1 / 132

Fundamentals of Computer Networks

Fundamentals of Computer Networks. Book. Andrew S. Tanenbaum , “Computer Networks”. What is a Network?. A computer network, is a collection of computers and other hardware interconnected by communication channels that allow sharing of resources and information. Uses of Computer Networks.

rona
Download Presentation

Fundamentals of Computer Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Fundamentals of Computer Networks

  2. Book Andrew S. Tanenbaum, “Computer Networks”

  3. What is a Network? A computer network, is a collection of computers and other hardware interconnected by communication channels that allow sharing ofresources and information.

  4. Uses of Computer Networks • BusinessApplications • Issue: ResourceSharing • Goal: Make all programs,equipment, and especiallydata available to anyone on the network without regard to the physical location of theresource and the user • Example: A group of office workers can share a common printer • Sharinginformation is moreimportantthansharingphysical resources such as printers

  5. Uses of Computer Networks • HomeApplications • Access to remote information. • Person-to-personcommunication. • Interactiveentertainment. • Electroniccommerce.

  6. Uses of Computer Networks • Mobile Users • NotebookComputers • PersonalDigitalAssistants • SmartPhones

  7. Network Hardware • There are two types of transmission technology that are in widespread use • Broadcast links: Short messages, called packets in certain contexts, sent by any machine are received by all the others. If the packet is intended for the receiving machine, that machine processes the packet. • Point-to-pointlinks: Togofrom the source to the destination, a packet on this type of network may have to first visit one or moreintermediatemachines.

  8. Network Hardware Classification of interconnected processors by scale:

  9. Local Area Network (LAN) • LANs, are privately-owned networks within a single building or campus ofup to a few kilometers in size. • LANsaredistinguished from other kinds of networks by three characteristics: • Size (Restricted in Size) • TransmissionTechnology (Cables) • Their topology

  10. Lan Topologies Bus Ring

  11. Bus Network • In a bus network, at any instant at most one machine is the master and is allowed to transmit.All other machines arerequired to refrain from sending. • An arbitration mechanism is needed to resolve conflicts when two or moremachines want to transmit simultaneously. • IEEE 802.3, popularly called Ethernetis a bus-based broadcast network. • Computers on an Ethernet can transmit whenever they want to; if twoor more packets collide, each computer just waits a random time and tries again later.

  12. Ring Network • Each bit circumnavigates the entire ring in the time it takes totransmit a few bits, often before the complete packet has even been transmitted. • As with all other broadcastsystems, some rule is needed for arbitrating simultaneous accesses to the ring. • IEEE 802.5 (the IBM token ring), is a ring-based LAN.

  13. Static & Dynamic Networks • Dependingon how the channel is allocatednetworks can be further divided into static and dynamic. • Staticallocation would be to divide time into discrete intervals and use a round-robin algorithm, allowingeach machine to broadcast only when its time slot comes up. • Dynamic allocation methods for a common channel are either centralized or decentralized. • Inthecentralizedchannel allocation method, there is a single entity, for example, a bus arbitration unit, which determines whogoesnext. • Inthedecentralizedchannelallocationmethod, each machine must decide for itselfwhethertotransmit.

  14. Metropolitan Area Networks (MAN)

  15. Wide Area Networks (WAN) • A WAN, spans a large geographical area, often a country or continent. • It contains acollection of machines (hosts)intended for running user programs.

  16. Wide Area Networks (WAN) • The hosts are connected by a communication subnet, or just subnet for short. • Thehosts are owned by the customers (e.g., people's personal computers), whereas the communication subnet istypically owned and operated by a telephone company or Internet service provider. • The job of the subnet is tocarry messages from host to host, just as the telephone system carries words from speaker to listener.

  17. Wide Area Networks (WAN) • In most wide area networks, the subnet consists of two distinct components • TransmissionLines • Switching Elements. • Transmission lines move bits between machines. • Switching elements are specialized computers that connect three or more transmission lines.

  18. Routing

  19. Wireless Networks • Wireless networks can be divided into three main categories: • System interconnection (short-rangeradio) • Wireless LANs. • Wireless WANs.

  20. Home Networks • Home networking is on the horizon. • The fundamental idea is that in the future most homes will be set up fornetworking. • Every device in the home will be capable of communicating with every other device, and all of themwill be accessible over the Internet.

  21. Internetworks • Many networks exist in the world, often with different hardware and software. • People connected to one networkoften want to communicate with people attached to a different one. • The fulfillment of this desire requires thatdifferent, and frequently incompatible networks, be connected, sometimes by means of machines calledgateways to make the connection and provide the necessary translation. • A collection of interconnected networks is called an internetwork or internet.

  22. Network Software – Protocol Hierarchies • To reduce their design complexity, most networks are organized as a stack of layers. • Each layer is a kind of virtual machine, offering certain services to the layer above it. • Layer n on one machine carries on a conversation with layer n on another machine. The rules and conventionsused in this conversation are collectively known as the layer n protocol. • Basically, a protocol is an agreementbetween the communicating parties on how communication is to proceed.

