COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.

Slides:



Advertisements
Similar presentations
OSI Model OSI MODEL.
Advertisements

OSI MODEL Maninder Kaur
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
1 William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
Lecture 2 Protocol Layers CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
1-1 Introduction to Computer Networks and Data Communications.
Protocols and the TCP/IP Suite
EE 122: Layering and the Internet Architecture Kevin Lai September 4, 2002.
OSI Model.
Computer Network Architecture and Programming
EE 4272Spring, 2003 Protocols & Architecture A Protocol Architecture is the layered structure of hardware & software that supports the exchange of data.
Data Communications Architecture Models. What is a Protocol? For two entities to communicate successfully, they must “speak the same language”. What is.
1 Link Layer & Network Layer Some slides are from lectures by Nick Mckeown, Ion Stoica, Frans Kaashoek, Hari Balakrishnan, and Sam Madden Prof. Dina Katabi.
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
Network Technology CSE Network Technology CSE3020 Week 1.
Gursharan Singh Tatla Transport Layer 16-May
1 Review of Important Networking Concepts Introductory material. This slide uses the example from the previous module to review important networking concepts:
NETWORKING CONCEPTS. OSI MODEL Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Process-to-Process Delivery:
Lecture 1 The OSI Model Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Chapter 2 Network Models
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Protocol Layering Chapter 10. Looked at: Architectural foundations of internetworking Architectural foundations of internetworking Forwarding of datagrams.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Layer Architecture Layer architecture simplifies the network design. It is easy to debug network applications in a layered architecture network. The network.
The OSI Model An ISO (International standard Organization) that covers all aspects of network communications is the Open System Interconnection (OSI) model.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
Internet Model. Interfaces Between Layers The passing of the data and network information down through the layers of the sending device and back up.
The OSI Model.
OSI Model. Topics What is the OSI Model? What is a Protocol? Why 7 Layers? The 7 Layers – Application – Presentation – Session – Transport – Network –
Spring 2006Computer Networks1 Chapter 2 Network Models.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Spring 2006Computer Networks1 Chapter 2 Network Models.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
William Stallings Data and Computer Communications
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
Unit III Bandwidth Utilization: Multiplexing and Spectrum Spreading In practical life the bandwidth available of links is limited. The proper utilization.
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
1 Protocol Layering Myungchul Kim Tel:
Protocol Layering Chapter 11.
COMPUTER NETWORK AND DESIGN CSCI 3385K. Host-to-Host Communications Model Older model Proprietary Application and combinations software controlled by.
Data Communication Network Models
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Computer Engineering and Networks, College of Engineering, Majmaah University Protocols OSI reference MODEL TCp /ip model Mohammed Saleem Bhat
Computer Networking A Top-Down Approach Featuring the Internet Introduction Jaypee Institute of Information Technology.
Roadmap  Introduction to Basics  Computer Network – Components | Classification  Internet  Clients and Servers  Network Models  Protocol Layers.
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
Click to edit Master subtitle style
Chap. 2 Network Models.
OSI Protocol Stack Given the post man exemple.
Lecturer, Department of Computer Application
DEPARTMENT OF COMPUTER SCIENCE
Network Architecture Introductory material
Protocols and the TCP/IP Suite
Data and Computer Communications by William Stallings Eighth Edition
Review of Important Networking Concepts
Chapter 3: Open Systems Interconnection (OSI) Model
Lecture 6: TCP/IP Networking 1nd semester By: Adal ALashban.
OSI Model OSI MODEL.
Protocols and the TCP/IP Suite
Computer Networking A Top-Down Approach Featuring the Internet
Presentation transcript:

COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM

Lecture 10 Reading Assignment: Chapter 7 from the online textbook A progress report for the project is due on every Monday. Last time:  Network properties Today:  Layering  Link layer  Network layer Next time  Routing

