Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Workings of the Internet CECS 5030 with Cathie Norris, Jennifer Smolka & Gerald Knezek CECS 5030 with Cathie Norris, Jennifer Smolka & Gerald Knezek.

Similar presentations


Presentation on theme: "The Workings of the Internet CECS 5030 with Cathie Norris, Jennifer Smolka & Gerald Knezek CECS 5030 with Cathie Norris, Jennifer Smolka & Gerald Knezek."— Presentation transcript:

1 The Workings of the Internet CECS 5030 with Cathie Norris, Jennifer Smolka & Gerald Knezek CECS 5030 with Cathie Norris, Jennifer Smolka & Gerald Knezek

2 Overview  Layered Organization  Topologies  Network Transports  Access Methods  Routing  Layered Organization  Topologies  Network Transports  Access Methods  Routing

3 ISO/OSI Model  Developed by International Organization for Standardization in 1974  Consists of seven layers  Each with unique function  Each hands off functions to adjacent layer  Modules (layers) may be replaced with another of equal functionality (Xerox vs. Novell, for example)  Developed by International Organization for Standardization in 1974  Consists of seven layers  Each with unique function  Each hands off functions to adjacent layer  Modules (layers) may be replaced with another of equal functionality (Xerox vs. Novell, for example)

4 OSI Model Layers Physical Data Link Network Transport Session Presentation Application Transmission of binary signal Transfer of units of information, framing, and error checking Delivery of packets of information, which includes routing Provision for end-to-end reliable and unreliable delivery Establishment and maintenance of sessions Data formatting and encryption Network applications such as file transfer and terminal emulation OSI LayerFunction Provided

5 Network Topologies  Architectural “drawings” that show the overall physical configuration for a given communications system  Determine access methods and rules used to design and implement a communication system  Represent the drawing of your network cable plant  Three main types: star, ring, and bus  Architectural “drawings” that show the overall physical configuration for a given communications system  Determine access methods and rules used to design and implement a communication system  Represent the drawing of your network cable plant  Three main types: star, ring, and bus

6 Network Topologies  Linear Bus - Ethernet/IEEE 802.3 10Base2 and 10Base5  Star Wired Bus - Ethernet/IEEE 802.3i 10BaseT  Star Wired Ring - Token Ring/IEEE 802.5  Dual Counter Rotating Ring - FDDI/ANSI X3T9.5  Wireless - Product Specific  Linear Bus - Ethernet/IEEE 802.3 10Base2 and 10Base5  Star Wired Bus - Ethernet/IEEE 802.3i 10BaseT  Star Wired Ring - Token Ring/IEEE 802.5  Dual Counter Rotating Ring - FDDI/ANSI X3T9.5  Wireless - Product Specific

7 Star Topology  First used with the telephone switches  Centralized hub with all stations connected  No single point of failure effects the whole network, except the hub  Oldest and most popular topology  Better network management  First used with the telephone switches  Centralized hub with all stations connected  No single point of failure effects the whole network, except the hub  Oldest and most popular topology  Better network management Central Hub Node

8 Ring Topology  All stations (repeaters) are enclosed in a loop  Each receives the signal and repeats it on the other side to its “downstream” neighbor  Data is transmitted in one direction only  Single point of failure when one station quits repeating  Management processes invoked that dynamically remove a station allowing the ring to return to an operational state  All stations (repeaters) are enclosed in a loop  Each receives the signal and repeats it on the other side to its “downstream” neighbor  Data is transmitted in one direction only  Single point of failure when one station quits repeating  Management processes invoked that dynamically remove a station allowing the ring to return to an operational state

9 Ring Topology Node Data Direction ReceiverTransmitter Repeater

10 Bus Topology  Also known as linear bus  Uses a single length of cable with all stations attached to it  The network is terminated at its endpoints (not a closed loop)  A break on the single cable will bring down all attachments on the network  The bus topology is most commonly used for Ethernet networks  Also known as linear bus  Uses a single length of cable with all stations attached to it  The network is terminated at its endpoints (not a closed loop)  A break on the single cable will bring down all attachments on the network  The bus topology is most commonly used for Ethernet networks

11 Bus Topology Node

12 Star-Wired Bus Topology  Each node is attached to hub  When one node fails, it doesn’t affect the other nodes  The hub is a single point of failure for all nodes  Hub failure causes all nodes to lose connectivity  Each node is attached to hub  When one node fails, it doesn’t affect the other nodes  The hub is a single point of failure for all nodes  Hub failure causes all nodes to lose connectivity Node Concentrator Hub

