Lecture 9 Networked Systems Network Operating Systems Introduction to Sockets TCP Client-Server Applications.

Slides:



Advertisements
Similar presentations
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Advertisements

Network Certification Preparation. Module - 1 Communication methods OSI reference model and layered communication TCP/IP model TCP and UDP IP addressing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Introduction To Networking
Review on Networking Technologies Linda Wu (CMPT )
Core 3: Communication Systems. On any network there are two types of computers present – servers and clients. By definition Client-Server architecture.
COMPUTER NETWORKS.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Gursharan Singh Tatla Transport Layer 16-May
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
1.  A protocol is a set of rules that governs the communications between computers on a network.  Functions of protocols:  Addressing  Data Packet.
Process-to-Process Delivery:
1 Transport Layer Computer Networks. 2 Where are we?
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Midterm Review - Network Layers. Computer 1Computer 2 2.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
Chapter 17 Networking Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings.
TCP/IP Reference Model For more notes and topics visit: eITnotes.com.
SIMS-201 Computer Networks. 2 Introduction to Computer Networks Chapter 19 The Local Area Network  Overview.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Review: – computer networks – topology: pair-wise connection, point-to-point networks and broadcast networks – switching techniques packet switching and.
Presentation on Osi & TCP/IP MODEL
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
Huda AL_Omairl - Network 71 Protocols and Network Software.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Networking Models  The OSI Model  The TCP/IP Model.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
UNDERSTANDING THE HOST-TO-HOST COMMUNICATIONS MODEL - OSI LAYER & TCP/IP MODEL 1.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
CSE 6590 Department of Computer Science & Engineering York University 111/9/ :26 AM.
Data Communications and Networks
William Stallings Data and Computer Communications
Interfaces and Services Each layer provides a service to the layer above it. A service is a set of primitive operations. Under UNIX, primitives are implemented.
Chapter2 Networking Fundamentals
Communication Networks - Overview CSE 3213 – Fall November 2015.
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
1 Chapter Overview Network Communications The OSI Reference Model.
1 Chapter Overview Network Communications The OSI Reference Model.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 3: TCP/IP Architecture.
1 OSI and TCP/IP Models. 2 TCP/IP Encapsulation (Packet) (Frame)
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
 2004 Deitel & Associates, Inc. All rights reserved. Chapter 16 – Networking Outline 16.1Introduction 16.2Network Topology 16.3Network Types 16.4TCP/IP.
Lecture 6 Networked Systems Network Operating Systems Introduction to Sockets HTTP – FTP – TCP - UDP Client-Server Model.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
Module 16: Distributed System Structures Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Apr 4, 2005 Distributed.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
CIS 173 Networking Week #9 OBJECTIVES Chapter #6 Network Communications Protocols.
SIMS-201 Computer Networks.
Chapter 16 – Networking Outline 16.1 Introduction
Lec 2: Protocols.
I. Basic Network Concepts
Process-to-Process Delivery:
TCP/IP Protocol Suite: Review
TCP/IP Protocol Suite: Review
SIMS-201 Computer Networks.
Process-to-Process Delivery: UDP, TCP
Presentation transcript:

Lecture 9 Networked Systems Network Operating Systems Introduction to Sockets TCP Client-Server Applications

An operating system that includes special functions for connecting computers and devices into a local-area network (LAN). Some operating systems, such as UNIX and the Mac OS, have networking functions built in. The term network operating system, however, is generally reserved for software that enhances a basic operating system by adding networking features. Novell Netware, Artisoft's LANtastic, Microsoft Windows Server, and Windows NT are examples of an NOS. Network Operating System (NOS)

Socket to Me There are several options for the types of sockets we can implement: Client Side Server Side Blocking (synchronous) Non-Blocking (asynchronous)

Client-Side Blocking Socket A socket is like a handle to a file, similar to a StreamReader/StreamWriter in System.IO. You can use sockets programming to have two applications communicate with each other. The applications are typically on the different computers but they can be on same computer. For the two applications to talk to each either on the same or different computers using sockets, one application is generally a server that keeps listening to the incoming requests and the other application acts as a client and makes the connection to the server application.

Network Topology Network topology (cont) –Tree networks Hierarchical networks that consist of a root node and several children that can have children of their own –Mesh networks At least two nodes have more than one path connecting them Fully-connected mesh network –Directly connects every node to every other node –Ad hoc networks Spontaneous –Any combination of wireless and wired devices may be connected to it at any time The network topology is not fixed –Difficult to have a network governed by central node Deitel & Associates, Inc.

Network Types Local area network (LAN) –Limited geographic dispersion and designed to optimize data transfer rates between its hosts –Interconnect resources using high-speed communication paths with optimized network protocols for local area environments –Error rates lower than those of larger networks –Greater management flexibility –Independence from constraints of public networking system Wide area networks (WANs) –Broader than LAN, connecting two or more LANs –Example: the Internet –Generally employ mesh topology –Operate at slower speeds than LANs and have higher error rates Deitel & Associates, Inc.

TCP/IP Protocol Stack TCP/IP protocol stack –Composed of four logical levels called layers Application layer –Highest level –Provides protocols for applications to communicate Transport layer –End-to-end communication –Relies on network layer to determine proper path from one end of communication to the other Network layer –Moving data between computers Link layer –Provides an interface between the network layer and the underlying physical medium of the connection Deitel & Associates, Inc.

Application Layer Application layer protocols –Specify rules that govern remote interprocess communication –Determine how processes should interact Many of the protocols interact with resources on remote hosts –Resources are specified by a Uniform Resource Identifier (URI) Deitel & Associates, Inc.

