Telecommunication Protocols Laboratory Course
|
|
- Tyrone Leonard
- 7 years ago
- Views:
Transcription
1 Telecommunication Protocols Laboratory Course Lecture 1 G721 (KTF) March 4,
2 Behind the name Telecommunication: the science and technology of transmitting information (words, sounds, images) over great distances, in the form of electromagnetic signals (telegraph, telephone, radio, TV) In short: communication at a distance Protocol: a set of conventions governing the treatment and especially the formatting of data in an electronic communications system => underlying framework : COMPUTER NETWORKS March 4,
3 Preliminaries 2 credits, 20h course, weeks 10-19, Thu from 8:30 to 10 AM Goal of the course: to understand the specifics of telecommunication protocols How to get there Simulate protocols Teams formed, of 2-4 persons March 4,
4 Preliminaries 2 How to get to the goal Each team chooses their protocols and simulate them in whatever framework they agree upon The result has to work User interface not essential but not neglected either March 4,
5 Other details Lectures 1-6: teaching, forming groups, choosing protocols, start implementing Remaining time: implementation and feedback Individuals are graded based on the log There is no exam March 4,
6 Networks Definition autonomous computing systems (NODES) are interconnected Result resources and information are accessible, independently of their physical location Advantages resource sharing and redundancy parallel processing improved reliability, availability, and performance Tradeoff increased complexity March 4,
7 Network taxonomy Criterion: transmission technology Broadcast links Point-to-point links Criterion: scale (geographical extent) Very local area networks (personal area network) Local area networks LAN Metropolitan area networks MAN Wide area networks WAN Internetworks Criterion: organization Private networks Public networks Other criterions Wireless networks Home networks March 4,
8 Networks for Communication Basic form of communications shared memory message exchange Networks are loosely coupled, they are links w/o memory there is no shared memory applications residing on different nodes cooperate ONLY by passing messages to each other March 4,
9 Communication Application Application Network March 4,
10 Network Layers Networks organized as stacks of layers Each layer is built upon the one below it offers certain services to the higher layers shields higher layers from the implementation of the services The number, contents, functions and names of layers depends on the network Layer n on one machine communicates with layer n on another machine Rules and conventions used in this: layer n protocol Entities comprising the corresponding layers on different machines: peers (processes, hardware devices, humans) March 4,
11 Interfaces Between each pair of adjacent layers Define which primitive operations and services the lower layer makes available to the upper one Clean interfaces between layers -> an important issue for network designers each layer performs a specific collection of well-understood functions Clear-cut interfaces Make it simpler to replace the implementation of one layer with a completely different implementation Minimize the amount of information that must be passed between layers March 4,
12 Layers, protocols, and interfaces March 4,
13 Network architecture Is a set of layers and protocols The spec of the architecture should contain enough information for building layers that obbey the protocols Interfaces and details of implementation are not part of the architecture Protocol stack list of protocols, one per layer, used by a certain system March 4,
14 Protocol Stack 1 Location A Location B 3 I like rabbits Message Philosopher J'aime bien les lapins 3 2 L: Dutch Ik vind konijnen leuk Information for the remote translator Translator L: Dutch Ik vind konijnen leuk 2 1 Fax #--- L: Dutch Ik vind konijnen leuk Information for the remote secretary Secretary Fax #--- L: Dutch Ik vind konijnen leuk 1 The philosopher-translator-secretary architecture.
