Networking.

Slides:



Advertisements
Similar presentations
Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
Advertisements

OSI Model OSI MODEL.
OSI Model OSI LAYER / MODEL.
Open System Interconnection
Network Fundamentals – Chapter 7
Lecture 2 Protocol Layers CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Chapter 2 Network Models.
TCP/IP Reference Model Host To Network Layer Transport Layer Application Layer Internet Layer.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
OIS Model TCP/IP Model.
Lecturer: Tamanna Haque Nipa
Lecture 1 Internet CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger and Daniel Zappala Lecture 1 Introduction.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Mukesh N. Tekwani Elphinstone College Mumbai
Layer Architecture Layer architecture simplifies the network design. It is easy to debug network applications in a layered architecture network. The network.
The OSI Model An ISO (International standard Organization) that covers all aspects of network communications is the Open System Interconnection (OSI) model.
The OSI Model.
Lecture 1 Internet CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger and Daniel Zappala Lecture 2 Introduction.
Lecture 3 Overview. Protocol An agreed upon convention for communication both endpoints need to understand the protocol. Protocols must be formally defined.
INTRODUCTION TO NETWORKS & OSI MODEL T.RAMYAAPI/EIEKLNCE.
William Stallings Data and Computer Communications
Communication Networks - Overview CSE 3213 – Fall November 2015.
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
Open System Interconnection Describe how information from a software application in one computer moves through a network medium to a software application.
1 Networking. 2 Network “... communication system for connecting end-systems” End-systems a.k.a. “hosts” PCs, workstations dedicated computers network.
Protocol Suits and Layering Models OSI Model Dr. Abraham UTPA.
1 Netprog: OSI Reference Model Networking. 2 Network “... communication system for connecting end-systems” End-systems a.k.a. “hosts” PCs, workstations.
OSI Model. Open Systems Interconnection (OSI) is a set of internationally recognized, non proprietary standards for networking and for operating system.
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Dr. ClincyLecture1 Chapter 2 (handout 1– only sections 2.1, 2.2 and 2.3) 1 of 10 Dr. Clincy Professor of CS Exam #3 Monday (3/14/16): Opened Book, No Computer,
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Mr. Sathish Kumar. M Department of Electronics and Communication Engineering I’ve learned that people will forget what you said, people will forget what.
Computer Network Lab. 1 3 장 OSI 기본 참조 모델 n OSI : Open System Interconnection n Basic Reference Model : ISO-7498 n Purpose of OSI Model ~ is to open communication.
Computer Engineering and Networks, College of Engineering, Majmaah University Protocols OSI reference MODEL TCp /ip model Mohammed Saleem Bhat
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
Network Models.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
The OSI Model Prof. Choong Seon HONG.
Chapter 4 Introduction to Network Layer
Chapter 3 Computer Networking Hardware
Click to edit Master subtitle style
OSI NETWORK MODEL.
OSI Protocol Stack Given the post man exemple.
ISO/OSI Model and Collision Domain
Lecturer, Department of Computer Application
TCP/IP Transmission Control Protocol / Internet Protocol
Understand the OSI Model Part 2
DEPARTMENT OF COMPUTER SCIENCE
Lecture 2 Overview.
Introduction to Protocol and Layer
CPE 401 / 601 Computer Network Systems
Chapter 3: Open Systems Interconnection (OSI) Model
Chapter 4 Introduction to Network Layer
EEC-484/584 Computer Networks
Networking.
OSI Model OSI MODEL.
Chapter 2. Protocols and Architecture
Network Architecture Models
EEC4113 Data Communication & Multimedia System Chapter 1: Introduction by Muhazam Mustapha, July 2010.
OSI Reference Model Unit II
Data Communication and Computer Networks
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara
Unit – III Network Essentials
Presentation transcript:

Networking

Network “ ... communication system for connecting end-systems” End-systems a.k.a. “hosts” PCs, workstations dedicated computers network components

Multiaccess vs. Point-to-point Multiaccess means shared medium. many end-systems share the same physical communication resources (wire, frequency, ...) There must be some arbitration mechanism. Point-to-point only 2 systems involved no doubt about where data came from !

Multiaccess Point-to-point

LAN - Local Area Network connects computers that are physically close together ( < 1 mile). high speed multi-access Technologies: Ethernet 10 Mbps, 100Mbps Token Ring 16 Mbps FDDI 100 Mbps

WAN - Wide Area Network connects computers that are physically far apart. “long-haul network”. typically slower than a LAN. typically less reliable than a LAN. point-to-point Technologies: telephone lines Satellite communications

MAN - Metropolitan Area Network Larger than a LAN and smaller than a WAN - example: campus-wide network - multi-access network Technologies: coaxial cable microwave

Internetwork Net A Net B Connection of 2 or more distinct (possibly dissimilar) networks. Requires some kind of network device to facilitate the connection. Net A Net B

OSI Reference Model Layered model: 7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data Link 1. Physical

The Physical Layer Responsibility: Issues: transmission of raw bits over a communication channel. Issues: mechanical and electrical interfaces time per bit distances

The Data Link Layer - Data Link Control Responsibility: provide an error-free communication link Issues: framing (dividing data into chunks) header & trailer bits addressing 10110110101 01100010011 10110000001

The Data Link Layer - The MAC sublayer Medium Access Control - needed by mutiaccess communications. MAC provides DLC with “virtual wires” on multiaccess networks.

