Communications and Computer Networks
|
|
- Kellie Lewis
- 5 years ago
- Views:
Transcription
1 SFWR 4C03: Computer Networks and Computer Security January Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the exchange of data between two parties. An example is the exchange of voice signals between two telephones on the same network. It is often impractical for two communicating devices to be directly, point-to-point connected. This is for one (or both) of the following contingencies: 1. The devices are very far apart, and hence cannot share a dedicated link. 2. There is a set of devices, each of which requires a link to many of the others at various times. The solution to this problem is to attach each device to a communication network. The two categories into which communication networks are classified: local area networks (LANs) and wide area networks (WANs). Wide Area Networks Wide area networks generally cover a large geographical area, typically multiple cities, countries, or continents. Typically, a WAN consists of a number of interconnected switching nodes called routers. A transmission from any device is routed through these internal nodes to the specified destination device. These switching nodes are not concerned with the content of the data; rather, their purpose is to provide a switching facility that will move the data from node to node until they reach their destination. The switching employed is usually: 1. Circuit Switching: In a circuit switching network, a dedicated communications path is established between two stations through the nodes of the network. Data generated by the source station are transmitted along the dedicated path as rapidly as possible. Since the path is already established a priori there is no delay involved. The most common example of circuit switching is the telephone network. Disadvantages are the cost involved; for example one pays a fixed rate for a phone call even when the two parties do not talk. 2. Packet Switching: Data is sent out in a sequence of small chunks called packets. Each packet is passed through the network from node to node along some path leading from source to destination. At each switching 1-3-1
2 node, the entire packet is received, stored briefly in a queue, and then transmitted to the next node. This is commonly used in computer to computer communications. An example of packet switching is the postal network. Whenever the network becomes overloaded, computers using the network must wait before they can send additional packets. However since multiple computers can share the network bandwidth, fewer connections are required and the cost is kept low. Usually, WANs range from 1.5 Mbps to 155 Mbps (where Mbps is million bits per second). Examples of WAN technologies are: ARPANET (Section 2.7 of Comer [1]), X.25 (Section of Comer [1]), Frame Relay, ISDN (Integrated Services Digital Network), ATM (Asynchronous Transfer Mode) (Section 2.6 of Comer [1]). Local Area Networks The scope of the LAN is small, typically a single building or a cluster of buildings. It is also usually the case that the LAN is owned by the same organization that owns the communicating computers. The difference in geographic scope of LANs leads to technologies that are different from those of WANs. Traditionally, LANs make use of a broadcast network approach rather than a switching network. With a broadcast communication network, there are no intermediate switching nodes. There is a Network Interface Card (NIC) that connects a computer directly to the network (medium) shared by other stations. A transmission from any one station is broadcast to and received by all other stations. Data is usually transmitted in packets. Because the medium is shared, only one station can transmit a packet at a time. The internal data rates for LANs are typically much greater than those of WANs. Typically, this number is 10 Mbps to 2 Gbps (where Gbps is billion bits per second). Examples of LAN technologies include: Ethernet (IEEE 802.3) (Section 2.4 of Comer [1]), FDDI (token ring passing LAN) (Section 2.5 of Comer [1]). Internetworking concept, protocols and architecture The primary goal of internetworking is a system that hides the details of the underlying network hardware while providing universal communication services. There are two approaches to hiding network details. 1. Application-Level Interconnection: In such systems, an application program executing on each computer in the network understands the details of the network connections, and interoperates across those connections with application programs on other computers. Take for instance an electronic mail system, where an application mail program is configured to forward a message to another mail program on another computer. The path from source to destination may involve many different networks, but this does not matter as long as the mail systems on the various computers cooperate by forwarding the message. This, however, leads to cumbersome communication for the following reasons: 1-3-2
3 Adding new functionality to the system means building a new application program for each computer. Adding new network hardware means modifying existing application programs on the computer. Finally, each application program on the computer would need to understand the network connections for the computer, resulting in duplication of code. 2. Network-Level Interconnection: A network-level interconnection provides a mechanism that delivers small packets of data from the original source to destination without using intermediate application programs. This separates the data communication duties from application programs, and exisiting network technologies can be modified, while the application programs on computers remain unchanged. The key to designing universal network-level interconnection is the concept of internetworking. The idea is to detach the notions of communication from the details of network technologies and hide low-level details from the user. Thus, instead of a single module for performing communications, there is a structured layer of modules that implements the communication function. Each module/layer in a computer communicates with its peer module/layer on another computer via a set of protocols, which may defined as