15 Protocol Stack 2 Example information flow supporting virtual communication in layer 5.
16 Design Issues for the Layers Addressing Layers need to identify senders and receivers Data Transfer Rules Directions of data travel, logical channels Error Control Many error-detecting and error-controlling codes exist The peers have to agree on which ones are used The receiver has to inform the sender about correctly received messages Flow Control Keep a faster sender from swamping a slow receiver Arbitrarily long messages Multiplexing and demultiplexing Using the same connection for multiple, unrelated communications Routing If multiple paths between source and destination exist, a route must be chosen
17 Types of services Layers offer 2 types of services to the layers above them Connection-oriented Connectionless Connection-oriented network service Service user establishes connection, uses it, then releases it Connection tube Negotiation between sender, receiver, subnet on parameters such as: maximum message size, quality of service, etc Connectionless network service Each message carries the full destination address and is routed through the system independently of all the others March 4,
18 Types of services 2 March 4,
19 Quality of service Usually refers to reliability of services (not losing data) implemented by having the receiver acknowledge the receipt of each message so the sender is sure it arrived acknowledgement process introduces overhead and delays March 4,
20 Service primitives A service is formally specified by a set of primitives (operations) available to a user process to access the service (Primitives for implementing a simple connection-oriented service) March 4,
21 Service primitives 2 Packets sent in a simple client-server interaction on a connection-oriented network. March 4,
22 Services and protocols Service Set of primitives that a layer provides to the layer above it Defines what operations the layer is prepared to perform on behalf of its users Relates to an interface between 2 layers: service provider and service user Protocol Set of rules governing the format and meaning of packets (messages) that are exchanged by peer entities within a layer Implements service definitions March 4,
23 A layer with services and protocols March 4,
24 Reference models Network architectures OSI OSI reference model TCP/IP reference model The associated protocols are not really used The model is quite general and still valid Features discussed at each layer are still important TCP/IP The model is not of much use The protocols are widely used March 4,
25 OSI/ISO reference model Based on a proposal of ISO (International Standards Organization) Intended as a first step toward international standardization of protocols used in the various layers (1983, revised 1995) Called ISO/OSI (Open Systems Interconnection) It deals with connecting open systems (systems open for communication with other systems) March 4,
26 OSI model March 4,
27 OSI model principles A layer should be created where a different abstraction is needed Each layer should perform a well-defined function The function of each layer should be chosen so that internationally standardized protocols can be then defined The layer boundaries should be chosen to minimize the information flow across interfaces The number of layers should be large enough that distinct functions are not thrown together in the same layer and small enough so that architecture does not become unhandy March 4,
28 Physical layer Concerned with transmitting raw bits over a communication channel When a 1-bit is sent, a 1-bit has to be received, not a 0-bit Typical questions How many volts used to represent a 1, how many for a 0 How many ns a bit lasts Whether transmission can proceed simultaneously in both directions How the initial connection is established and how is it then torn down How many pins the network connector has and what are their uses Design issues deal with Mechanical, electrical and timing interfaces Physical transmission medium March 4,
29 Data Link Layer Transforms a raw transmission facility into a line that appears free of undetected transmission errors to the above network layer Obliges the sender to break up input data into data frames (few hundred or thousands bytes each) and transmit frames sequentially If service reliable => receiver confirms correct receipt of each frame by sending back an acknowledgement frame Flow control regulations and error handling are integrated Medium access control sublayer Controls access to a shared channel (for broadcast networks) March 4,
30 Network layer Controls the operation of a subnet Key design issue: how are packets routed from source to destination Routes: static / determined at intialization / highly dynamic Controls the bottlenecks in the subnet Handles quality of service issues: delay, transit time, jitter, etc Compatibility among different networks (addressing, max message sizes, different protocols) Broadcast networks: this layer is very thin March 4,
31 Transport layer Accepts data from the above layers and manipulates it, ensuring that it arrives correctly at the destination Efficiency is important Hiding the hardware from the above layers also important When a connection is established, the type of service is determined, e.g. Error-free, point-to-point channel Transporting isolated messages Broadcasting True end-to-end layer a program on the source machine carries on a conversation with a similar program on the destination machine using message headers and control messages In contrast, layers 1-3 are chained
32 Session layer Allows users on different machines to establish sessions between them Session services Dialog control: keeping track of whose turn it is to transmit Token management: preventing 2 parties from attempting the same critical operation at the same time Synchronization: check-pointing long transmissions to allow them to continue from where they were after a crash March 4,
33 Presentation layer Concerned with the syntax and semantics of the transmitted information Data structures to be exchanged can be defined in an abstract way, along with a standard encoding to be used on the wire Useful for computers with different data representation Manages these abstract data structures and allows higher-level data structures to be defined and exchanged E.g. banking records March 4,
34 Application layer Contains a variety of protocols commonly needed by users E.g. HTTP basis for WWW File transfer Electronic mail Network news March 4,
35 TCP/IP reference model US Department of Defense sponsored a research network called ARPANET (1960s) that needed ultimately to interconnect with satellites and radio networks a reference architecture was needed Major goal: the ability to connect multiple networks in a seamless way Another major goal: the ability to survive loss of subnet hardware with existing conversations not being broken off Also: flexible architecture a packet-switching network, based on a connectionless internetwork layer was conceived March 4,
36 TCP/IP model March 4,
