CS 335 - Computer Networks Dr. Randy L. Ribler 103 Hobbs

Slides:



Advertisements
Similar presentations
Cisco 2 - Routers Perrine. J Page 14/30/2015 Chapter 10 TCP/IP Protocol Suite The function of the TCP/IP protocol stack is to transfer information from.
Advertisements

IST 201 Chapter 9. TCP/IP Model Application Transport Internet Network Access.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Chapter 2 Network Models.
International Standards Organization Open Systems Interconnect (OSI) Reference Model Advanced Computer Networks.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Computer Network Architecture and Programming
Networks 1 CS502 Spring 2006 Network Input & Output CS-502 Operating Systems Spring 2006.
CS-3013 & CS-502, Summer 2006 Network Input & Output1 CS-3013 & CS-502, Summer 2006.
Chapter 2. Network Models
What Is TCP/IP? The large collection of networking protocols and services called TCP/IP denotes far more than the combination of the two key protocols.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
OIS Model TCP/IP Model.
©Brooks/Cole, 2003 Chapter 6 Computer Networks. ©Brooks/Cole, 2003 Understand the rationale for the existence of networks. Distinguish between the three.
Lecturer: Tamanna Haque Nipa
IST 228\Ch3\IP Addressing1 TCP/IP and DoD Model (TCP/IP Model)
Process-to-Process Delivery:
Data Communications and Networks
WXES2106 Network Technology Semester /2005 Chapter 4 TCP/IP CCNA1: Module 9, 10.3 and 11.
TCP/IP protocols Communication over Internet is mostly TCP/IP (Transmission Control Protocol over Internet Protocol) TCP/IP "stack" is software which allows.
Review: – computer networks – topology: pair-wise connection, point-to-point networks and broadcast networks – switching techniques packet switching and.
Chapter 9.
Chapter 2 Network Models
Presentation on Osi & TCP/IP MODEL
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Computer Networks. IP Addresses Before we communicate with a computer on the network we have to be able to identify it. Every computer on a network must.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
SEED Infotech Pvt. Ltd. 1 Networking in Java. SEED Infotech Pvt. Ltd. 2 Objectives of This Session Describe issues related to any type of network using.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary
Service Primitives Six service primitives that provide a simple connection-oriented service 4/23/2017
1 7-Oct-15 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
1 Version 3.0 Module 11 TCP Application and Transport.
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
Overview of TCP/IP protocols –Application layer (telnet, ssh, http, ftp, etc) The things that we use daily. –Transport layer (TCP, UDP) Allows processes.
IP addresses IPv4 and IPv6. IP addresses (IP=Internet Protocol) Each computer connected to the Internet must have a unique IP address.
Advanced UNIX programming Fall 2002, lecture 16 Instructor: Ashok Srinivasan Acknowledgements: The syllabus and power point presentations are modified.
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
Net 221D:Computer Networks Fundamentals
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Page 12/9/2016 Chapter 10 Intermediate TCP : TCP and UDP segments, Transport Layer Ports CCNA2 Chapter 10.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
1 14-Jun-16 S Ward Abingdon and Witney College CCNA Exploration Semester 1 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI transport layer CCNA Exploration Semester 1 – Chapter 4.
Computer Networking 网络课件 双语教学 模拟实验 计算机网络教研室 Department of Computer Networking Application CHAPTER 14 INTERNETWORKING 1 The first section 2 Exercises.
CS Computer Networks Dr. Randy L. Ribler 103 Hobbs
Level 2 Diploma Unit 10 Setting up an IT Network
The ISO OSI Reference Model
Layered Architectures
Understand the OSI Model Part 2
Networking for Home and Small Businesses – Chapter 6
Understanding the OSI Reference Model
Networking for Home and Small Businesses – Chapter 6
Process-to-Process Delivery:
Chapter 15 – Part 2 Networks The Internal Operating System
Chapter 2 Network Models
Networking for Home and Small Businesses – Chapter 6
Networking for Home and Small Businesses – Chapter 6
Process-to-Process Delivery: UDP, TCP
The TCP/IP Model.
Presentation transcript:

CS Computer Networks Dr. Randy L. Ribler 103 Hobbs

Introduction Read Chapter 1 in Kurose and Ross

How do we design networks?  Use layers of “abstractions”  Each layer provides a set of “services”  Upper layers implement the services in terms of lower layer services  Each layer treats the layer above it and below it as an abstraction

Sentence Word Net Talk Sentence Net Talk Send sentence Send Word Route Word Alphanumeric Transmission Word Classroom Demonstration Protocol

Talk Net Word Sen- tence Net Word Sen- tence Host 0Host 1Host 2Host 3Host 4Host 5

ISO OSI Reference Model  International Standards Organization  Open Systems Interconnection (OSI)  The ISO OSI contains 7 layers

OSI Reference Model Application Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Presentation Layer

Application Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Presentation Layer Application Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Presentation Layer Adapted from p34, Tanenbaum Sending ProcessReceiving Process

OSI Reference Model Terminology  Services - What the layer does  like public member functions in OOP  Interface - Parameters and results  like the parameter lists and return values in OOP  Protocols - the communication between peer levels  like the hidden implementation of class in OOP.