The Network Layer Responsibilities: Issues: path selection between end-systems (routing). subnet flow control. translation between different network types. Issues: packet headers virtual circuits

The Transport Layer Responsibilities: Issues: provides virtual end-to-end links between peer processes. fragmentation & reassembly end-to-end flow control Issues: headers error detection reliable communication

The Session Layer Responsibilities: establishes, manages, and terminates sessions between applications. service location lookup Many protocol suites do not include a session layer.

The Presentation Layer Responsibilities: data encryption data compression data conversion Many protocol suites do not include a Presentation Layer.

The Application Layer Responsibities: Issues: anything not provided by any of the other layers Issues: application level protocols appropriate selection of “type of service”

Layering & Headers Each layer needs to add some control information to the data in order to do it’s job. This information is typically prepended to the data before being given to lower layers. Once the lower layers deliver the the data and control information - the peer layer uses the control information.

Headers Process DATA Process Transport H DATA Transport Network H H Data Link H H H DATA Data Link

What are the headers? Physical: no header - just a bunch of bits. Data Link: address of the receiving endpoints address of the sending endpoint length of the data checksum.

Network layer header protocol suite version protocol type of service length of the data packet identifier fragment number time to live protocol header checksum source network address destination network address

Connecting Networks Repeater: physical layer Bridge: data link layer Router: network layer Gateway: network layer and above.

Repeater Copies bits from one network to another Does not look at any bits Allows the extension of a network beyond physical length limitations REPEATER

Bridge Copies frames from one network to another Can operate selectively - does not copy all frames (must look at data-link headers). Extends the network beyond physical length limitations. BRIDGE

Router Copies packets from one network to another. Makes decisions about what route a packet should take (looks at network headers). ROUTER

Gateway Operates as a router Data conversions above the network layer. encapsulation - use an intermediate network translation - connect different application protocols encrpyption - could be done by a gateway

Encapsulation Example Gateway Gateway Provides service connectivity even though intermediate network does not support protocols.

Translation Gateway Translate from red protocol to brown protocol

Encryption/Decryption Encryption gateway Secure Network Secure Network Encryption/Decryption Gateways ? GW GW ? ? Insecure Network

Hardware vs. Software Repeaters are typically hardware devices. Bridges can be implemented in hardware or software. Routers & Gateways are typically implemented in software so that they can be extended to handle new protocols. Many workstations can operate as routers or gateways.

Byte Ordering Different computer architectures use different byte ordering to represent multibyte values. 16 bit integer: Low Byte Address A High Byte High Byte Address A+1 Low Byte

Byte Ordering Little-Endian IBM 80x86 DEC VAX DEC PDP-11 Big-Endian Motorola 68000 Sun Low Byte High Byte High Byte Low Byte Addr A Addr A+1 Addr A Addr A+1

Network Byte Order Conversion of application-level data is left up to the presentation layer. But hold on !!! How do lower level layers communicate if they all represent values differently ? (data length fields in headers) A fixed byte order is used (called network byte order) for all control data.

Multiplexing “.. to combine many into one”. Many processes sharing a single network interface. A single process could use multiple protocols. More on this when we look at TCP/IP.

Modes of Service connection-oriented vs. connectionless sequencing error-control flow-control byte stream vs. message based full-duplex vs. half-duplex.

Connection-Oriented vs. Connectionless Service A connection-oriented service includes the establishment of a logical connection between 2 processes. establish logical connection transfer data terminate connection. Connectionless services involve sending of independent messages.

Sequencing Sequencing provides support for an order to communications. A service that includes sequencing requires that messages (or bytes) are received in the same order they are sent.

Error Control Some services require error detection (it is important to know when a transmission error has occured). Checksums provide a simple error detection mechanism. Error control sometimes involves notification and retransmission.

Flow Control Flow control prevents the sending process from overwhelming the receiving process. Flow control can be handled a variety of ways - this is one of the major research issues in the development of the next generation of networks (ATM).

Byte Stream vs. Message Byte stream implies an ordered sequence of bytes with no message boundaries. Message oriented services provide communication service to chunks of data called datagrams.

Full- vs. Half-Duplex Full-Duplex services support the transfer of data in both directions. Half-Duplex services support the transfer of data in a single direction.

End-to-End vs. Hop-toHop Many service modes/features such as flow control and error control can be done either: between endpoints of the communication. -or- between every 2 nodes on the path between the endpoints.

End-to-End Process A Process B

Hop-by-Hop Process A Process B

Buffering Bufferring can provide more efficient communications. Buffering is most useful for byte stream services. Process A Send Buffer Recv. Buffer Process B

Addresses Each communication endpoint must have an address. Consider 2 processes communicating over an internet: the network must be specified the host must be specified the process must be specified.

Addresses Physical Layer: no address necessary Data Link Layer - address must be able to select any host on the network. Network Layer - address must be able to provide information to enable routing. Transport Layer - address must identify the destination process.

Broadcasts Many networks support the notion of sending a message from one host to all other hosts on the network. A special address called the “broadcast address” is often used. Some popular network services are based on broadcasting (YP/NIS, rup, rusers )