13 Physical Media  Physical media provide the connections between network devices that make networking possible  There are four main types of physical media in widespread use today:  Coaxial Cable  Twisted Pair  Fiber Optic Cable  Wireless Media  Physical media provide the connections between network devices that make networking possible  There are four main types of physical media in widespread use today:  Coaxial Cable  Twisted Pair  Fiber Optic Cable  Wireless Media

14 Thick Coaxial Cable  Used in the first Ethernet networks  Type RG-11 / 10Base5  Usually orange/black  Thickness of a small garden hose  Very expensive and heavy cable  Two strands along the axis  Conductor down the center  Insulator surrounds conductor  Shielded mesh serves as outside  Used in the first Ethernet networks  Type RG-11 / 10Base5  Usually orange/black  Thickness of a small garden hose  Very expensive and heavy cable  Two strands along the axis  Conductor down the center  Insulator surrounds conductor  Shielded mesh serves as outside

15 Thin Coaxial Cable  Alternative to Thick Ethernet Cable  Type RG-58 / 10Base2 / “Cheapnet”  Usually black  Thickness of a pencil  More flexible than thick Ethernet  Reduced the cost of the cabling  Flexible  Alternative to Thick Ethernet Cable  Type RG-58 / 10Base2 / “Cheapnet”  Usually black  Thickness of a pencil  More flexible than thick Ethernet  Reduced the cost of the cabling  Flexible

16 Twisted Pair Cable  Phone Systems  Twisted Pair Cable consists of two copper wires, usually twisted around each other to cancel out any noise in the circuit  Two main type of Twisted Pair Cabling  Shielded Twisted Pair (STP)  Unshielded Twisted Pair (UTP)  Phone Systems  Twisted Pair Cable consists of two copper wires, usually twisted around each other to cancel out any noise in the circuit  Two main type of Twisted Pair Cabling  Shielded Twisted Pair (STP)  Unshielded Twisted Pair (UTP)

17 Shielded Twisted Pair (STP)  Shielded twisted pair is the original media used for token ring networks  STP can be used for high-speed networks, such as FDDI or ATM, where shielding is important  Shielded twisted pair is the original media used for token ring networks  STP can be used for high-speed networks, such as FDDI or ATM, where shielding is important

18 Unshielded Twisted Pair (UTP)  Most commonly used twisted pair cable  Uses common telephone wire  UTP was standardized by the IEEE 802.3 committee in October of 1990  UTP for LANs is now classified as:  Category 3 - used for LANs up to 10 Mbps  Category 4 - used for LANs up to 16 Mbps  Category 5 - used for LANs up to 100 Mbps  Most commonly used twisted pair cable  Uses common telephone wire  UTP was standardized by the IEEE 802.3 committee in October of 1990  UTP for LANs is now classified as:  Category 3 - used for LANs up to 10 Mbps  Category 4 - used for LANs up to 16 Mbps  Category 5 - used for LANs up to 100 Mbps

19 Fiber Optic Cable  Uses light signals transmitted over a very thin filament, usually made of glass  Advantage over other types of media  security against eavesdropping  immunity to interference  maximum length of a single segment  Most expensive of all media  Uses light signals transmitted over a very thin filament, usually made of glass  Advantage over other types of media  security against eavesdropping  immunity to interference  maximum length of a single segment  Most expensive of all media

20 Wireless Media  Connect your computer to your cell phone?  Problems with stability of connection  Have wireless for a long time  Commercial Satellite  Geostationary Orbit  Microwave Wavelength  Expensive  Connect your computer to your cell phone?  Problems with stability of connection  Have wireless for a long time  Commercial Satellite  Geostationary Orbit  Microwave Wavelength  Expensive

21 Wireless Media  A number of wireless media are used in internetworking, e.g.:  Microwave  Commercial Radio wave  Infrared signaling (Palm Synching)  A number of wireless media are used in internetworking, e.g.:  Microwave  Commercial Radio wave  Infrared signaling (Palm Synching)

22 Concentrators/Hubs  Hubs allow multiple users to be connected to a single network as a shared device  The more users on a hub the slower the response time  Hubs allow multiple users to be connected to a single network as a shared device  The more users on a hub the slower the response time

