1 Fall 2005 Network Characteristics: Ownership, Service Paradigm, Performance Qutaibah Malluhi CSE Department Qatar University.

Slides:



Advertisements
Similar presentations
Review of Topology and Access Techniques / Switching Concepts BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Advertisements

M A Wajid Tanveer Infrastructure M A Wajid Tanveer
Chapter 15 Network Ownership, Service Paradigm, and Performance.
Answers of Exercise 7 1. Explain what are the connection-oriented communication and the connectionless communication. Give some examples for each of the.
Optical communications & networking - an Overview
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
Network Layer and Transport Layer.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
1 Fall 2005 Extending LANs Qutaibah Malluhi CSE Department Qatar University Repeaters, Hubs, Bridges, Fiber Modems, and Switches.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
CSCI 4550/8556 Computer Networks Comer, Chapter 15: Networking Ownership, Service Paradigm.
COS 420 Day 20. Agenda Group Project Discussion Protocol Definition Due April 12 Paperwork Due April 29 Assignment 3 Due Assignment 4 is posted Last Assignment.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Introduction To Networking
04/26/2004CSCI 315 Operating Systems Design1 Computer Networks.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
TCP/IP Reference Model Host To Network Layer Transport Layer Application Layer Internet Layer.
COMPUTER NETWORKS.
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Network
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Chapter 4 Computer Networks – Part 1
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Communicating over the Network Network Fundamentals – Chapter 2.
ISO Layer Model Lecture 9 October 16, The Need for Protocols Multiple hardware platforms need to have the ability to communicate. Writing communications.
CSCI-235 Micro-Computer in Science The Network. © Prentice-Hall, Inc Communications  Communication is the process of sending and receiving messages 
Chapter 13 – Network Security
Common Devices Used In Computer Networks
Networks for Distributed Systems n network types n Connection-oriented and connectionless communication n switching technologies l circuit l packet.
1 Module 15: Network Structures n Topology n Network Types n Communication.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
Network Property and ISO Reference Model Network Ownership: Private and Public Connectionless Network and Connect-Oriented Network Network Performance.
Chapter 2 – X.25, Frame Relay & ATM. Switched Network Stations are not connected together necessarily by a single link Stations are typically far apart.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications ◦The client requested data.
TELE202 Lecture 5 Packet switching in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lectures »C programming »Source: ¥This Lecture »Packet switching in Wide.
William Stallings Data and Computer Communications 7 th Edition Chapter 1 Data Communications and Networks Overview.
Ch 1. Computer Networks and the Internet Myungchul Kim
1 Network Properties (Ownership, Service Paradigm, Measures of Performance)
Chapter Overview Bridging Switching Routing.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
ATM Technologies. Asynchronous Transfer Mode (ATM) Designed by phone companies Single technology meant to handle –Voice –Video –Data Intended as LAN or.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
William Stallings Data and Computer Communications
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Computer Networks and Internets 《计算机网络与因特网》课件 林坤辉
Review of Network Technologies. Basic of Network concepts Computer Network – A Communication system for connecting computers/hosts Why? – Better connectivity.
SEPT, 2005CSI Part 2.1 Network Properties (Ownership, Service Paradigm, Measures of Performance) Robert Probert, SITE, University of Ottawa.
1 Chapter 15 Network Properties (Ownership, Service Paradigm, Measures of Performance)
CSCI-235 Micro-Computer Applications The Network.
WAN Transmission Media
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
Lecture 4 unit 1. categories of network A network can be categorized as a 1.Local area network. 2.Wide area network. 3.Metropolitan area network. 4.Personal.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
COMPUTER NETWORKS CS610 Lecture-20 Hammad Khalid Khan.
Network Processing Systems Design
By: Danielle Bowen-Dooley
COMPUTER NETWORKS CS610 Lecture-21 Hammad Khalid Khan.
COMPUTER NETWORKS CS610 Lecture-21 Hammad Khalid Khan.
(Ownership, Service Paradigm, Measures of Performance)
Part 2.1 Network Properties
Telemedicine.
Part 2.1 Network Properties
Ch 15 Network Characteristics
Optical communications & networking - an Overview
Presentation transcript:

1 Fall 2005 Network Characteristics: Ownership, Service Paradigm, Performance Qutaibah Malluhi CSE Department Qatar University

2 Network Characteristics  Previously we classified the Network based on its size –WAN, MAN, and LAN  Other important characteristics –Network ownership –Type of service –Performance

3 Network Ownership  Private network - owned and operated by single organization or company  Public network - owned and operated by common carrier (e.g., phone company)

4 Private Networks  Often LAN technology  Multiple LANs in a building or campus, linked together  Sometimes called intranet  Large organizations may have multiple widely distributed buildings or campuses –Can only install cables on own property –Otherwise, dedicated lines are leased from common carrier  Private network management –Organization buys own equipment and is responsible for all network management –Hires staff to design, implement, maintain and upgrade network

