1 / 49

Introduction to Networking

Introduction to Networking. Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia. Computer Networks. What is Networking?.

xyla-cantu
Download Presentation

Introduction to Networking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia Computer Networks

  2. What is Networking? • When you use a computer not connected to a network, you are working in what is called a stand-alone environment. • Computers connected over a network can make that information exchange easier and faster. The information moves directly from computer to computer rather than through a human intermediary. People can concentrate on getting their work done rather than on moving information around the company

  3. LAN • A local area network (LAN) is a number of computers connected to each other by cable in a single location, usually a single floor of a building or all the computers in a small company. • While local area networks are perfect for sharing resources within a building or campus, they cannot be used to connect distant sites.

  4. WANs • Stated simply, wide area networks are the set of connecting links between local area networks. These links are made over telephone lines leased from the various telephone companies. WANs can be created with satellite links, packet radio, or microwave transceivers. These options are generally far more expensive than leased telephone lines.

  5. WANs • A WAN, spans a larger area, often a country or continent. It contains a collection of machines (call these hosts) intended for running user (i.e. ,application) programs. The hosts are connected by a communication subnet, or just subnet for short. The job of the subnet is to carry messages from host to host, • In most WANs, the subnet consists of two distinct components: transmission lines and switching elements. Transmission lines (also called circuits, channels, or trunks) move bits between machines.

  6. Limitation of WAN • WANs suffer from extremely limited bandwidth. The fastest commercially feasible wide area data links are many times slower than the slowest local area links. This makes the sharing of resources over a WAN difficult. Generally, WAN links are used only for interprocess communications to route short messages, such as e-mail or HTML (World Wide Web) traffic.

  7. Advantages of Networking • Sharing Information • Sharing Hardware Resources • Sharing Software Resources • Preserving Information • Protecting Information

  8. Sharing Hardware Resources • Networked computers can also share • Fax modems • Floppy drives • CD-ROMs • Tape backup units • Plotters • Scanners • Hard disks • Almost any other device that can be attached to the computer.

  9. Sharing Hardware Resources • You can attach some peripherals directly to the network; they do not need to be attached to a computer to be shared on the network.

  10. Clients, Servers, and Peers • There are three roles for computer in a local area network: • Clients, which we use but do not provide network resources • Peers, which both use and provide network resources • Servers, which provide network resources.

  11. Advantages of Server-Based Networks • Strong central security • Central file storage, which allows all users to work from the same set of data and provides easy backup of critical data • Ability of servers to pool available hardware and software, lowering overall costs

  12. Advantages of Server-Based Networks • Ability to share expensive equipment, such as laser printers • Easy manageability of a large number of users • Central organization, which keeps data from getting lost among computers

  13. Disadvantages of Server-Based Networks • Expensive dedicated hardware • Expensive network operating system software and client licenses. • A dedicated network administrator (usually required)

  14. Protocol Hierarchies • To reduce their design complexity, most networks are organized as a series of layers or levels, each one built upon the below it. The purpose of each layer is to offer certain services to the higher layers, shielding those layers from the details of how the offered services to the higher layers from the details of how the offered services are actually implemented.

  15. Protocol Hierarchies • Layer n on one machine carries on a conversation with layer n on another machine. The rules and conventions used in this conversation are collectively known as the layer n protocol. Basically, a protocol is an agreement between the communicating parties on how communication is to proceed.

  16. Protocol Hierarchies • In reality, no data are directly transferred from layer n on one machine to layer n on another machine. Instead, each layer passes data and control information to the layer immediately below it, until the lowest layer is reached. Below layer 1 is the physical medium through which actual communication occurs.

  17. Design Issues for the Layers • Rules for the data transfer • Error control • Preserve the order of messages sent on them. • How to keep a fast sender from swamping a slow receiver with data. • Inability of all processes to accept arbitrarily long messages. • When there are multiple paths between source and destination, a route must be chosen.

  18. Connection-less/Connection-Oriented Protocols • There are two ways that communications between computers can be arranged: Connectionless and connection oriented. • Connectionless systems optimistically assume that all data will get through, so there’s no protocol overhead for guaranteed delivery or sequential packet ordering. This makes them fast..

  19. Connection-less/Connection-Oriented Protocols • Connection-oriented systems pessimistically presume that some data will be lost or disordered in most transmissions. Connection oriented protocols guarantee that transmitted data will reach its destination. Transmission Control Protocol (TCP/IP) is an example of a connection-oriented internet protocol.

  20. Connectionless versus Connection-Oriented Protocols • All is not lost for connectionless transports, however, since higher level protocols will know what data has not reached its destination after some time and request retransmission. The higher level protocol must sort out the data packets.

  21. Interfaces & Services • The function of each layer is to provide services to the layer above it. • The active elements in each layer are called entities. An entity can be a software entity (such as a process) or a hardware entity (such as an intelligent I/O chip). • Entities on the same layer in different machines are called peer entities. • The entities in layer n implement a service used by layern+1.

  22. Differences between Services and Protocols • A service is a set of primitives (operations) that a layer provides to the layer above it. Defines what operations the layer is prepared to perform on behalf of its users, says nothing at all about how these operations are implemented.