Hypertext Transfer Protocol (HTTP) The Hypertext Transfer Protocol (HTTP) –An application layer protocol that allows the transfer of a variety of data formats –HTTP defines a request for a resource and a response –Remote host processes the request and replies with a response Deitel & Associates, Inc.

File Transfer Protocol (FTP) FTP –Application layer protocol that allows file-sharing between remote hosts –Specifies connections between two pairs of ports One pair sends control information that governs the session The other sends actual data –After a connection is established, the client specifies actions for the FTP server to perform by issuing various requests to server –Server attempts to satisfy each request, then issues a response specifying the result Deitel & Associates, Inc.

Transport Layer Transport layer is responsible for end-to-end communication of messages –Connection-oriented approach Hosts send each other control information through handshaking to set up a logical end-to-end connection Imposes reliability on unreliable networks Guarantees that data sent from sender will arrive at intended receiver undamaged and in correct sequence –Connectionless approach Two hosts do not handshake before transmission No guarantee that sent messages will be received in their original order, or at all Deitel & Associates, Inc.

Transmission Control Protocol (TCP) TCP is a connection-oriented transmission protocol –Guarantees that segments sent from a sender will arrive at the intended receiver undamaged and in correct sequence –Handles error control, congestion control, and retransmission –Allow protocols like HTTP and FTP to send information into network as simply and reliably as writing to a file on the local computer Deitel & Associates, Inc.

User Datagram Protocol (UDP) Connectionless User Datagram Protocol (UDP) –Provides minimum overhead necessary for the transport layer –No guarantee that UDP datagrams will reach their destination in their original order, or at all Deitel & Associates, Inc.

Network Layer Network layer –Receives segments from transport layer and is responsible for sending these packets to the next stop toward destination through process known as routing Routing is a two-step procedure –Determine the best route between two points –Send packets along this route Routers determine the next host for a given datagram based on information, such as network topologies and link quality –Link quality includes strength of signal, error rate and interference »Interference is broadcast throughout networks using various router protocols, such as Routing Information Protocol (RIP) Deitel & Associates, Inc.

Internet Protocol (IP) Internet Protocol version 4 (IPv4) is the dominant protocol for directing information over a network –Destinations on the Internet are specified by IP address IP addresses are 32-bit numbers in IPv4 One of more names can be mapped to an IP address through the Domain Name System (DNS) Deitel & Associates, Inc.

Internet Protocol version 6 (IPv6) In the near future, there will be more addressable nodes on the Internet than available addresses using IPv4 –To combat this problem, Internet Engineering Task Force (IETF) introduced Internet Protocol version 6 (IPv6) IPv6 specifies three types of addresses –Unicast »Unicast address describes a particular host on the Internet –Anycast »Anycast addresses are designed to be sent to the nearest host in a group of hosts –Multicast »Multicast addresses are designed to send packets to all hosts in a group Deitel & Associates, Inc.

Link Layer The link layer –Interfaces the software-oriented layer with the physical medium over which frames are sent –Is responsible for detecting and, if possible, correcting transmission errors Some systems employ error-correcting codes to correct corrupted frames Deitel & Associates, Inc.

Ethernet Ethernet uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol –802.3-style CSMA/CD A transceiver tests a shared medium to determine if it is available before transmitting data Due to delays in medium, it is possible that multiple transceivers may decide that the medium is clear and begin transmitting simultaneously If transceivers detect a collision caused by simultaneous transmissions, they continue to transmit bytes for a specific period of time to ensure that all transceivers become aware of the collision Each transceiver, after learning of a collision, waits for a random interval before attempting to transmit again Deitel & Associates, Inc.

Token Ring Token Rings –Operate on ring networks –Employs tokens to gain access to the transmission medium A token controls access to transmission medium is an empty frame that is circulated between machines over a network having logical ring topology Deitel & Associates, Inc.

Token Ring Token –When machine owns the token, it generates data, places it in the frame and sends the frame to its neighbor –Each machine forwards the token until it reaches its destination At the destination, the machine –Copies the content of the message –Marks the frame as having been delivered –Passes frame to its neighbor When the original sender receives the frame, it –Removes the message from the frame –Passes the token to its neighbor Deitel & Associates, Inc.

Fiber Distributed Data Interface (FDDI) Operates over fiber-optic cable –Support more transfers at greater speeds over larger distance Built on two Token Rings –The second usually being reserved for backup Deitel & Associates, Inc.

IEEE (Wireless) employs a method similar to Ethernet: –Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) –Require each sender broadcast a Request to Send (RTS) to entire network –Upon receiving an RTS Receiver broadcasts a Clear to Send (CTS) message to the entire network if the medium is available Deitel & Associates, Inc.

Client/Server Model In a two-tier system –User interface resides on client –Data resides on server –Application logic lies on one or both of these components Three-tier system –Offers a clearer separation of application logic from user interface and data Ideally, logic resides in its own layer –Possibly on a separate machine –Independent of client and data –Increased flexibility and extensibility Trade-off in multitier system –Increased network latency and more areas where the network could fail Deitel & Associates, Inc.

Summary Network Operating Systems (NOS) Network Sockets Blocking vs non-Blocking Sockets Network Topology Network Types TCP/IP Protocol Stack (1) Application (2) Transport (3) Network (4) Link Hypertext Transfer Protocol (HTTP) File Transfer Protocol (FTP) Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Ethernet Token Ring Fiber Distributed Data Interface (FDDI) IEE (Wireless) Client/Server Model