  23. Network Software – Protocol Hierarchies

  24. Network Software – Protocol Hierarchies

  25. Network Software – Protocol Hierarchies

  26. Connection-Oriented and ConnectionlessServices • To use a connection-oriented network service, the service userfirst establishes a connection, uses the connection, and then releases the connection. • Connectionlessservice is modeled after the postal system. Each message carries the fulldestination address, and each one is routed through the system independent of all the others.

  27. Connection-Oriented and ConnectionlessServices

  28. Service Primitives (Operations)

  29. Reference Models • OSI reference model • Protocols associated with the OSI model are rarely used • The model itself is actually quite general and still valid • TCP/IP reference model • The model itself is not of much use • The protocols are widely used

  30. OSI Reference Model • Developed by the International Standards Organization (ISO) • The model is called the ISO OSI (Open Systems Interconnection) Reference Model

  31. OSI Reference Model • A layer should be created where a different abstraction is needed. • Each layer should perform a well-defined function. • The function of each layer should be chosen with an eye toward defining internationally standardized protocols. • The layer boundaries should be chosen to minimize the information flow across the interfaces. • The number of layers should be large enough that distinct functions need not be thrown together in the same layer out of necessity and small enough that the architecture does not become unwieldy.

  32. OSI Reference Model • OSI model itself is not a network architecture because it does not specify the exact services and protocols to be used in each layer. • ISO has also produced standards for all the layers,although these are not part of the reference model itself.

  33. The Physical Layer • Task: Transmitting raw bits over a communication channel. • Making sure that when one side sends a 1 bit, it is received by the other side as a 1 bit, not as a 0 bit • How many volts should be used to represent a 1 and how many for a 0 • How many nanoseconds a bit lasts

  34. The Data Link Layer • Task: To transform a raw transmission facility into a line that appears free of undetected transmission errors to the network layer. • Input data is divided into data frames (typically a few hundred or a few thousand bytes) and these frames are transmitted sequentially • How to keep a fast transmitter from drowning a slow receiver in data

  35. The Network Layer • Task: The network layer controls the operation of the subnet. • How packets are routed from source to destination • The quality of service provided is a network layer issue • In broadcast networks, the routing problem is simple, so the network layer is often thin or even nonexistent!

  36. The Transport Layer • Task: Accept data from above, split it up into smaller units if need be, pass these to the network layer, and ensure that the pieces all arrive correctly at the other end. • Determines what type of service to provide to the session layer • The transport layer is a true end-to-end layer. • A program on the source machine carries on a conversation with a similar program on the destination machine, using the message headers and control messages. • In the lower layers, the protocols are between each machine and its immediate neighbors, and not between the ultimate source and destination machines

  37. TheSession Layer • Task: allows users on different machines to establish sessions between them. • Keeping track of whose turn it is to transmit • Preventing two parties from attempting the same critical operation at the same time

  38. The Presentation Layer • Task: Presentation layer is concerned with the syntax and semantics of the information transmitted • Allows higher-level data structures to be defined and exchanged.

  39. TheApplication Layer • HTTP (Hypertext Transfer Protocol) • File transfer, • Electronic Mail

  40. The TCP/IP Reference Model • Goals • Network must be able to survive loss of subnet hardware, with existing conversations not being broken off • A flexible architecture was needed since applications with divergent requirements were envisioned (Transferring files, realtime speech transmission)

  41. The TCP/IP Reference Model

  42. TCP/IP The Internet Layer • Permit hosts to inject packets into any network and have them travel independently to the destination (potentially • Packets may arrive in a different order than they were sent, in which case it is the job of higher layers to rearrange them, if in-order delivery is desired.

  43. TCP/IP The Transport Layer • TCP (Transmission Control Protocol) • Allows a byte stream originating on one machine to be delivered without error on any other machine in the internet • Handles flow control to make sure a fast sender cannot swamp a slow receiver with more messages than it can handle. • UDP (User Datagram Protocol) • A protocol for applications that do not want TCP's sequencing or flow control and wish to provide their own

  44. Protocols in the TCP/IP model

  45. TCP/IP Application Layer • TELNET (Virtual Terminal) • FTP (File Transfer Protocol) • SMTP (Simple Mail Transfer Protocol) • DNS (Domain Name System) • HTTP (Hypertext Transfer Protocol)

  46. TheHybrid Reference Model

  47. The Theoretical Basis: Fourier Analysis Any reasonably behaved periodic function, g(t) with period T can be constructed as the sum of a (possibly infinite) number of sines and cosines

  48. Transmission of ‘b’ • The example of the transmission of the ASCII character ''b'' encoded in an 8-bit byte. • The bit pattern that is to be transmitted is 01100010.

  49. Transmission of ‘b’

  50. Bandwidth • No transmission facility can transmit signals without losing some power in the process. • If all the Fouriercomponents were equally diminished, the resulting signal would be reduced in amplitude but not distorted. • Unfortunately, all transmission facilities diminishdifferent Fourier components by different amounts, thus introducing distortion. • Usually, the amplitudes aretransmitted undiminished from 0 up to some frequency fc with allfrequencies above this cutoff frequency attenuated. • The range of frequencies transmitted without being stronglyattenuated is called the bandwidth. • In practice, the cutoff is not really sharp.

More Related