1 / 37

Computer Network Operating Systems

Computer Network Operating Systems. Richard Evans BSEE, MS. Networks. Definition: Computers and other devices connected together for the purpose of data exchange. Purpose is to share Data Devices Resources (Software & Email). Why Networks. Sharing Information

Download Presentation

Computer Network Operating Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Network Operating Systems Richard Evans BSEE, MS

  2. Networks Definition: Computers and other devices connected together for the purpose of data exchange. Purpose is to share Data Devices Resources (Software & Email)

  3. Why Networks • Sharing Information • Internet, Corporate Networks, Dept. Nets • Older systems connected as terminals • Sharing Hardware • Printers, disk space, applications • Sharing Resources • Email, configuration control, security

  4. Source Message Channel Receiver Noise Feedback Context Network Communications

  5. NetworkCommunications

  6. Local Area Network Types Peer to peer AppleTalk/internet sharing Server – based Novell/ Windows NT Client server Commonly used in databases

  7. Types of Networks

  8. Local Area Network

  9. Wide Area Network

  10. 1951 MIT's Whirlwind debuted on Edward R. Murrow's "See It Now" television series. Project director Jay Forrester described the computer as a "reliable operating system," running 35 hours a week at 90-percent utility using an electrostatic tube memory.Start of project: 1945 Completed: 1951 Add time: 50 microseconds Input/output: cathode ray tube, paper tape, magnetic tape Memory size: 2048 16-digit words Memory type: cathode ray tube, magnetic drum, tape (1953 - core memory) Technology: 4,500 vacuum tubes, 14,800 diodes Floor space: 3,100 square feet (Source: "The Computer Museum History Center." "http://www.computerhistory.org." )

  11. “This Internet Timeline begins in 1962, before the word ‘Internet’ is invented. The world’s 10,000 computers are primitive, although they cost hundreds of thousands of dollars. They have only a few thousand words of magnetic core memory, and programming them is far from easy.” (Source: "The Computer Museum History Center." "http://www.computerhistory.org." )

  12. In 1965 the ARPA-funded JOSS (Johnniac Open Shop System) at the RAND Corporation goes on line. The JOSS system permits online computational problem solving at a number of remote electric typewriter consoles. The standard IBM Model 868 electric typewriters are modified with a small box with indicator lights and activating switches. The user input appears in green, and JOSS responds with the output in black. (Source: "The Computer Museum History Center." "http://www.computerhistory.org." )

  13. In 1968 the ILLIAC IV, the largest supercomputer of its time, is being built at Burroughs under a NASA contract. More than 1,000 transistors are squeezed onto its RAM chip, manufactured by the Fairchild Semiconductor Corporation, yielding 10 times the speed at one-hundredth the size of equivalent core memory. ILLIAC-IV will be hooked to the ARPANET so that remote scientists can have access to its unique capabilities. After installation in September, handwritten logs from UCLA show the first host-to-host connection, from UCLA to SRI(Stanford Research Institute), is made on October 25, 1969. The first ‘Log-In’ crashes the IMPs, but the next one works! In 1968 Roberts and the ARPA team refine the overall structure and specifications for the ARPANET. They issue an RFQ for the development of the IMPs. ‘Interface Message Processors’ in front of the major computers. Called IMPs, evolve into today’s routers. (Source: "The Computer Museum History Center." "http://www.computerhistory.org." )

  14. In 1971 the ARPANET begins the year with 14 nodes in operation. Bolt, Beranek and Newman (BBN) modifies and streamlines the IMP design so it can be moved to a less cumbersome platform than the DDP-516. BBN also develops a new platform, called a Terminal Interface Processor (TIP) which is capable of supporting input from multiple hosts or terminals. (Source: "The Computer Museum History Center." "http://www.computerhistory.org." )