set of rules governing the exchange of data between two entities. The layers and protocols together define the network architecture. For example an English philosopher and a French philosopher wish to communicate, but neither speaks the others language. Furthermore, neither has on hand a translator that can translate to the language of the other. However, both philosophers have Dutch translators on their staffs. Each translator has a secretary, who communicates with other translator s secretary via fax. Let us suppose the English translator has a message for his French counterpart, and his message in English reads I like rabbits. The philosopher conveys this message to his translator, who translates the message into Dutch which reads Ik Hou Van Konijnen. The translator also adds a header to this message for his counterpart, which indicates that the language employed is Dutch. The translator gives his information to the secretary who adds the fax number to the message and faxes this information to her counterpart. The other secretary on receipt of this message, removes the fax number from the message, and passes on the remaining information to the French translator who, in turn, translates the Dutch message into an equivalent French message that reads J aime les lapins. He passes this message to the French philosopher. Here, both the soure and the destination have three layers of communication. Layers 1,2 and 3 represent the secretaries, translators, and philosophers respectively. The protocol employed between the peer to peer translator layers is the Dutch language, while fax is the protocol employed by the secretary layers. Now suppose that no Dutch translators are available, but each philosopher has instead Hindi translators on their staffs. The communication between the two philosophers will still take place, and the only change is that layer 2 represents Hindi translators with the peer to peer protocol being the Hindi language. Furthermore, this change does not affect the philosopher and secretary layers. In very general terms communications involve three agents: applications, computers, and networks. One example of an application is a file transfer (ftp) 1-3-3
4 operation. These applications execute on computers, that can often support multiple simultaneous applications. Computers, in turn, are connected to networks, and the data to be exchanged are transferred by the network from one computer to another. With these three agents in mind, it is natural to organize the communication task into three relatively independent layers. 1. Network Access layer: This layer is concerned with the exchange of data between a computer and the network to which it is attached. The sending computer must provide the network with the address of the destination computer, so that the network will route the data to the appropriate destination. The sending computer may also wish to invoke certain services, such as priority, that might be provided by the network. The specific software employed at this layer depends on the type of network used, and different standards developed for circuit/packet switching etc. Thus, the layers above the network access layer need not be concerned about the specifics of the network to be used. Thus, two computers attached to different physical networks can now communicate. 2. Transport layer: Regardless of the nature of the applications that are exchanging data (ftp, elm), there is usually a requirement that data be exchanged reliably. Thus, it makes sense to collect those mechanisms in a common layer called the transport layer. 3. Application layer: The application layer contains the logic needed to support various user applications. For each different type of application, a separate module is needed that is characteristic to that application. Moreover, these three layers communicate with their peers on another computer via a set of protocols analogous to the communication between the two philosophers mentioned above. These protocols require the exchange of various control information, including the network address of the destination computer, and an address that is specific to the particular application (The latter addresses are called service access points (SAPs) or ports). Suppose an application, associated with SAP 1 on computer X wishes to send a message to another application associated with SAP 2 on computer Y. The application at X hands the message to its transport layer. The transport layer may break this block into smaller pieces to make it more manageable. To each of these pieces, the transport layer appends a transport header containing protocol control information. This process is known as encapsulation, and the combination of data from the next higher layer and control information is known as a protocol data unit (PDU); in this case it is referred to as a transport PDU. For example, the header may contain the following information: 1. Destination SAP: When the destination transport layer receives the transport PDU it must know to whom the data is to be delivered. 2. Sequence Number: Because the transport protocol is sending a sequence of PDUs, it numbers them sequentially so that if they arrive out of order, the destination transport layer may reorder them. 3. Error-detection code: The sending transport layer may also include a code that is a function of the contents of the data portion of the PDU. The receiving transport layer protocol performs the same calculation. If there is a discrepancy, the receiver can discard the PDU and take corrective action