37 Internet layer Connectionless internetwork layer that holds TCP/IP architecture together It permits hosts to inject packets into any network and have them travel independently to the destination (in possibly another network) Defines an official packet format and protocol called IP (internet protocol) It delivers IP packets to their destination Major issues: packet routing and avoiding congestion Similar in functionality to OSI network layer March 4,
38 Transport layer Allows peer entities on the source and destination hosts to carry on a conversation Similar to the OSI transport layer 2 end-to-end transport protocols are defined here: TCP (transmission control protocol) UDP (user datagram protocol) March 4,
39 TCP Reliable connection oriented protocol A byte stream originating on one machine is delivered w/o error on any other machine in the internet It fragments the byte stream into discrete messages and passes each one to the internet layer At destination the receiving TCP process reassembles the received messages into the output stream Also handles flow control March 4,
40 UDP Unreliable, connectionless protocol Used for applications not desiring TCP s sequencing or flow control but wishing to provide their own Widely used also for one-shot, client-server type requestreply queries and applications Prompt delivery more important than accurate delivery March 4,
41 TCP/IP Other Layers Application layer - contains all the higher level protocols TELNET, FTP, SMTP, DNS, NNTP, HTTP Host-to-network layer Not really specified The host should connect to the network (with some protocol) so that it could send IP packets to it March 4,
42 TCP/IP Protocols and Networks (initially) March 4,
43 Similarities between OSI and TCP/IP reference models Both are based on the concept of a stack of independent protocols Functionality of layers is roughly similar Layers up through and including the transport layer provide an endto-end, network-independent transport service to processes wishing to communicate These layers are application-oriented users of the transport service March 4,
44 Central concepts to OSI Service: what the layer does; it defines the layer s semantics Interface: tells the processes above it how to access it It specifies the parameters and expected results Protocol: implements the services Peer protocols used in a layer are the layer s own business The layer can use any protocols as long as it gets the job done (provides the offered services) The layer can also change the protocols at will without affecting software in higher layers March 4,
45 Protocols and models OSI model was devised before the corresponding protocols The model was not biased toward one set of protocols Designers did not have experience and did not know well what to put in which layer TCP/IP model was devised just as a description of the existing protocols The protocols hence fit perfectly into the layers The model does not fit any other protocol stack => not useful for describing other, non-tcp/ip networks March 4,
46 Other differences Except for the (inter)network, transport and application layers, other layers are different in OSI and TCP/IP Connection vs connectionless services OSI supports both in the network layer but only connectionoriented in the transport layer TCP/IP has only connectionless services in the internet layer but supports both in the transport layer March 4,
47 A Critique of the OSI Model and Protocols Why OSI did not take over the world Bad timing Bad technology Bad implementations Bad politics March 4,
48 Bad Timing March 4,
49 A Critique of the TCP/IP Reference Model Problems: Service, interface, and protocol not distinguished Not a general model Host-to-network layer not really a layer No mention of physical and data link layers Minor protocols deeply entrenched, hard to replace March 4,
50 Hybrid Model March 4,
The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:
1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the
More informationSFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
More informationObjectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
More informationData Communication Networks Introduction
Data Communication Networks Introduction M. R. Pakravan Department of Electrical Engineering Sharif University of Technology Data Networks 1 Introduction The course introduces the underlying concepts and
More informationTopics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components
Topics Use of networks Network structure Implementation of networks Computer Networks Introduction Let s Get Started! Networking today: Where are they? Powerful computers are cheap Networks are everywhere
More informationICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu
ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu 1 ICS 153 Introduction to Computer Networks Course Goals Understand the basic principles of computer networks Design Architecture
More informationComputer Networks Vs. Distributed Systems
Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require
More informationBasic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
More informationHow To Design A Layered Network In A Computer Network
A Layered Approach to Computer Networks Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Different layer of abstraction Different error control
More informationCPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
More informationThe OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL
The OSI Model and the TCP/IP Protocol Suite - the OSI model was never fully implemented. - The TCP/IP protocol suite became the dominant commercial architecture because it was used and tested extensively
More informationCSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
More informationCommunications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
More informationChapter 1: Introduction
Chapter 1: Introduction Professor of CIS Columbus, OH 43210 Jain@cse.ohio-state.edu http://www.cse.ohio-state.edu/~jain/cis677-98/ 1B-1 Data Communication vs Networking q Communication: Two Nodes. Mostly
More informationProtocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
More informationEE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone
More informationThe TCP/IP Reference Model
The TCP/IP Reference Model The TCP/IP Model Comparison to OSI Model Example Networks The TCP/IP Model Origins from ARPANET, DoD research network ARPA - Advanced Research Projects Agency Reliability was
More informationModule 1. Introduction. Version 2 CSE IIT, Kharagpur
Module 1 Introduction Lesson 2 Layered Network Architecture Specific Functional Objectives On Completion of this lesson, the students will be able to: State the requirement for layered approach Explain
More informationEITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for
More informationHow To Understand The Layered Architecture Of A Network
COMPUTER NETWORKS NETWORK ARCHITECTURE AND PROTOCOLS The Need for Standards Computers have different architectures, store data in different formats and communicate at different rates Agreeing on a particular
More informationELEC3030 Computer Networks
ELEC3030 Computer Networks Professor Sheng Chen: Building 86, Room 1021 E-mail: sqc@ecs.soton.ac.uk Download lecture slides from: http://www.ecs.soton.ac.uk/ sqc/el336/ or get them from Course Office (ECS
More informationInternet Concepts. What is a Network?
