CS 101 – Nov. 23 Communication, continued LANs –Bus (ethernet) communication –Token ring communication How the Internet works: TCP/IP.

Slides:



Advertisements
Similar presentations
Data Link Layer B. Konkoth. PDU  Protocol Data Unit  A unit of data which is specified in a protocol of a given layer  Layer 5, 6, 7 – Data  Layer.
Advertisements

INTRODUCTION TO COMPUTER NETWORKS Zeeshan Abbas. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
LAN Maps & Symbols Topologies & Devices. Physical & Logical Topologies Physical Topologies define the actual layout of the wire (media). For example,
POP QUIZ 2 !!! Multiple Choice Questions The organization whose website you visited in your homework, that registers ip addresses in North and South.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
1 NETWORKING TECHNOLOGIES (II) BUS Abdou Illia, Fall 2010 (October 20, 2010)
Bob Baker Communications Bob Baker September 1999.
LAN Risanuri Hidayat. LAN-Local Area Network A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects.
Department of Information Engineering 1 Objectives A basic understanding of the following –What is Internet? –What is client-server computing? –What is.
Vocabulary URL = uniform resource locator: web address protocol –set of rules that networked computers follow in order to share data and coordinate communications.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
Internet Technologies Networking / Internet Protocols (TCP/IP) Server/Client Software Communication via Ports Web Page Technology Recipe of Web Page Development.
Core 3: Communication Systems. On any network there are two types of computers present – servers and clients. By definition Client-Server architecture.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
COMPUTER NETWORKS.
Network Topologies An introduction to Network Topologies and the Link Layer.
Networks. Bus Network Terminator‘Workstation’ ‘Client’ ‘Terminal’ ‘Node’ Computer Terminator Backbone Server (optional)
Module 4 - Networking MIS5122: Enterprise Architecture for the IT Auditor.
Laudon & Laudon: Canadian Edition
Chapter 20 Networks. 4 Questions that need to be answered concerning networks? –How will each computer be identified? –What kind of wire should you run.
Slide 1 What is a Computer Network? A computer network is a linked set of computer systems capable of sharing computer power and resources such as printers,
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
Presentation on Osi & TCP/IP MODEL
How the Internet Works: What happens when information is sent from your computer?
OSI Model International Organization for Standardization (1984): The model modulizes a sequence of tasks for inter-exchanged information between computers.
1 A L L A H. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Dale & Lewis Chapter 15 Networks. What is a computer network? A collection of computing devices that are connected in various ways in order to communicate.
Introduction network Protocol
PPT Slides by Dr. Craig Tyran & Kraig Pencil Computer Networking – Part 1 MIS 320 Kraig Pencil Summer 2014.
Internet Ethernet Token Ring Video High Speed Router Host A: Client browser: REQUEST:http//mango.ee.nogradesu.edu/c461.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Protocols. Protocol Set of rules that govern: Connection Communication data transfer Protocols regulate: access method allowed physical topologies types.
Chapter 6-2 the TCP/IP Layers. The four layers of the TCP/IP model are listed in Table 6-2. The layers are The four layers of the TCP/IP model are listed.
Day10 LAN. Why? Allow more than one machine to share –Resources –Internet connectivity –Information.
Network Protocols n ISO OSI 7-layer model n TCP/IP suite l TCP/UDP l IP l Ethernet/Token Ring l ICMP.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
CS 145A Implementation Issues Netlab.caltech.edu/course.
NETWORK HARDWARE CABLES NETWORK INTERFACE CARD (NIC)
Presented by Rebecca Meinhold But How Does the Internet Work?
Lecture (Mar 23, 2000) H/W Assignment 3 posted on Web –Due Tuesday March 28, 2000 Review of Data packets LANS WANS.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 3: TCP/IP Architecture.
Lecture Topics: 11/27 Networks Layered Model Ethernet IP.
Networks. Ethernet  Invented by Dr. Robert Metcalfe in 1970 at Xerox Palo Alto Research Center  Allows group of computers to communicate in a Local.
1 Bus topology network. 2 Data is sent to all computers, but only the destination computer accepts 02608c
Networks & Communications Diambil dari : Module Application Training Institut Teknologi Bandung
Computer Networks Syed Md. Ashraful Karim Lecturer, CSE BU.
Networks BSM025 Computers. Local area network (LAN( Wide-area network (WAN( Networks Topology.
CS 101 – Nov. 20 Communication, continued (Ch. 15) Cryptography –examples Error detection Local Area Networks –Different ways to hook up machines.
Lecture 6 Networked Systems Network Operating Systems Introduction to Sockets HTTP – FTP – TCP - UDP Client-Server Model.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
Networks. Local area network (LAN( Wide-area network (WAN( Networks Topology.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
CS 101 – Nov. 30 Communication, continued TCP/IP review Dijkstra’s shortest path algorithm Download speeds.
THE NETWORKS Theo Chakkapark. Open System Interconnection  The tower of power!  The source of this power comes from the model’s flexibility.
Created By Anoosh Samuel Abdul Razaq Qadir Hussain Asim Maaz Waheed Tayab
CIS 173 Networking Week #9 OBJECTIVES Chapter #6 Network Communications Protocols.
Class Notes CS403- Internet Technology Prepared by: Gulrez Alam Khan.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 03 Standards and Technologies.
1 NETWORKING TECHNOLOGIES (II) BUS Abdou Illia, Fall 2008 (November 4, 2008)
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI data link layer CCNA Exploration Semester 1 Chapter 7.
Distributed Systems.
Protocols.
Shuffle Exchange Point-to-point, Bus, Ring, Star, Mesh
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
NETWORKING TECHNOLOGIES (II)
Module 2: Understanding Local Area Networks
Ethernet (Medium Access Control Protocol)
Presentation transcript:

CS 101 – Nov. 23 Communication, continued LANs –Bus (ethernet) communication –Token ring communication How the Internet works: TCP/IP

Bus topology All machines share the same channel All continuously listening “Ethernet” protocol (dinner table) –don’t talk when someone else is talking –collisions Amplify signal with repeaters

Token ring Fast messaging over larger distances Logically arranged in loop Messaging: Token passed around the ring. –Am I busy? –From –To –message

Token action When you receive token: Is the message for me? –If so, read and change to ack. –If not, just pass token. Do I need token? –Wait until it comes back as not “busy”

Example 4 machines: A, B, C, D. A has message for C. –When A gets token, writes message for C. –B passes token. –C receives msg, sends ack message to A. –D passes token. –A receives ack, clears token. …

Example #2 We have 4 machines A, B, C, D. What happens when… –Token starts at D. –A has a message for C. –C has a message for A. –B has a message for D. …………………………………………

TCP Transfer Control Protocol Break up message into packets Sequence number on each packet Receiver detects lost packets How big should a packet be?

IP Internet Protocol Every machine has IP address – Packets are individually addressed Routers Not all packets go the same way! –Just like 2 people driving to Seattle might not take the exact path.

Behind the scenes “ping” program –Send empty packets, check for ack –75 ms to San Diego… 840 ms to Pretoria “traceroute” program –Lists all routers between here and another machine

Snooping The “dark side” of TCP/IP Web site can track you by IP address –Localized marketing –Privacy concerns Anonymous IP servers –Ex. “Anonymouse”