Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter Goals Compare and contrast bus, ring, and star network topologies Describe packet routing across local and wide area networks Describe the CSMA/CD.

Similar presentations


Presentation on theme: "Chapter Goals Compare and contrast bus, ring, and star network topologies Describe packet routing across local and wide area networks Describe the CSMA/CD."— Presentation transcript:

1

2 Chapter Goals Compare and contrast bus, ring, and star network topologies Describe packet routing across local and wide area networks Describe the CSMA/CD media access control protocol Describe network hardware devices, including network interface units, routers, and switches Systems Architecture, Fifth Edition

3 Chapter Goals (continued)
Describe the OSI network model, the TCP/IP protocol suite, and IEEE network standards Systems Architecture, Fifth Edition

4 Systems Architecture, Fifth Edition

5 Network Topology Spatial organization of network devices, physical routing of network cabling, and flow of messages from one network node to another Can be physical or logical Three types – star, bus, ring – differentiated by Length and routing of network cable Type of node connections Data transfer performance Susceptibility of network to failure Systems Architecture, Fifth Edition

6 Point-to-point network topology is impractical for all but very small networks.
Systems Architecture, Fifth Edition

7 Using a store and forward system to connect source and destination nodes.
Systems Architecture, Fifth Edition

8 Network Topologies Star
Uses a central node to which all end nodes are connected Relatively simple wiring Bus Connects each end node to a common transmission line Low susceptibility to failure Ring Connects each end node to two other end nodes Long maximum network length Low susceptibility to noise and distortion Susceptible to failure and difficulty in adding, removing, or moving nodes Systems Architecture, Fifth Edition

9 Systems Architecture, Fifth Edition

10 Systems Architecture, Fifth Edition

11 Systems Architecture, Fifth Edition

12 The strengths of two different topologies can be combined by using one topology for physical layout and another for message routing. Systems Architecture, Fifth Edition

13 Addressing and Routing
How messages sent by end nodes find their way through transmission lines and central nodes to their ultimate destination Local area networks (LANs) Interconnected to form WANs Wide area networks (WANs) Systems Architecture, Fifth Edition

14 Local Area Network Routing
Each central node maintains and uses a routing table to make routing decisions LAN hub or switch usually handles packet routing Logical network topology determines exact procedure for routing a message between two end nodes in the same LAN Systems Architecture, Fifth Edition

15 Example of a WAN including end nodes, LANs, zone networks, the campus backbone network, and central nodes. Systems Architecture, Fifth Edition

16 Systems Architecture, Fifth Edition

17 Wide Area Network Routing
Packet routing uses a store and forward approach Forwarding stations can be implemented using bridges, routers, and switches Systems Architecture, Fifth Edition

18 Media Access Control Uses a protocol that specifies rules for accessing a shared transmission medium Carrier Sense Multiple Access/Collision Detection (CSMA/CD) Commonly used in bus networks to detect and recover from collisions Token passing MAC protocol Used by ring network topologies Systems Architecture, Fifth Edition

19 CSMA/CD Protocol Process Primary advantage: simplicity
Node listens for an idle state, transmits a packet, and listens for a collision If a collision is detected, node retransmits after waiting a random waiting period Primary advantage: simplicity Primary disadvantage: potentially inefficient use of data transfer capacity Systems Architecture, Fifth Edition

20 Token Passing MAC Protocol
Token passes from node to node in: Predetermined order that includes all nodes on network Specified time interval Only the node that “possesses” the token is allowed to transmit messages; all others can only receive and repeat messages No longer used in LANs; rarely in WANs Systems Architecture, Fifth Edition

21 Systems Architecture, Fifth Edition

22 Network Hardware Systems Architecture, Fifth Edition

23 Network Interface Units (NIUs)
Interface between network node and network transmission medium Scan destination address of all packets In bus network: ignores all those not addressed to it In ring network: retransmits all packets not addressed to it Implement media access control functions Systems Architecture, Fifth Edition

24 Hubs Connect nodes to form a LAN Most are Ethernet devices
Combine separate point-to-point connections between nodes and the hub into a single shared transmission medium by repeating all incoming packets to every connection point Low-cost alternative for home and small office networks Systems Architecture, Fifth Edition

25 Bridges Connect two networks or network segments and copy packets between them Look at source addresses and update internal tables of node addresses on each network segment Common uses Construct a virtual LAN from two separate LANs Divide a network into segments in order to minimize congestion Systems Architecture, Fifth Edition

26 Routers Intelligently route and forward packets among two or more networks Forward packets based on information other than destination address Build internal “map” of the network; constantly scan it to monitor traffic patterns and network node changes Systems Architecture, Fifth Edition