Internet Concepts Network, Protocol Client/server model TCP/IP Internet Addressing Development of the Global Internet Autumn 2004 Trinity College, Dublin 1 What is a Network? A group of two or more devices,
More informationUnderstanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
More informationLecture 28: Internet Protocols
Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further
More informationIndian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
More informationZarządzanie sieciami telekomunikacyjnymi
What Is an Internetwork? An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry,
More informationProtocol Hierarchies/Network Software
Protocol Hierarchies/Network Software Computer networks are generally comprised of numerous pieces of hardware and software To simplify network design most networks are organized as a stack of layers of
More informationThe OSI Model and the TCP/IP Protocol Suite
The OSI Model and the TCP/IP Protocol Suite To discuss the idea of multiple layering in data communication and networking and the interrelationship between layers. To discuss the OSI model and its layer
More informationInternet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
More informationThe OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
More informationProtocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
More informationCommunication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Network Architectures Protocol Layering Network architecture concept A network architecture is an abstract model used to describe
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationComputer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
More information524 Computer Networks
524 Computer Networks Section 1: Introduction to Course Dr. E.C. Kulasekere Sri Lanka Institute of Information Technology - 2005 Course Outline The Aim The course is design to establish the terminology
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationNetwork Models and Protocols
669-5ch01.fm Page 1 Friday, April 12, 2002 2:01 PM C H A P T E R Network Models and Protocols 1 EXAM OBJECTIVES 1.1 Layered Network Models 1.2 The Layers of the TCP/IP 5-Layer Model 1.3 Network Protocols
More informationNetworking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationProtocol Architecture
Protocol Architecture ed Protocol Architectures OSI Reference Model TCP/IP Protocol Stack Need for Protocols The task of exchanging information between devices requires a high degree of cooperation between
More informationCSCI 362 Computer and Network Security
The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,
More informationData Communication and Computer Network
1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X
More informationSecurity (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
More informationOverview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
More informationOSI Reference Model: An Overview
OSI Reference Model: An Overview Gaurav Bora 1, Saurabh Bora 2, Shivendra Singh 3, Sheikh Mohamad Arsalan 4 ( 1 Department of Electronics, Uttarakhand Technical University, Dehradun, INDIA) ( 2 Department
More information8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2)
What is a computer network? Introduction Chapter 1 A number of separate but interconnected computers A collection of autonomous computers interconnected by a single technology COURSE FOCUS: design and
More informationOverview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
More informationNote! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
More informationLayered Architectures and Applications
1 Layered Architectures and Applications Required reading: Garcia 2.1, 2.2, 2.3 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Why Layering?! 3 Montreal London Paris Alice wants to send a mail to Bob and
More informationThe OSI Model: Understanding the Seven Layers of Computer Networks
Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer
More informationWhat is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.
What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir noubir@ccs.neu.edu CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms
More informationIntroduction to Metropolitan Area Networks and Wide Area Networks
Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,
More informationProtocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
More informationNetwork-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2
Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation
More informationLecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
More informationFIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking Learning Objectives Upon completion of this chapter, you should be able to: Describe the
More informationChapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.