3

4 Recovery of lost packets

5 Duplicate requests

6 Delays and recovery lead to duplicate response

7 Layering Simplify the design Example- RPC

8 Client-server communication based on RPC

9

10

Multiple protocols may be supported at each layer 11

12 Multiplexing and Demultiplexing

Network layers for store and forward networks Every module has three interfaces:  To the layers above  To the layers below  To the peer layer on another system Each layer hides the operation of the layer below from the layer above and provides its own interpretation of the important features of the layers below. A minimum of three layers are necessary:  Link layer  move data from one point to another. Includes  Network layer  forward data through intermediate node towards the destination  End-to-end-layer  provides all the functions required by the application including Encapsulation: each layer treats information received from the layers above as raw data and adds control information (headers and trailers) understood only by its peer. 13

14 Link layer

15 Network layer

End-to-end layer 16

17 Layering in different network architectures OSI –has 7 layers  The upper four layers are: Application Presentation  translate data formats and emulate the semnatics of RPC Transport  deal with lost, duplicate, out of order, segments Session  deals with connectivity Internet is based on a model including  Application  Transport – transports segments  Network – transports packets  Data Link – transports frames Applications are very diverse and it makes no sense for a lower layer to implement functions required by higher layers. The end-to-end argument  application knows best

Example of an end-to end argument Should we have a checksum implemented at the link layer or should leave it for the application protocol e.g., a file transfer protocol? If we implement it at the link layer   Advantage: detect earlier an error  Disadvantage: the data may still be affected by errors when buffered at the upper layers. 18

Application, Transport, Network, and Data Link Layer Protocols

20 Hourglass communication model

21 Network composition Network composition:  Mapped composition  A network layer is built directly on another network layer by mapping directly higer-layer network addresses to lower-layer network addresses. Example: Internetworking  interconnect several networks together, e.g., the Internet  Recursive composition  a network layer rests on a link layer that it is itself a complete network. Examples: Overlay networks. E.g., Gnutella

22 Network composition. The overlay network Gnutella uses for its link layer an end-to-end transport protocol of the Internet. In turn, the Internet uses for one of its links an end-to-end transport protocol of a dial-up phone system

23 More about the link layer Function: push bits from one place to another In this architecture the link layer combines:  MAC (medium access control layer)  The physical layer Analog worlds Capacity of a communication channel Capacity of a noisy communication channel C= B x log (1+ signal/noise) B is the bandwidth in Hz signal/noise – ratio of signal power to noise power Signals attenuation Signals are distorted over long distances

24 Serial transmission

25 How to push bits from A to B which do not share the same clock? First raise the READY line

26 Signal attenuation and shape distortion

Error detection and error correction Encode data with an error detection code. Use error correction if necessary. 27

28 Framing A pattern of bits serve as a frame delimiter – e.g., seven 1’s Bit stuffing:  The sender: add a 0 whenever it encounters a pattern of six 1’s in data  The receiver: remove a 0 following a pattern of six 1’s in data Add a frame header Add a frame trailer

29 Sender bit stuffing procedure

30 Receiver bit stuffing procedure

31 A network protocol may use multiple data link protocols

32 Multiple transport and data link protocols

33 Sending a frame

34 Receiving a frame

Link properties We distinguish several types of links:  Point-to-point  Broadcast links Each link imposes a maximum transmission unit (MTU)  the largest frame size which affects  Timing, un upper bound on link commitment time  Error, the longer the frame the larger the probability of error for a given error rate on the link  Buffer space at each end 35

The network layer A network can be viewed as consisting of  Network core – carries out segments from one communicating entity to another  Network periphery – hosting the communicating entities at attachment points Addressing – each communicating entity must have a unique address. 36

37

38 Internet Core and Edge

39 Router

40 Router supporting QoS (Quality of Service)

Network model The network layer transports packets The network core consists of routers which forward packets using routing tables The input for network layer on a host at the periphery of the network is a segment in a segment buffer at the transport layer. The output is a link buffer 41

42

43

44

All hosts must have logical addresses All devices have a physical address of the interface Must obtain a logical address 45

Dynamic IP address assignment -DHCP