27 Switches High-speed devices that create virtual LANs on a per-packet basis Each input connection is treated as a separate LAN Dramatically increase network performance Connection decisions made by hardware are based only on destination address Each virtual LAN has only one sending and one receiving node; eliminates congestion Systems Architecture, Fifth Edition

28 OSI Network Layers Open System Interconnection (OSI) model
ISO conceptual model that divides network architecture into seven layers Each layer uses services of layer below and is unaware of other layer’s implementations Uses: General model of networks Framework for comparing networks Architectural roadmap that enhances interoperability among network architectures and products Systems Architecture, Fifth Edition

29 Systems Architecture, Fifth Edition

30 Application Layer Network service request and response
Contains programs that make and respond to high-level requests for network services End-user network utilities Network services embedded in the OS Network service providers Systems Architecture, Fifth Edition

31 Presentation Layer Converts and formats data
Ensures correct interpretation of transmitted data Encryption and decryption Compression and decompression Converting data between EBCDIC and ASCII Font substitution Primarily used by applications that format data for user display Systems Architecture, Fifth Edition

32 Session Layer Negotiates and implements high-level protocol parameters (timeout, half or full duplex, synchronization, quality of service) Establishes and manages communication sessions Monitors communication to detect and resolve problems that arise once protocol has been established Systems Architecture, Fifth Edition

33 Transport Layer Formats messages into packets suitable for transmission over the network Places messages within a packet data area and adds header/trailer information (network addresses, error detection data, packet sequencing data) Gives packets to network layer for delivery Examines packets for errors; requests retransmission if necessary (when receiving packets) Systems Architecture, Fifth Edition

34 Network Layer Routes packets to their proper destination
Those within central node interact with one another to exchange routing information and update internal routing tables Systems Architecture, Fifth Edition

35 Data Link Layer Transmits packets and bits
Interface between network software and hardware Systems Architecture, Fifth Edition

36 Physical Layer Transmits bit streams
Where communication between devices actually takes place Includes hardware devices that encode and decode bit streams and the transmission lines that transport them Systems Architecture, Fifth Edition

37 TCP/IP The core Internet protocol suite
Delivers most services associated with the Internet File transfer via FTP Remote login via Telnet protocol Electronic mail distribution via SMTP Access to Web pages via HTTP Predates and corresponds poorly to OSI model Systems Architecture, Fifth Edition

38 Internet Protocol Provides connectionless packet transport across LANs and WANs Translates datagrams into format suitable for transport by physical network IP layer can divide datagram into smaller units and transmit them individually Attaches header information to each unit, including its sequence in the datagram Systems Architecture, Fifth Edition

39 IP (continued) Assumes datagram will traverse multiple networks via nodes called gateways Determines transmission routes via related protocols (ICMP, RIP) IP nodes Identified by unique 32-bit address (nnn.nnn.nnn.nnn) Periodically exchange routing information to keep tables current Systems Architecture, Fifth Edition

40 Only the IP layer is implemented within the gateways.
Systems Architecture, Fifth Edition

41 Transmission Control Protocol
Provides connection-oriented packet transport to higher-level Internet service protocols, including HTTP, FTP, and Telnet Provides framework to check for lost messages; explicitly establishes connection with intended recipient before transmitting messages Performs connection management functions (verifying receipt, verifying data integrity, controlling message flow, securing message content) Systems Architecture, Fifth Edition

42 TCP (continued) Sender and recipient TCP layers maintain information about one another (message routes, errors encountered, transmission delays, status of ongoing data transfers) Uses positive acknowledgment protocol to ensure data delivery Establishes connections through a port and an socket Systems Architecture, Fifth Edition

43 Voice over IP (VoIP) Technologies/standards that carry voice messages and data over single packet-switched network Lower cost than traditional public switched telephone network (PSTN) Complex and competing standards Transmission quality problems (packet loss, latency, jitter) Systems Architecture, Fifth Edition

44 H.323 is an umbrella for many component protocols; it also addresses video and data conferencing.
Systems Architecture, Fifth Edition

45 Network Standards IEEE 802 standards
Describe network hardware, transmission media, transmission methods, and protocols Help ensure compatibility among products from competing vendors Developed by committees whose membership is drawn from industry, government, and academia Ethernet standard (802.3) - very successful Systems Architecture, Fifth Edition

46 Systems Architecture, Fifth Edition

47 No provision for packet priorities or guarantees of quality of service.
Systems Architecture, Fifth Edition

48 Systems Architecture, Fifth Edition

49 Summary Network topology Addressing and routing Media access control
Network hardware OSI network layers Network standards Systems Architecture, Fifth Edition


Download ppt "Chapter Goals Compare and contrast bus, ring, and star network topologies Describe packet routing across local and wide area networks Describe the CSMA/CD."

Similar presentations


Ads by Google