  23. Differences between Services and Protocols • A protocol, in contrast, is a set of rules governing the format and meaning of the frames, packets, or messages that are exchanged by the peer entities within a layer. Entities use protocols in order to implement their service definitions. • A protocol relates to the implementation of the service and as such is not visible to the user of the services.

  24. The OSI Model • The International Organization for Standardization (ISO) began developing the OSI reference model in 1977. It has since become the most widely accepted model for understanding network communication. • This model is based on a proposal developed by the International Standards Organization (ISO). The model is called the ISO OSI (Open Systems Interconnect) Reference Model.

  25. The OSI Model • The OSI model itself is not a network architecture because it does not specify the exacts services and protocols to be used in each layer. It just tells what each layer should do.

  26. The OSI Model (contd.) • The OSI model consists of 7 layers: • Application • Presentation • Session • Transport • Network • Data Link • Physical

  27. Application Presentation Application Presentation Session Session Transport Transport Network Network Data link Data link Physical Physical A message sent from one peer layer to another UNIX MACINTOSH

  28. DOS Macintosh Original data Original data Application Original data Presentation Original data Hp Hp Hs Hs Original data Original data Session Ht Ht Original data Original data Transport Original data Original data Hn Hn Network Original data Data link Original data Hd Hd Original data Physical Original data Hp -Presentation header Ht =Transport header Hs =Session header Hn =Network header Hd =Data Link header The OSI model and headers

  29. Physical Layer • The Physical Layer is simply responsible for sending bits from one computer to the another. The Physical Layer is not concerned with the meaning of the bits. • This level defines physical and electrical details, such as what will represent a 1 or a 0, how many pins a network connector will have, how data will be synchronized, and when the network adapter may or may not transmit the data.

  30. Physical Layer • The following items are addressed at the physical layer • Network connection types, including multipoint and point-to-point connections. • Physical topologies, which are physical layouts of networks, such as bus, star or ring

  31. Bus Topology

  32. True Mesh

  33. Hybrid Mesh

  34. . Hub Hub Hub Hub Hub Hybrid Star

  35. Ring topology

  36. Physical Layer • Analog and digital signaling, which include several methods for encoding data in a analog and digital signals. • Bit synchronization, which deals with synchronization between sender and receiver. • Baseband and Broadband transmissions, which are different methods for using media bandwidth.

  37. Data Link Layer • The data link layer provides for the flow of data over a single link from one device to another. It accepts packets from the network layer and packages the information into data units called frames to be presented to the physical layer for transmission.

  38. Data Link Layer • A Cyclic Redundancy Check (CRC) added to the data frame can detect damaged frames, and the data link layer in the receiving computer can request that the information be present. The data link layer can also detect when frames are lost and request that those frames be sent again.

  39. Data Link Layer • A data frame that’s all packaged and ready to go follows this format: • The start indicator • The source address • The destination address • The control portion: like special handling instructions • The actual data • The error control segment or the CRC

  40. Data Link Layer • Bridges, intelligent hubs, and network interface cards are devices typically associated with the data link layer. • Two sub-layers make up the data link layer: • Media Access Control (MAC) • Logical Link Control (LLC)

  41. Network Layer • The network layer makes routing decisions and forwards packets for devices that are farther away than a single link. (A link connects two network devices and is implemented by the data link layer.

  42. Network Layer • The network layer translates logical network addresses into physical machine addresses (the numbers used as destination IDs in the physical network cards). This layer also determines the quality of service (such as the priority of the message) and the route a message will take if there are several ways a message can get to its destination.

  43. Network Layer • It also may break large packets into smaller chunks if the packet is larger than the largest data frame the data link layer will accept. The network reassembles the chunks into packets at the receiving end. • Routers and gateways operate in the network layer.

  44. Network Layer (contd.) • The network layer serves to support communications between logically separate networks. This layer is concerned with the following. • Addressing, including logical network addresses and service addresses • Circuit, message, and packet switching • Route discovery and route selection • Connection services, including network layer flow control, network layer error control, and packet sequence control. • Gateway services.

  45. Transport Layer • The transport layer ensures that packets are delivered error free, in sequence, and with no losses or duplications. The transport layer breaks large messages from the session layer (which we’ll look at next) into packets to be sent to the destination computer and reassembles packets into messages to be presented to the session layer in the destination layer.

  46. Session Layer • The session layer allows application on separate computers to share a connection called a session. This layer provides services such as name lookup and security to allow two programs to find each other and establish the communications link. • The session layer also provides for data synchronization and checkpointing so that in the event of a network failure, only the data sent after the point of failure need be resent.

  47. Presentation Layer • Unlike all the lower layers, which are just interested in moving bits reliably from here to there. • The presentation layer translates data between the formats the network requires and the formats the computer excepts. This layer does protocol conversion, data translation, compression and encryption, character set conversion, and the interpretation of graphics commands.

  48. Application Layer • It provides services that directly support user application, such as database access, e-mail, and file transfers. It also allows applications to communicate with applications on other computers as though they were on the same computer.

  49. Summary • Overview of Networking • WANS, LANs, MANs, etc. • The ISO OSI Model • Some networking topologies • Networking in the Kingdom

More Related