tobb et b l 55 2 internet architecture lecture 0 1 n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
TOBB ET Ü B İL 55 2 Internet Architecture Lecture 0 1 PowerPoint Presentation
Download Presentation
TOBB ET Ü B İL 55 2 Internet Architecture Lecture 0 1

Loading in 2 Seconds...

play fullscreen
1 / 89

TOBB ET Ü B İL 55 2 Internet Architecture Lecture 0 1 - PowerPoint PPT Presentation


  • 167 Views
  • Uploaded on

TOBB ET Ü B İL 55 2 Internet Architecture Lecture 0 1. Mehmet Özdem. Course Topics. Telecomunication Sector Internet Basics / OSI Model Routing Protocols Protocols (TCP,UDP,RTP,RSVP) Internet Access Types Servers (FTP, Mail,www…) NGN (Voice over IP) IPTv. Telecom Market. Chapter 1.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

TOBB ET Ü B İL 55 2 Internet Architecture Lecture 0 1


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
    Presentation Transcript
    1. TOBB ETÜ BİL 552Internet ArchitectureLecture 01 Mehmet Özdem

    2. Course Topics • Telecomunication Sector • Internet Basics / OSI Model • Routing Protocols • Protocols (TCP,UDP,RTP,RSVP) • Internet Access Types • Servers (FTP, Mail,www…) • NGN (Voice over IP) • IPTv

    3. Telecom Market Chapter 1

    4. Oyuncular • v * BTK İnternet Sitesi Yayınlar Bölümünden Alınmıştır

    5. CISCO • KRON • HUAWEI • ERICSON • ALCATEL • ZTE • NORTEL • NOKIA SIEMENS • BIRTEL

    6. İstihdam * BTK İnternet Sitesi Yayınlar Bölümünden Alınmıştır

    7. İstihdam * BTK İnternet Sitesi Yayınlar Bölümünden Alınmıştır

    8. İstatistikler * BTK İnternet Sitesi Yayınlar Bölümünden Alınmıştır

    9. İstatistikler * BTK İnternet Sitesi Yayınlar Bölümünden Alınmıştır

    10. Türkiye & EU

    11. Mobile * BTK İnternet Sitesi Yayınlar Bölümünden Alınmıştır

    12. World Internet Users

    13. Number of Internet Users Some interesting statistics

    14. Türkiye & EU

    15. Sertifikasyon

    16. History of the Internet

    17. Background • 1962- Licklider (M.I.T) discussed Galactic Network • 1965- 2 PC were spoken eachother(M.I.T) • 1969- DARPA (Defence Advanced Research Project Agency) was the top of American Military Project, in which ARPANET was developed communicating 4 network (University of California at Los Angeles Stanford Research Institute ,University of Utah and University of California at Santa Barbara)

    18. 1971-NCP (Network Control Protocol) was developed • 1972- First e-mail was sent • 1983-TCP/IP was developed and used in ARPANET • 1986- American National Science made huge amount of investment on ARPANET installing 5 super computer center called NSFNET

    19. 1987-NSF established very powerfull backbone speed of 1.5Mbps • 1994-110 Country,10K network, 3M PC,25M user • 1995-www was used • ……. • 2010- 1.8 Billion of user, 247 Billion e-mail are sending everyday,234 M web sites

    20. Architecture

    21. Issues and Definitions

    22. Internet Organizations • http://www.itu.int/en/pages/default.aspx • IETF- Internet Engineering Task Force • Performs protocol engineering and development functions • IAB- Internet Architecture Board (formerly Advisory) • Consists of chairs of Task Forces • Responsible for defining the overall architecture • IESG- Internet Engineering Steering Group • Responsible for Internet standards process (RFC) • ISOC- Internet Society • Professional Membership organization • Deals with network issues • IANA- Internet Assigned Numbers Authority • In charge of distribution of IP addresses as well • as all other unique parameters

    23. SomeTerminology • In a LAN a number of End System (ES) or hosts are connected together. This is a connection to a same type of LAN • It is also possible to connect a number of stations to LANs • and then connect these LANs together. This latter approach is called internetworking and each network connected to an inter-network or internet is a subnet • Networks are connected together either through routers or gateways. A router does not usually involve protocol conversion whereas a gateway usually involves protocol conversion

    24. InternetworkingIssues Network Service: The service can be connectionless or connection oriented . Usually LANs offer a connectionless service whereas WANs use connection oriented protocols. Internet is made up of different networks hence connectionless and connection oriented services coexist Addressing: In a network each machine has a unique MAC layer address which is used to identify the ES(End System) in the network. In the Internet since it is made up of different types of networksthe format of the PA (Point of Attachment) address will be different hence a new set of addresses are used.