23 Network Transports  Ethernet / Fast Ethernet / IEEE 802.3  Token Ring / IEEE 802.5  FDDI / FDDI/ANSI X3T9.5  Wireless/IEEE 802.11  Ethernet / Fast Ethernet / IEEE 802.3  Token Ring / IEEE 802.5  FDDI / FDDI/ANSI X3T9.5  Wireless/IEEE 802.11

24 Ethernet Cable Names

25 How Ethernet Works  Sent the message and listens for a response  An access method based on the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) algorithm  Cooperative effort between Digital, Intel, and Xerox produced Ethernet version 1.0 in 1980  Sent the message and listens for a response  An access method based on the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) algorithm  Cooperative effort between Digital, Intel, and Xerox produced Ethernet version 1.0 in 1980

26 How Ethernet Works  Ethernet was adopted with modifications by the standards committees IEEE 802.3 and ANSI 8802/3  Most widely used network system today  Ethernet was adopted with modifications by the standards committees IEEE 802.3 and ANSI 8802/3  Most widely used network system today

27 Normal Ethernet Operation Data Address mismatch packet discarded Address mismatch packet discarded Address match packet processed Send data to node D Transmitted packet seen by all stations on the LAN (broadcast medium) A A C C B B D D

28 Final Ethernet Issues  Ethernet is an access method that strictly adheres to the CSMA/CD algorithm  Ethernet is a multiprotocol solution  Ethernet is usually hardware (firmware), not software  Ethernet is an access method that strictly adheres to the CSMA/CD algorithm  Ethernet is a multiprotocol solution  Ethernet is usually hardware (firmware), not software

29 How Token Ring Works  Token Ring controls which PC can send messages by passing a token from station to station around the ring  When a PC wants to transmit it will replace the token with a “frame” (message)  The frame is passed from PC to PC until it reaches its destination  Token Ring controls which PC can send messages by passing a token from station to station around the ring  When a PC wants to transmit it will replace the token with a “frame” (message)  The frame is passed from PC to PC until it reaches its destination

30 How Token Ring Works  The destination PC makes a copy of the “frame” (message) and marks the frame to indicate that it got the message  The frame circulates around the network until it gets back to the sender  The sender, seeing that the message has been received, replaces it with a new token  The destination PC makes a copy of the “frame” (message) and marks the frame to indicate that it got the message  The frame circulates around the network until it gets back to the sender  The sender, seeing that the message has been received, replaces it with a new token

31 Wide Area Network (WAN) Topologies  Dedicated Circuits  56Kb  T-1  DS-3  Frame-Relay  56Kb to T-1 speeds  Integrated Services Digital Network (ISDN)  Dedicated Circuits  56Kb  T-1  DS-3  Frame-Relay  56Kb to T-1 speeds  Integrated Services Digital Network (ISDN)

32 Inter-networking  Networks have their restrictions  Thick coaxial cable maximum length is 500 meters  LANs are broadcast-oriented  Proper network design is impossible using repeaters  Networks have their restrictions  Thick coaxial cable maximum length is 500 meters  LANs are broadcast-oriented  Proper network design is impossible using repeaters

33 Inter-networking  Properly extending the LAN requires special devices known as bridges and routers  A LAN that uses bridges is called an extended LAN  A LAN that uses routers is called an internet or inter-network  A gateway between dissimilar networks  Properly extending the LAN requires special devices known as bridges and routers  A LAN that uses bridges is called an extended LAN  A LAN that uses routers is called an internet or inter-network  A gateway between dissimilar networks

34 Inter-networking  Bridges and routers are data-forwarding devices that forward packets to one or more LANs  They allow for more efficient networks to be designed  Bridges and routers are data-forwarding devices that forward packets to one or more LANs  They allow for more efficient networks to be designed

35 Inter-networking Categories Physical Data Link Network Transport Session Presentation Application Repeaters Bridges Routers Gateways

36 Repeaters  Extend the network by interconnecting multiple segments  Have transformed into wiring concentrators (hubs)  Low cost  Can be used to interconnect different wiring types but not different access methods  e.g. Coax to twisted pair  Extend the network by interconnecting multiple segments  Have transformed into wiring concentrators (hubs)  Low cost  Can be used to interconnect different wiring types but not different access methods  e.g. Coax to twisted pair