Chapter 8: Computer Networking AIMS The aim of this chapter is to give a brief introduction to computer networking. OBJECTIVES At the end of this chapter you should be able to: Explain the following terms:
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationAccess Control: Firewalls (1)
Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception
More informationIP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
More informationTHE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN
THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN OVERVIEW THE NEED FOR STANDARDS OSI - ORGANISATION FOR STANDARDISATION THE OSI REFERENCE MODEL A LAYERED NETWORK MODEL THE SEVEN OSI
More informationCMPT 165: The Internet, Part 3
CMPT 165: The Internet, Part 3 Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University September 15, 2011 1 Basic Communication Technology Packet Switching (sharing a tranmission
More informationNote! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
More informationLecture 2: Protocols and Layering. CSE 123: Computer Networks Stefan Savage
Lecture 2: Protocols and Layering CSE 123: Computer Networks Stefan Savage Last time Bandwidth, latency, overhead, message size, error rate Bandwidth-delay product Delay Bandwidth High-level run through
More informationData Communications and Networking Overview
Data Communications and Networking Overview Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 2-1
More informationIntroduction to Computer Networks
Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,
More informationIP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
More informationData Link Layer Overview
Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,
More informationInternet Protocols. Addressing & Services. Updated: 9-29-2012
Internet Protocols Addressing & Services Updated: 9-29-2012 Virtual vs. Physical Networks MAC is the part of the underlying network MAC is used on the LAN What is the addressing mechanism in WAN? WAN is
More informationChapter 11. User Datagram Protocol (UDP)
Chapter 11 User Datagram Protocol (UDP) The McGraw-Hill Companies, Inc., 2000 1 CONTENTS PROCESS-TO-PROCESS COMMUNICATION USER DATAGRAM CHECKSUM UDP OPERATION USE OF UDP UDP PACKAGE The McGraw-Hill Companies,
More informationCOMPUTER NETWORKS SECOND EDITION. ANDREW S.fjANENBAUM. Vrije Universiteit Amsterdam, The Netherlands. Nachrichtentechnische Bib'iothek THD Inv.
COMPUTER NETWORKS SECOND EDITION ANDREW S.fjANENBAUM Vrije Universiteit Amsterdam, The Netherlands Nachrichtentechnische Bib'iothek THD Inv.-Ni,: tq(s ULB Darmstadt iiiiiir 17800787 =3JE Prentice-Hall
More informationIntroduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the
More informationNetwork Programming TDC 561
Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating
More informationMobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers
Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers Oxford University Press 2007. All rights reserved. 1 OSI (open systems interconnection)
More informationIntroduction to Networks
www.eazynotes.com Maninder Kaur [Page No. 1] Introduction to Networks Short Answer Type Questions Q-1. Which Technologies of this age had led to the emergence of computer network? Ans: The technologies
More informationComputer Networks III
Computer Networks III Wide Area Networks and Packet Switching Network Protocols and the OSI Layers The Internet Internet Infrastructure 1 Wide Area Networks (recap) 2 Page 1 Basic WAN structure Host Router
More informationUPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
More informationIP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
More informationMathatma Gandhi University
Mathatma Gandhi University BSc Computer Science IV th semester BCS 402 Computer Network &Internet MULTIPLE CHOICE QUESTIONS 1. The computer network is A) Network computer with cable B) Network computer
More informationCITS1231 Web Technologies. Client, Server, the Internet, and the Web
CITS1231 Web Technologies Client, Server, the Internet, and the Web Topic Outline How does the Internet work Client Server Architecture Connections Communications Protocols Addressing Routing One of the
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
More informationNetworks 3. 2015 University of Stirling CSCU9B1 Essential Skills for the Information Age. Content
Networks 3 Lecture Networks 3/Slide 1 Content What is a communications protocol? Network protocols TCP/IP High-level protocols Firewalls Network addresses Host name IP address Domain name system (DNS)
More informationELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult:
How Networks Differ Differences that can occur at network layer, which makes internetworking difficult: It is impossible to resolve all differences, and the solution is to take a simple approach (as in
More informationLocal Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Local Area Network LANs connect computers and peripheral
More informationAgenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
More informationIntroduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
More informationRARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
More informationCSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture
Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote
More informationCSMC 417. Computer Networks Prof. Ashok K Agrawala. 2011 Ashok Agrawala. January 11 CMSC417 Set 1 1
CSMC 417 Computer Networks Prof. Ashok K Agrawala 2011 Ashok Agrawala 1 General Instructor - Ashok K. Agrawala agrawala@cs.umd.edu 4149 AVW TA - Office Hours Class Meets Tu Th 8:00 9:30 CSIC 3117 2 Prerequisite
More informationTelecommunications, Networks, and Wireless Computing
Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.
More informationOct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols
E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationWide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)
School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit
More informationInterconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration
Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking
More informationCommunication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
More informationChapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More information2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above
1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It
More informationTCP/IP Protocol Suite. Marshal Miller Chris Chase
TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets
More information