5 The transport layer hands each PDU to the network access layer. This layer appends further control information to the transport PDU (which is regarded as the data portion) creating a network access PDU. For example, the header may contain the following information: 1. Destination computer address: The network must know to which computer the data must be delivered. 2. Facilities requests: The network access protocol might want to make use of certain network facilities, such as priority. The network access layer is not concerned with the details of the transport header, such as the destination SAP address for instance. The network accepts the network PDU from computer X and delivers it to computer Y. The network access module in Y receives the PDU, strips off the header, and transfers the enclosed transport PDU to the transport layer module. The transport layer examines the transport PDU header, and, on the basis of the SAP field delivers the enclosed record to the appropriate application, in this case the file transfer module in computer Y. Common protocol architectures Two protocol architectures have served the basis for the development of communication standards: 1. The TCP/IP protocol suite. 2. The OSI reference model. We provide a brief overview of these two architectures in this section. Finally, we highlight the important differences between these two models. The TCP/IP protocol suite TCP/IP is the result of protocol research and development conducted on the experimental packet-switched network, ARPANET, funded by the Defense Advanced Research Projects Agency (DARPA), and is generally referred to the TCP/IP protocol suite. The communication task in TCP/IP is organized into five relatively independent layers: 1. Physical Layer: The physical layer is the network hardware layer, and is concerned with the characteristics of the transmission medium, the nature of the signals, data rate, and related matters. 2. Network Interface Layer: This is the lowest software layer, responsible for accepting IP datagrams, and transmitting them over a specific network in frames. 3. Internet Layer: The internet layer handles communication from one machine to another. It accepts a request to send a packet from the transport layer along with an identification of the machine to which the packet is to be sent. It encapsulates the packet in an IP datagram, uses a routing algorithm to determine whether to deliver the datagram directly or send 1-3-5
6 it to a router, and passes the datagram to the network interface layer for transmission. It also receives datagrams, checks their validity, and uses a routing algorithm to decide whether the datagram is to be processed locally or sent to another router. For datagrams addressed to the local machine, the internet layer deletes the datagram header and delivers the packet information to the appropriate transport layer. The internet layer adopts the internet protocol (IP) (the IP in TCP/IP). The aim of the internet layer is to provide best-effort delivery. It does not attempt to correct errors, although it sends ICMP (Internet Control Message Protocols) error and control messages as needed. 4. Transport Layer: It s primary duty is to provide communication between the application program on the source computer with that on the destination computer. It divides the stream of data being transmitted by the application program into small packets, and passes each packet along with a destination computer address to the internet layer for transmission. It also provides reliable transport at the receiving end ensuring that the data arrives without error and in sequence. 5. Application Layer: This contains the necessary logic for a particular application. The application layer interacts with the transport layer to send and receive data. The application and transport layers are called end-to-end, since they are only implemented on the source and the destination computers. A router, for instance, need not have a transport and an application layer. Typically, the transport, internet and network interface layers are implemented in software, and in the operating system of the computer. The application layer is a software layer that resides in the user disc space. Common examples of TCP/IP protocols include: 1. Application Layer: Telnet, FTP, etc. 2. Transport Layer: TCP (Transmission Control Protocol), UDP (User Datagram Protocol). 3. Internet Layer: IP (Internet Protocol), ICMP (Internet Control Message Protocol), IGMP (Internet Group Management Protocol). 4. Network Interface Layer: Device driver and interface card. The OSI reference model The OSI (Open Systems Interconnection) proposed a standard known as the OSI reference model. It contains 7 conceptual layers organized as follows: 1. Physical Hardware Connection. 2. Data Link Layer. 3. Network Layer. 4. Transport Layer. 5. Session Layer
7 6. Presentation Layer. 7. Application Layer. The OSI reference model was designed as a framework for developing protocol standards. The designers of OSI assumed that this model and the protocols developed within this model would dominate computer communications, eventually replacing rival multivendor models such as TCP/IP. However this has not happened. It is the TCP/IP architecture that has come to dominate. Thus, our emphasis in this course will be on TCP/IP. The book by Tanenbaum [3] is a good introduction to the OSI 7 layer model. Differences between TCP/IP and OSI models There are two subtle and important differences between the TCP/IP layering and the OSI reference model. This section will provide a brief overview of the essential differences; more details can be found in Section 11.6 of Comer [1]. 1. Link-Level vs. End-To-End Reliability: In the OSI model protocol software detects and handles errors at all layers. In contrast to such a scheme, TCP/IP assumes that reliability is an end-to-end problem. There is little or no reliability in most TCP/IP network interface software; rather this is the duty of the transport layer. The resulting freedom from interface layer verification makes TCP/IP software much easier to understand and implement correctly. 2. Locus of Intelligence and Decision Making: The OSI layer model assumes that the network is a utility that provides transport service. The network vendor also handles problems like routing, flow control, and acknowledgments, internally, making transfers reliable. In short, the network is a complex independent system to which one may attach relatively simple computers; the hosts themselves participate minimally in the network operation. In contrast, TCP/IP requires hosts to participate in almost all the network protocols, such as end-to-end error detection and recovery. Thus, a TCP/IP internet can be viewed as a simple packet delivery system to which intelligent hosts attach. Suggested Readings 1. Chapters 2,3 and 11 of Comer [1]. 2. Chapters 1 and 2 of Stallings [2]. 3. Chapter 1 of Tanenbaum [3]. References [1] D.E. Comer, Internetworking with TCP/IP: Principles, Protocols, and Architectures, 4th edition, Prentice Hall, NJ, [2] W. Stallings,, Data & Computer Communications, 6th edition, Prentice Hall, NJ, [3] A. Tanenbaum, Computer Networks, Prentice Hall, NJ,