37 Bridge Designs  Cascaded  Locates on bridge next to another in a pillar fashion  Backbone  For networks with many LANs  Backbone cable is run vertically in building’s riser  LAN “ribs” run on each floor  Star  Used in wide area networks or remote bridged networks  Cascaded  Locates on bridge next to another in a pillar fashion  Backbone  For networks with many LANs  Backbone cable is run vertically in building’s riser  LAN “ribs” run on each floor  Star  Used in wide area networks or remote bridged networks

38 Cascaded Cable segment 1 Cable segment 2 Cable segment 3 Terminal Server Terminal Workstation File Server Host

39 Backbone Fiber backbone Fiber backbone Floor 1 Floor 20 Terminal Workstation Host Workstation

40 Star California Virginia North Carolina Texas Serial line

41 Introduction to Routers  Routers are data forwarding devices but operate differently than a bridge  Routers separate networks into regions.  Each region is assigned a unique network number  These network numbers are unique for each network they are assigned to  Packet forwarding is based on these network Ids  Routers route packets based on a protocol as well as a network ID  Most routers today are multiprotocol in that one box can forward different protocol packets  Routers, like bridges, can be used locally or remotely  Routers are data forwarding devices but operate differently than a bridge  Routers separate networks into regions.  Each region is assigned a unique network number  These network numbers are unique for each network they are assigned to  Packet forwarding is based on these network Ids  Routers route packets based on a protocol as well as a network ID  Most routers today are multiprotocol in that one box can forward different protocol packets  Routers, like bridges, can be used locally or remotely

42 Routing  Most network protocols were designed with network-layer routing  Routers base forwarding decisions on an embedded network number in the network layer header of the packet  Network numbers can be thought of as area codes in the phone system  Must use the area code to call different areas  Any number of end stations may be assigned to one network number  Most routers do not keep track of individual end stations’ addresses  Network numbers group network stations into one or more network numbers  Taken as a whole, routers combine networks and form internets  Most network protocols were designed with network-layer routing  Routers base forwarding decisions on an embedded network number in the network layer header of the packet  Network numbers can be thought of as area codes in the phone system  Must use the area code to call different areas  Any number of end stations may be assigned to one network number  Most routers do not keep track of individual end stations’ addresses  Network numbers group network stations into one or more network numbers  Taken as a whole, routers combine networks and form internets

43 Routers - Operation Network 1 Network 2 B C Destination network address is local transmit packet directly to the end station Destination network number is different Find router and give packet to the router Router sends packet directly to the end station MAC address for the router Router Z Node PNode A Node D

44 Routing Diagram Network 1 Network 2 Network 3 Network 4 A B C D E F G H MAC Addresses Router Z Router Y Router X

45 Multiprotocol Routers  LANs currently operate with many different types of protocols  Apple Computers can use AppleTalk  UNIX workstations use TCP/IP  Client/Server applications could use Novell NetWare  To require one router for each protocol on the LAN is not efficient  Multiprotocol routers were invented to handle this  Arrived around 1986  Routes not only based on the network IDs but are able to pass the packet to the correct protocol processor by examining the Type of packet  LANs currently operate with many different types of protocols  Apple Computers can use AppleTalk  UNIX workstations use TCP/IP  Client/Server applications could use Novell NetWare  To require one router for each protocol on the LAN is not efficient  Multiprotocol routers were invented to handle this  Arrived around 1986  Routes not only based on the network IDs but are able to pass the packet to the correct protocol processor by examining the Type of packet

46 Gateways  Complex devices that provide for a protocol translation during data forwarding  Examples are:  TCP/IP to SNA  asynchronous to synchronous serial stream  Gateways differ from bridges and routers  Perform protocol translation of the incoming packet to match the outgoing stream  Complex devices that provide for a protocol translation during data forwarding  Examples are:  TCP/IP to SNA  asynchronous to synchronous serial stream  Gateways differ from bridges and routers  Perform protocol translation of the incoming packet to match the outgoing stream

47 References From Networking 101 Jim Cabral, Puget Technology Group, Inc. & Tammy Ruth, Children’s Hospital and Medical Center cabralje@pugettech.com truth@chmc.org www.pugettech.com


Download ppt "The Workings of the Internet CECS 5030 with Cathie Norris, Jennifer Smolka & Gerald Knezek CECS 5030 with Cathie Norris, Jennifer Smolka & Gerald Knezek."

Similar presentations


Ads by Google