions Protocol (1) An agreement between the communicating parties on how communication is to proceed. (2) A set of rules that governs how two or.
Communications and Networks Chapter 9. CE06_PP09-2 Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution, and communication systems.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
Introduction Chapter 1 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Uses of Computer Networks Network Hardware.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Introduction – Part II.
Introduction Hamed Jamshak Hamed Jamshak Chapter 1 Hamed Jamshak.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
Lecture 1 Internet CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger and Daniel Zappala Lecture 2 Introduction.
Computer Networks A.S. Tanenbaum 5 th Edition 2011 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 2 Network Models.
Lecture 0: Course Overview. Lecturer Details Dr. Walid Khedr Web: Department of Information Technology.
William Stallings Data and Computer Communications
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
نظام المحاضرات الالكترونينظام المحاضرات الالكتروني.
Introduction Chapter 1. Business Applications of Networks A network with two clients and one server. Client-Server Model.
Introduction Chapter 1. Uses of Computer Networks Business Applications Home Applications Mobile Users Social Issues.
Introduction Chapter 1 Uses of Computer Networks Business Applications Home Applications Mobile Users Social Issues
Introduction Chapter 1 Uses of Computer Networks Business Applications Home Applications Mobile Users Social Issues
Introduction Chapter
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
OSI Model. Open Systems Interconnection (OSI) is a set of internationally recognized, non proprietary standards for networking and for operating system.
Introduction Chapter 1. Uses of Computer Networks Business Applications Home Applications Mobile Users Social Issues.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Computer Networks. Understand the rationale for the existence of networks. Distinguish between the three types of networks: LANs, MANs, and WANs. After.
Digital Planet: Tomorrow’s Technology and You Chapter 8 Networking and Digital Communication Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Communications and Networks Chapter 9 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
CHAPTER 8 Communication and Network Copyright © Cengage Learning. All rights reserved.
Introduction Chapter 1. Uses of Computer Networks Business Applications Home Applications Mobile Users Social Issues.
Chapter 1 Introduction Computer Networks CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011, modified by SJF 1.
Computer Networks Farzad Rojan Chapter 1. Computer Networks – Chapter 1 Introduction Uses of Computer Networks Network Hardware Network Software Reference.
Chapter 2 Network Models.
Computer Network Course objective: To understand Network architecture
Telemedicine.
Chapter 1 Introduction.
Revised: August 2011 and February 2018
Network Protocol Layers
Chapter Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of various network.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 2 Network Models
Introduction Chapter 1 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
Computer Networks CMSC417 Prof. Ashok K . Agrawala
Lecture#2- Computer Networks
EEC4113 Data Communication & Multimedia System Chapter 1: Introduction by Muhazam Mustapha, July 2010.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Presentation transcript:

Introduction Chapter 1 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011

Network Hardware CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Networks can be classified by their scale: ScaleType VicinityPAN (Personal Area Network) » BuildingLAN (Local Area Network) » CityMAN (Metropolitan Area Network) » CountryWAN (Wide Area Network) » PlanetThe Internet (network of all networks)

Personal Area Network CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Connect devices over the range of a person Example of a Bluetooth (wireless) PAN:

Local Area Networks Connect devices in a home or office building Called enterprise network in a company CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Wireless LAN with Wired LAN with switched Ethernet

Metropolitan Area Networks CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Connect devices over a metropolitan area Example MAN based on cable TV:

Connect devices over a country Example WAN connecting three branch offices: Wide Area Networks (1) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011

Wide Area Networks (2) An ISP (Internet Service Provider) network is also a WAN. Customers buy connectivity from the ISP to use it. CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011

Network Software CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Protocol layers » Design issues for the layers » Connection-oriented vs. connectionless service »

Protocol Layers (1) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Protocol layering is the main structuring method used to divide up network functionality. Each protocol instance talks virtually to its peer Each layer communicates only by using the one below Lower layer services are accessed by an interface At bottom, messages are carried by the medium

Protocol Layers (2) Each lower layer adds its own header (with control inform- ation) to the message to transmit and removes it on receive Layers may also split and join messages, etc. CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011