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
CSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
PART OF THE PICTURE: The TCP/IP Communications Architecture
PART OF THE PICTURE: The / Communications Architecture 1 PART OF THE PICTURE: The / Communications Architecture BY WILLIAM STALLINGS The key to the success of distributed applications is that all the terminals
Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
Protocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
Computer Networks Vs. Distributed Systems
Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require
Protocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
Data Communication Networks and Converged Networks
Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous
Computer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
Chapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
Protocol Architecture
Protocol Architecture ed Protocol Architectures OSI Reference Model TCP/IP Protocol Stack Need for Protocols The task of exchanging information between devices requires a high degree of cooperation between
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
Module 1. Introduction. Version 2 CSE IIT, Kharagpur
Module 1 Introduction Lesson 2 Layered Network Architecture Specific Functional Objectives On Completion of this lesson, the students will be able to: State the requirement for layered approach Explain
Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
Computer Networks III
Computer Networks III Wide Area Networks and Packet Switching Network Protocols and the OSI Layers The Internet Internet Infrastructure 1 Wide Area Networks (recap) 2 Page 1 Basic WAN structure Host Router
Introduction to computer networks and Cloud Computing
Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
Data Link Protocols. TCP/IP Suite and OSI Reference Model
Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite
Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2
Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation
A PPENDIX L TCP/IP and OSI
A PPENDIX L TCP/IP and OSI William Stallings Copyright 2010 L.1 PROTOCOLS AND PROTOCOL ARCHITECTURES...2! L.2 THE TCP/IP PROTOCOL ARCHITECTURE...5! TCP/IP Layers...5! TCP and UDP...7! Operation of TCP/IP...7!
ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
Computer Networks - Xarxes de Computadors
Computer Networks - Xarxes de Computadors Teacher: Llorenç Cerdà Slides: http://studies.ac.upc.edu/fib/grau/xc Outline Course Syllabus Unit 2. IP Networks Unit 3. TCP Unit 4. LANs Unit 5. Network applications
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Objectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
Chapter 1: Introduction
Chapter 1: Introduction Professor of CIS Columbus, OH 43210 Jain@cse.ohio-state.edu http://www.cse.ohio-state.edu/~jain/cis677-98/ 1B-1 Data Communication vs Networking q Communication: Two Nodes. Mostly
WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com
WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided
ELEC3030 Computer Networks
ELEC3030 Computer Networks Professor Sheng Chen: Building 86, Room 1021 E-mail: sqc@ecs.soton.ac.uk Download lecture slides from: http://www.ecs.soton.ac.uk/ sqc/el336/ or get them from Course Office (ECS
Communication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Network Architectures Protocol Layering Network architecture concept A network architecture is an abstract model used to describe
Data Communications and Networking Overview
Data Communications and Networking Overview Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 2-1
Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)
Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Networks II Agenda Introduction to networking architecture Historical
Overview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
CPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.
Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point
What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.
What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir noubir@ccs.neu.edu CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms
Data Communication and Computer Network
1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X
Computer Networks: LANs, WANs The Internet
1 Computer Networks: LANs, WANs The Internet Required reading: Garcia 1.1 and 1.2 CSE 3213, Fall 2010 Instructor: N. Vlajic History of Computers 2 Computer a machine that manipulates data according to
Architecture and Performance of the Internet
SC250 Computer Networking I Architecture and Performance of the Internet Prof. Matthias Grossglauser School of Computer and Communication Sciences EPFL http://lcawww.epfl.ch 1 Today's Objectives Understanding
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Zarządzanie sieciami telekomunikacyjnymi
What Is an Internetwork? An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry,
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
Communication Systems Internetworking (Bridges & Co)
Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: wolf@ibr.cs.tu-bs.de
Data Communication Networks
Data Communication Networks Data communication networks typically do not send real time data As a result, packet switching is often used OPTI 500, Spring 2011, Lecture 6, Data Networks 1 Packet Switching
IST 220 Exam 3 Notes Prepared by Dan Veltri
Concepts to know: IST 220 Exam 3 Notes Prepared by Dan Veltri The Final Exam is scheduled for Wednesday, December 15 th from 4:40PM 6:30 PM in 112 Chambers. Chapters covered: 12, 13, 15, 16, 17, 18, 20,
Layered Architectures and Applications
1 Layered Architectures and Applications Required reading: Garcia 2.1, 2.2, 2.3 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Why Layering?! 3 Montreal London Paris Alice wants to send a mail to Bob and
Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components
Topics Use of networks Network structure Implementation of networks Computer Networks Introduction Let s Get Started! Networking today: Where are they? Powerful computers are cheap Networks are everywhere