Physical Layer  Transmission of “raw” bits  Hardware level concerns  voltages, pins  mechanical, electrical, and procedural interfaces  Communicates between a pair of nodes  Provided by modems and other point-to-point transmission hardware

Data Link Layer  Imposes a structure on the bit stream  data frames (100’s or 1000’s of bytes long)  Acknowledge receipt of frames  Handle damaged, lost, or duplicate frames  Flow regulation  Don’t overflow buffers

The Network Layer  Routing “packets”  Congestion Control  Accounting  Heterogeneous network interconnects

The Transport Layer  Provides multiplexing/demultiplexing between network traffic and individual processes.  Establishes/deletes network connections  End-to-end flow control.  Not needed on routers (unless router is also a host).  Often provides a reliable bit stream.  Transport layer protocols handle “messages.”

The Session Layer  Information about where to obtain service  Access Rights/permissions  establish “sessions” (login or ftp)  Traffic Control ( half/full duplex connections)  The Session Layer is generally under utilized

Presentation Layer General Purpose Application Utilities Utilities that operate on data Data word sizes Encryption Data Compression Code conversions e.g., ASCII EBCDIC

Application Layer  Application specific code  ftp  telnet  http  Anything not implemented elsewhere in the protocol stack.

Internet Protocol (IP)  Internet protocol has been revised  IP version 4 (IPv4) is the most widely used.  IP version 6 (IPv6) will eventually replace it.  IPv4 uses 32-bit host addresses  IPv6 uses 128-bit host addresses

TCP/IP Reference Model Application Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Presentation Layer Application Layer Transport Layer Internet Layer Host-to-network Layer OSI Model TCP/IP Model IP TCP or UDP

Talk Authorize Talk Break Message Apart Route Message Manage Frames Send Bit Stream ASCII-EBCDIC Talk Authorize Talk Reassemble Message Route Message Manage Frames Receive Bit Stream YouYour Friend Application Presentation Session Transport Network Data Link Physical

Internet Protocol (IPv4)  32-bit IP addresses  Store internally as a single word  Usually expressed to user’s using “dotted decimal notation” (e.g., ) where each of the four numbers range from 0 to 255.  Usually aliased to host name of the system (e.g. mail.lynchburg.edu

Domain Name System (DNS)  How can we map host names to IP addresses?  Domain Name Servers provide names in response to client requests.  A hierarchical representation provides name management at each level of domain name.

Client/Server Models  Network interaction is based on an asymmetrical relationship  Server  provides services to authorized clients  typically handles many clients simultaneously  works passively, driven by client requests  Client  requests services  typically initiates

Port Numbers  IP addresses identify host machines only.  Port numbers identify services on machines.  16-bit port numbers provide values ( )  “Well-known ports” (0-1023)  Registered ports ( ) (49152 is 75% of available port numbers)  Dynamic or private ports  Internet Assigned Number Authority (IANA)  Determines (0-1023)  Registers ( )  Does not control ( )

Some Well Known Port Numbers  23 (telnet)  21 (ftp)  13 (daytime)  25 (smtp (mail))  43 (whois)  144 (news)  80 (http web server)

Telnet Client  telnet  provides a general interface to request a service and return a text response.

Ping  See if there is a connection between two machines  See if a particular host is running ping

Trace Route  traceroute (unix)  tracert (dos/windows)

Internetworking lynchburg.edu acavax.lynchburg.edu networkvirginia.net cs.vt.edu cns.vt.edu lasi-main GATEWAYS

Network Protocols Must Adopt One of the Two Byte Orders  Network Byte Order  The protocol byte order  Host Byte Order  The native machine byte order  Conversion Functions  htons : convert 16-bit value from host byte order to network byte order. (ntohs provides the inverse)  htonl: convert 32-bit value from host byte order to network byte order. (ntohl provides the inverse)

Domain Name Management  Each level is responsible for assigning its own names .edu is the top-level domain for educational institutions in the US. We need to get permission from the managers of the.edu domain before we can use lynchburg.edu  lynchburg.edu is the Lynchburg College domain name. We can name our computers anything we want, (e.g., acavax.lynchburg.edu).  If we wanted to we could create a cs.lynchburg.edu subdomain

Lavender Army Magenta Army Distributed processing problem from Data Networks, by Dimitri Bertsekas and Robert Gallager