Design Issues for the Layers CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Each layer solves a particular problem but must include mechanisms to address a set of recurring design issues IssueExample mechanisms at different layers Reliability despite failures Codes for error detection/correction (§3.2, 3.3) Routing around failures (§5.2) Network growth and evolution Addressing (§5.6) and naming (§7.1) Protocol layering (§1.3) Allocation of resources like bandwidth Multiple access (§4.2) Congestion control (§5.3, 6.3) Security against various threats Confidentiality of messages (§8.2, 8.6) Authentication of communicating parties (§8.7)

Connection-Oriented vs. Connectionless Service provided by a layer may be kinds of either: Connection-oriented, must be set up for ongoing use (and torn down after use), e.g., phone call Connectionless, messages are handled separately, e.g., postal delivery CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011

Reference Models CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Reference models describe the layers in a network architecture OSI reference model » TCP/IP reference model » Model used for this text » Critique of OSI and TCP/IP »

OSI Reference Model A principled, international standard, seven layer model to connect different systems CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 – Provides functions needed by users – Converts different representations – Manages task dialogs – Provides end-to-end delivery – Sends packets over multiple links – Sends frames of information – Sends bits as signals

TCP/IP Reference Model A four layer model derived from experimentation; omits some OSI layers and uses the IP as the network layer. CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 IP is the “narrow waist” of the Internet Protocols are shown in their respective layers

Model Used in this Book CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 It is based on the TCP/IP model but we call out the physical layer and look beyond Internet protocols.

Critique of OSI & TCP/IP CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 OSI: +Very influential model with clear concepts −Models, protocols and adoption all bogged down by politics and complexity TCP/IP: +Very successful protocols that worked well and thrived −Weak model derived after the fact from protocols

Example Networks CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 The Internet » 3G mobile phone networks » Wireless LANs » RFID and sensor networks »

Internet (1) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Before the Internet was the ARPANET, a decentralized, packet-switched network based on Baran’s ideas. ARPANET topology in Sept Nodes are IMPs, or early routers, linked to hosts 56 kbps links

Internet (2) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 The early Internet used NSFNET ( ) as its backbone; universities connected to get on the Internet NSFNET topology in 1988 T1 links (1.5 Mbps)

Internet (3) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Architecture of the Internet

3G Mobile Phone Networks (1) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, G network is based on spatial cells; each cell provides wireless service to mobiles within it via a base station

3G Mobile Phone Networks (2) Base stations connect to the core network to find other mobiles and send data to the phone network and Internet CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011

3G Mobile Phone Networks (3) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 As mobiles move, base stations hand them off from one cell to the next, and the network tracks their location Handover

Wireless LANs (1) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 In , clients communicate via an AP (Access Point) that is wired to the rest of the network.

Wireless LANs (2) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Signals in the 2.4GHz ISM band vary in strength due to many effects, such as multipath fading due to reflections − requires complex transmission schemes, e.g., OFDM

Wireless LANs (3) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Radio broadcasts interfere with each other, and radio ranges may incompletely overlap −CSMA (Carrier Sense Multiple Access) designs are used

RFID and Sensor Networks (1) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Passive UHF RFID networks everyday objects: −Tags (stickers with not even a battery) are placed on objects −Readers send signals that the tags reflect to communicate

RFID and Sensor Networks (2) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Sensor networks spread small devices over an area: −Devices send sensed data to collector via wireless hops

Network Standardization CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Standards define what is needed for interoperability Some of the many standards bodies: BodyAreaExamples ITUTelecommunicationsG.992, ADSL H.264, MPEG4 IEEECommunications802.3, Ethernet , WiFi IETFInternetRFC 2616, HTTP/1.1 RFC 1034/1035, DNS W3CWebHTML5 standard CSS standard

Metric Units CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 The main prefixes we use: Use powers of 10 for rates, powers of 2 for storage −E.g., 1 Mbps = 1,000,000 bps, 1 KB = 1024 bytes “B” is for bytes, “b” is for bits PrefixExp.prefixexp. K(ilo)10 3 m(illi)10 -3 M(ega)10 6 μ(micro)10 -6 G(iga)10 9 n(ano)10 -9

End Chapter 1 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011