R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
How To Design A Layered Network In A Computer Network
A Layered Approach to Computer Networks Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Different layer of abstraction Different error control
Module 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
Chapter 16: Distributed Operating Systems
Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology
Chapter 14: Distributed Operating Systems
Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
Introduction to Computer
PDHonline Course E175 (8 PDH) Introduction to Computer Instructor: Dale W. Callahan, Ph.D., P.E. and Lea B. Callahan, P.E. 2012 PDH Online PDH Center 5272 Meadow Estates Drive Fairfax, VA 22030-6658 Phone
Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for
How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)
1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet
Communication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
CSCI 362 Computer and Network Security
The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,
CS5008: Internet Computing
CS5008: Internet Computing Lecture 6: Protocols and Standards A. O Riordan, latest revision 2015 Some slides from Fitzgerald and Dennis, 2010 Networking Protocols A networking protocol is a set of rules
Network Models OSI vs. TCP/IP
Network Models OSI vs. TCP/IP Network Models Using a formal model allows us to deal with various aspects of Networks abstractly. We will look at two popular models OSI reference model TCP/IP model Both
The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:
1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the
The OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services
WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most
Chapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
Computer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
The Internet. Charging for Internet. What does 1000M and 200M mean? Dr. Hayden Kwok-Hay So
The Internet CCST9015 Feb 6, 2013 What does 1000M and 200M mean? Dr. Hayden Kwok-Hay So Department of Electrical and Electronic Engineering 2 Charging for Internet One is charging for speed (How fast the
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult:
How Networks Differ Differences that can occur at network layer, which makes internetworking difficult: It is impossible to resolve all differences, and the solution is to take a simple approach (as in
Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.
Chapter 8: Computer Networking AIMS The aim of this chapter is to give a brief introduction to computer networking. OBJECTIVES At the end of this chapter you should be able to: Explain the following terms:
Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)
School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit
Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition
Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts
Internet Concepts. What is a Network?
Internet Concepts Network, Protocol Client/server model TCP/IP Internet Addressing Development of the Global Internet Autumn 2004 Trinity College, Dublin 1 What is a Network? A group of two or more devices,
Lecture 28: Internet Protocols
Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further
ICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu
ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu 1 ICS 153 Introduction to Computer Networks Course Goals Understand the basic principles of computer networks Design Architecture
Internetworking and IP Address
Lecture 8 Internetworking and IP Address Motivation of Internetworking Internet Architecture and Router Internet TCP/IP Reference Model and Protocols IP Addresses - Binary and Dotted Decimal IP Address
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)
Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI
High-Level Data Link Control
High-Level Data Link Control This class of data link layer protocols includes High-level Data Link Control (HDLC), Link Access Procedure Balanced (LAPB) for X.25, Link Access Procedure for D-channel (LAPD)
How To Understand The Internet Of S (Netware)
Summer Workshop on Cyber Security Computer s Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University August 12-16, 2013 Supported by National Science Foundation
Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS
Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: and
2. IP Networks, IP Hosts and IP Ports
1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3
OSI Reference Model: An Overview
OSI Reference Model: An Overview Gaurav Bora 1, Saurabh Bora 2, Shivendra Singh 3, Sheikh Mohamad Arsalan 4 ( 1 Department of Electronics, Uttarakhand Technical University, Dehradun, INDIA) ( 2 Department
Internet Protocol Address
SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give
4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19
4. H.323 Components VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19 4.1 H.323 Terminals (1/2)...3 4.1 H.323 Terminals (2/2)...4 4.1.1 The software IP phone (1/2)...5 4.1.1 The software
The OSI Model and the TCP/IP Protocol Suite
The OSI Model and the TCP/IP Protocol Suite To discuss the idea of multiple layering in data communication and networking and the interrelationship between layers. To discuss the OSI model and its layer
How To Understand The Layered Architecture Of A Network
COMPUTER NETWORKS NETWORK ARCHITECTURE AND PROTOCOLS The Need for Standards Computers have different architectures, store data in different formats and communicate at different rates Agreeing on a particular
IT4405 Computer Networks (Compulsory)
IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and
Internetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
WAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required
CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required Current Catalog Description: Computer network architectures and their application to industry needs.
an interconnected collection of autonomous computers interconnected = able to exchange information
Overview: Network Introduction what is a computer network? digital transmission components of a computer network network hardware network software What is a computer network? an interconnected collection