5 Public Networks  Analogous to telephone system  Run as a service available to subscribers  Operated and managed by the service provider –Service provider may own the lines or may use leased lines  Public networks are mostly large WANs  Universal communication: Allow a subscriber to communicate with any other subscriber  Public networks allow private communication between two subscribers or a group of subscribers

6 Virtual Private Network (VPN)  Allows building a private network over a public network –Creates the illusion of a private network over a public network  Use hardware and/or software devices on each site –Devices restrict incoming and outgoing access only to specified sites –Use cryptography techniques for creating what is called a tunnel between the two sites –Encryption guarantees absolute privacy  Connections, sometimes called tunnels, connect sites –Each site sees tunnel as point-to-point link direct to another site

7 VPN Protocols  L2TP: Layer 2 Tunneling protocol –Layer 2 (Data Link layer) Protocol –Microsoft support –Extension of the Internet standard Point-to-Point protocol (PPP) »link layer protocol used to transmit IP packets over serial links  PPTP: Point-to-Point Tunneling Protocol –Layer 2 (Data Link layer) Protocol –Not limited to IP networks (unlike L2TP) –Microsoft, Cisco, and others support –More secure than L2TP  IPSec: IP Security –Layer 2 (Network layer) Protocol –Mostly used for site-to-site VPN (rather than computer to computer or computer to site) »Client requires IPSec software  SSL: Secure Socket Layer –Layer 5 (Session layer) Protocol –Web browser can be the client (no need for client software) –Limit the applications to those running inside the browser

8 Service Paradigm  Connection-oriented –Similar to telephone system; endpoints establish and maintain a connection as long as they have data to exchange  Connectionless –Similar to postal system; endpoint puts data to send into a packet and hands the packet to the network for delivery

9 Connection Oriented Paradigm  One endpoint requests connection from network  Other endpoint agrees to connection  Computers exchange data through connection  Data transmission not necessarily continuous; like telephone, connection remains in place while no data transmitted  One endpoint request network to break connection when transmission is complete

10 Connection Oriented  Typically stream interface –Source delivers stream of data to network –Network breaks into packets for delivery –No packet boundaries – Receiver may receive a block of 100 bytes even thought the sender may have sent 25, 50, 25 chunks. –Notice that it is only a connection-oriented interface »The network at the lower level may still divide data into packets. The interface hides data packets.  Can also provide message interface –Data is delivered in defined chunks  Support continuous (e.g., video and audio) or bursty traffic –Connection stays on when no data is being sent in bursty traffic  Connection duration –Permanent: persists over months or years –Switched: established and created quickly and dynamically

11 Connectionless Paradigm  No connection necessary  Source of data adds destination information to data packets and passes packets to network  Network delivers each data item (packet) individually and independently  Need destination address with every packet –In connection oriented networks, need destination address at connection establishment only. Connection id (smaller than full address) is needed with every transmission.

12 Comparison of Service Paradigms  Connection-oriented –Easier accounting –Application can learn of network problems immediately –More expensive – charged for open connection even if you are not using it  Connectionless –No overhead for establishing connection –Need only be charged by actual usage –Easier to implement network

13 Examples of Service Paradigms

14 Network Performance Criteria  Delay  Throughput  Delay-throughput product  Jitter

15 Network Delay  Delay is measure of time for data to transit network –How long it takes a bit to travel from point A to point B  Delay components –Fixed components »Propagation delay - time to travel across medium »Switching delay - time for network component (hub, bridge, packet switch) to forward data –Variable Components »Access delay - time to get control of medium (CSMA/CD, token) »Queuing delay - time queued in packet switches  Intuition: “length” of the pipe

16 Throughput  Throughput measures rate at which data can be transmitted in network (bits per second) –300 bps (bits per second) - old modems –1 gbps (gigabit [109] bits per second) – among the fastest today  Bandwidth – sometimes use as synonym to throughput –Related to underlying hardware  Effective throughput - real data delivery rate –Consider packet headers for example  Sometimes people use speed as a synonym of throughput –Measure of capacity –Intuition: “width” of the pipe –Consider width of highway versus speed limit of the highway

17 Throughput and Delay  Throughput and delay are not independent –Queuing delay increases with network load –As throughput approaches theoretical maximum, delay increases  Excessive traffic known as congestion  Network utilization is the ratio between throughput and maximum capacity  Effective delay, D, can be approximated: –D = D0 / (1 - U) –D0 is delay when network is idle –U is a value between 0-1 denoting network utilization  Practical consequence: Any network that operates with a utilization approaching 100% of capacity is doomed. –Maintain utilization below a threshold (e.g. 50%, 70%)

18 Delay-Throughput product  Computed as delay time multiplied by effective throughput  Measures amount of data that can be present in the network  In fast networks with long delay times, sending computer can generate large amounts of data before destination receives first bit

19 Jitter  Variance in delay  Important for real time transmission (e.g., audio/video)

20 Summary  Network can be –Public –Private  Virtual Private Network –Uses public network to connect set of private sites  Networks are –Connectionless –Connection-oriented  Network Performance Measures –Delay –Throughput –Delay X Throughput –Jitter Delay and throughput interaction