  15. By the beginning of 1981, more than 200 computers in dozens of institutions have been connected in CSNET. BITNET, another startup network, is based on protocols that include file transfer via e-mail rather than by the FTP procedure of the ARPA protocols. The Internet Working Group of DARPA publishes a plan for the transition of the entire network from the Network Control Protocol to the TCP/IP protocols developed since 1974 and already in wide use (RFC 801). At Berkeley, Bill Joy incorporates the new TCP/IP suite into the next release of the Unix operating system. The first ‘portable’ computer is launched in the form of the Osborne, a 24-pound suitcase-sized device. (Source: "The Computer Museum History Center." "http://www.computerhistory.org." )

  16. In 1989 the number of hosts increases from 80,000 in January to 130,000 in July to over 160,000 in November! Between the beginning of 1986 and the end of 1987 the number of networks grows from 2,000 to nearly 30,000. By the end of 1985, the number of hosts on the Internet (all TCP/IP interconnected networks) has reached 2,000. (Source: "The Computer Museum History Center." "http://www.computerhistory.org." )

  17. In 1993 the NSFNET backbone upgrades to T3, or 44 Mbps. Total traffic exceeds 1 trillion bytes, or 10 billion packets per month! Over 100 countries are now connected with over 600,000 hosts and nearly 5,000 separate networks. In 1994 the number of networks exceeds 7,500 and the number of computers connected passes 1,000,000. (Source: "The Computer Museum History Center." "http://www.computerhistory.org." )

  18. Two years ago when over 1500 Chief Information Officers at US and Canadian companies were asked what information technology skills will be most demanded at the start of last year, here is what they said.

  19. Internet Growth through 2002

  20. Internet Web Site Growth through 2002

  21. Server-Based Network

  22. Components File server ( other than peer to peer) Network operating system Workstations Local operating system Network interface card Cables / Transmission media

  23. Network Structure • Datagram structure • Network topology • Network access

  24. Datagram Network / Operating System Dependent Typical Packet Data Trailer Header

  25. Topologies • Point to Point • Each computer is connected directly to another location • Configuration difficulties • Very Secure • Very Expensive

  26. Topologies • Multipoint • Easier to implement • Cheaper • Could be secure if used among similar sites • Most common found today

  27. Types of Multipoint Networks • Bus • Early Apple Talk • Must be terminated 50ohm resistor • Without termination reflective inpedence • No repeator involved • Connected computer to computer • Easy to setup / manage • Number of devices limited • Troubleshooting dificult • Slower performance as equipment is added

  28. Topologies • Ring • IBM / Token ring • Easier to manage • Holds more devices wihtout performance issues • Vendor specific • Expensive • Special hardware

  29. Topologies • Star • Most common • All computers forward information into a hub • Hub distributes packets • Hubs can be switching • Easy to manages / repair • Single point of failure is hub, not a workstation • Uses cable, and requires patching

  30. Accessing Network • How does a computer get information into the pipe? • All computers must follow protocol • Sharing the network pipe is called channel access method • Method used determines performance of network

  31. Accessing the Network • Four methods • Contention • Fight for priority of network space • Simultneous access results in errors • Need rules established • Carrier Sense Multiple Access • Listen then transmit • Carrier Sense Multiple Access / Collision Detection • Listen then transmit / retransmit after allotted time

  32. Accessing the Network • Polling • Wait until you are asked • Every computer has equak access • No monopoly on time • Unnecessary time delays, waiting for the ok. • If polling device fails, so does the network

  33. Accessing the Network • Token Passing • No machine can transmit until it gets the token • Elliminates collisions • Equal access • Expensive • Slower

  34. Accessing the Network • Demand Priority • Signal you need the network • Can establish priorities for certain computers • Efficient • Single point of failure • Expensive

  35. IEEE Standards • Institute of Electrical and Electronic Engineers • 802.3 CSMA/CD • 802.5 Token Ring Standard 802.3 Ethernet frame format

  36. IEEE Standards • 802.4 Token Bus • No data collisions

  37. IEEE Standards • IEEE 802.3 10BASE5 • Thick Coax, 10 Mbs, 500 Meters • IEEE 802.3 10BASE2 • Thin Coax, 10 Mbs, 200 Meters • IEEE 802.3 Starlan • Two strands unshielded cable • 1 Mbs, 500 Meters • IEEE 802.3 10BASET • Twisted pair, 10Mbs, 100Meters

More Related