    25. Routing: In an internet the address does not necessarily refer to a machineconnected to the same network. Routers are used to transfer thepackets to other networks and finally to the destination ES.The routers are addressed in exactly the same way as the ES’shence since they are connected to more than one network theyhave an address related to each of the networks they are connected. Quality of Service QoS state the expected delay, protection required, error, cost (in terms of routing) and priority associated with the NSDU.In connection oriented services this is set in advance, with connectionless no such arrangement.This issue to be resolved in an internet.

    26. Maximum Packet Size Maximum packet size in different networks depend on Bit error rate: As the size of the packets are reduced the probability of a packet being in error is also reduced. Transit Delay: The delay for packets are increased with the packet size Buffer storage requirements: The smaller packets require smaller buffers

    27. Flow and congestion control: • Flow control is regulating the flow of packets between the sourceand the destination such that the destination receives them at thesame rate the source sends. • Congestion control deals with controlling the number of packetscirculating in the system such that the total number does notexceed the system resources. • With connection oriented services flow control methods based onwindows is used. • With connectionless services the network layer does not performany flow control, this function is the responsibility of the transport layer

    28. OSI Reference Model

    29. Addressing

    30. Addressing Structure of Internet IP IP addresses consist of a 32-bit number, usually written in dotted-decimal notation. The“decimal” part of the term comes from the fact that each byte (8 bits) of the 32-bit IP addressis shown as its decimal equivalent. The four resulting decimal numbers are written in sequence,with “dots,” or decimal points, separating the number hence the name dotted decimal. Forinstance, 168.1.1.1 is an IP address written in dotted-decimal form; the actual binary version is 10101000 00000001 00000001 00000001. Each decimal number in an IP address is called an octet. The term octet is just a vendorneutralterm for byte. So, for an IP address of 168.1.1.1, the first octet is 168, the secondoctet is 1, and so on. The range of decimal numbers in each octet is etween 0 and 255,inclusive.

    31. ClassBasedAddressing RFC 791 defines the IP protocol, including several different classes of networks. IP definesthree different network classes for addresses used by individual hosts addresses calledunicast IP addresses. These three network classes are called A, B, and C. TCP/IP definesClass D (multicast) addresses and Class E (experimental) addresses as well.

    32. Class A addresses A Class A address used the first eight bits of the bit pattern to identify the network that an address belongs to. Class A addresses began with numbers in the range of 1-126 (0 and 127 are reserved).2^7-2=126 networks, 2^24-2=16.777.214 hosts 32-bit representation of Class A address

    33. Only eight bits of the bit pattern were used to identify the network with a Class A address, and the rest of the pattern was used to identify individual hosts on each network. Few organizations could make efficient use of a Class A address. Approximately half of the available Class A addresses were never assigned, and many of the assigned addresses are being "returned" to be used in the Classless InterDomain Routing (CIDR) scheme.

    34. Class B addresses If the first octet of the network number fell between 128 and 191, the network was said to be a "Class B" network. The first two octets of a Class B address identified the network, and the remaining 16 bits identified individual hosts. The Class B address space accommodated 16,384 (2^14) networks and 65,534 (2^16-2) hosts on each network. 32-bit representation of Class B address

    35. Class C addresses The Class C address space covered addresses beginning with numbers in the range of 192 to 223. A Class C address used 24 bits of the pattern to identify the network and the last eight bits to identify the host. This yielded 2.097.152 (2^21) networks with 254 hosts 32-bit representation of Class C address

    36. Class D and class E addresses Class D addresses didn't identify networks. They identified a special addressing mode called multicast addressing. The range for Class D addresses fell between 224 and 239. Class E addresses were reserved for "future use." They were used experimentally in some cases. Their addresses ranged from 240 to 254. The network number 255 was and still is special. It is used to designate subnet masking and broadcast information, and therefore is not used as a network number.

    37. · Internet Address Authority - addresses for networks which willinterconnect with the global Internet must be unique they are obtained from an Internet Service Provider the ISP obtains network addresses from the Internet Assigned Number Authority (formerly known as the NIC - Network Information Center) which has international authority over all Internet addressing · For a private internet - addresses can be chosen locally by a system administrator · Theoretically address class is chosen based on the number of machines which will be on each network but with nearly all Class A and B addresses assigned, only Class C is availableuntil the internet address space is expanded

    38. Private IP Adresses Some computers will never be connected to the Internet. So, engineers building a networkconsisting of only such computers could use IP addresses that are duplicates of registeredpublic IP addresses in the Internet. So, when designing the IP addressing convention forsuch a network, an organization could pick and use any network number(s) that it wanted,and all would be well. However, using the same IP addresses used by another company is unnecessary in thissituation, because TCP/IP RFC 1918 defines a set of private networks that can be used forinternetworks that do not connect to the Internet.

    39. More importantly, this set of privatenetworks will never be assigned by ICANN to any organization for use as registered publicnetwork numbers. So, when building a private network, like one in a lab, you can usenumbers in a range that is not used by anyone in the public Internet.

    40. Subnetting Sometimes, it's convenient or efficient to break an IP address block into smaller sections. By using smaller sections the router will think of the address block as some set of smaller networks, rather than one large network. It is possible to subdivide one network with 256 addresses in half. We could send half of our traffic along one route, and half along another. In that sense, there are now two networks with 128 hosts each. These miniature address blocks are called "subnetworks" or subnets for short.

    41. For this example: ISP gives our company 199.1.1.0/24 , We have 30 hosts in network-1 and 25 hosts in network-2 , make IP design using first 2 subnets and specify each broadcast and network addresses. 30 or 25 users mean 5 host bits, 3 subnet bits 199.1.1.0 (network address -199.1.1.31 (broadcast address) first subnet with /27 mask 199.1.1.32-199.1.1.63 second subnet with /27 mask …. 199.1.1.224-199.1.1.255 last subnet with /27 mask

    42. For this example: A computer at an office has the IP address 198.108.60.129. In binary, that address looks like this: 11000110 01101100 00111100 10000001 At this office, the internal router must be told how much of that string of numbers identifies the network and how much of that string identifies the host. When a Class C network is not subnetted, the first three octets indicate the network and the last octet indicates the host. With no subnets, and the last eight bits identifying the host, the default subnet mask of 255.255.255.0 is used. In binary, it looks like this: 11111111 11111111 11111111 00000000

    43. The subnet mask tells the router inside the network which of those 32 bits represent the network number and which represent the host number. Then, the router compares the address it was given to the subnet mask. Any bit set to 1 in the subnet mask allows the bits in the network address to "fall through" the mask. Any bit set to zero in the subnet mask blocks the number from appearing in the network address. 11000110 01101100 00111100 10000001 (198.108.60.129) 11111111 11111111 11111111 00000000 (255.255.255.0) 11000110 01101100 00111100 10000001 (198.108.60.129) One network is identified and the address above identifies host number 129 on that network.

    44. Two subnets Suppose, the network is divided into two subnets. Two subnets allow us a choice of two paths for the data to travel. Each of those paths can hold a maximum of 128 hosts. The router must be told to split traffic along two paths. Therefore, a different subnet mask must be used than we used in the example above. To divide our Class C network into two pieces, a subnet mask that looks like this is used: 11111111 11111111 11111111 10000000 The 25th bit is now allowed to "fall through" the subnet mask and it determines whether a host is on Network 0 or Network 1.

    45. 11000110 01101100 00111100 10000001 (198.108.60.129) 11111111 11111111 11111111 10000000 (255.255.255.128) 11000110 01101100 00111100 10000001 (198.108.60.129) The host is either on Network 0 or Network 1. By looking at the range of addresses, see that Network 0 supports the addresses from 0-127 and Network 1 supports the host addresses from 128-255. (Remember that each subnet has 128 hosts apiece.)