28 Networks and Communication Protocols



Similar documents
Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Chapter 14: Distributed Operating Systems

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Chapter 16: Distributed Operating Systems

Module 15: Network Structures

Introduction to LAN/WAN. Network Layer

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Computer Networks Vs. Distributed Systems

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

C Information Systems for Managers Fall 1999

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Professor: Ian Foster TAs: Xuehai Zhang, Yong Zhao. Winter Quarter.

Routing in packet-switching networks

Protocols. Packets. What's in an IP packet

Based on Computer Networking, 4 th Edition by Kurose and Ross

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

Module 1. Introduction. Version 2 CSE IIT, Kharagpur

Internet Layer. Routing Tables. Routing in the Internet. Routing Protocols

Communications and Computer Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

2 Basic Concepts. Contents

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Computer Networks: LANs, WANs The Internet

ELEC3030 Computer Networks

COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting

Data Communication and Computer Network

ECE 333: Introduction to Communication Networks Fall 2002

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

524 Computer Networks

ICOM : Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

Random Access Protocols

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Computer Networking Networks

Congestion Control Overview

Introduction to Metropolitan Area Networks and Wide Area Networks

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Level 2 Routing: LAN Bridges and Switches

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK


Chapter 9A. Network Definition. The Uses of a Network. Network Basics

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?

VPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert

QoS issues in Voice over IP

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features

Communication Networks. MAP-TELE 2011/12 José Ruela

How To Understand The Layered Architecture Of A Network

TCP in Wireless Networks

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

Protocols and Architecture. Protocol Architecture.

Access Control: Firewalls (1)

WAN Technology. Heng Sovannarith

Local-Area Network -LAN

Requirements of Voice in an IP Internetwork

Internet Packets. Forwarding Datagrams

High-Level Data Link Control

WAN Data Link Protocols

The OSI and TCP/IP Models. Lesson 2

Selecting a Web Server Connection Rate Gilbert Held

TCP in Wireless Mobile Networks

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

VOIP THE ULTIMATE GUIDE VERSION /23/2014 onevoiceinc.com

Real-Time (Paradigms) (51)

Analog vs. Digital Transmission

RTT 60.5 msec receiver window size: 32 KB

Performance Evaluation of Wired and Wireless Local Area Networks

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

An Overview of ZigBee Networks

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.

Computer Networks. Chapter 5 Transport Protocols

Architecture and Performance of the Internet

Introduction To Computer Networks

MANAGEMENT INFORMATION SYSTEMS 8/E

WAN Technologies Based on CCNA 4 v3.1 Slides Compiled & modified by C. Pham

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

Chapter 5. Data Communication And Internet Technology

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Stop And Wait. ACK received; transmit frame 2 CS 455 3

Understanding Latency in IP Telephony

Technical Support Information Belkin internal use only

SIP Trunking and Voice over IP

Chapter 2 - The TCP/IP and OSI Networking Models

CPS221 Lecture: Layered Network Architecture

Mobile Computing/ Mobile Networks

High Performance VPN Solutions Over Satellite Networks

Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.

Transcription:

113 28 Networks and ommunication Protocols Trend in computer systems: personal computing. Reasons why: ost: economies of scale. lso, avoids large initial investment in timesharing system. Performance: personal computers provide same or more power as previous timesharing systems. Reliability: if one person s computer crashes, doesn t affect other people. Mobility: can carry personal computing devices. Problem: communication and cooperation are more difficult. How do people on the same project share files? How does new software get distributed to all users? How is electronic mail handled? Solution: tie machines together with networks, develop communication protocols that allow communication and cooperation again. Goal: get same effect as with timesharing, except lots of PU power, low cost, mobility. xamples of data (packet) networks: RPnet: 1st widely-used network, developed early 70 s, replaced in early 90 s. onnected together large timesharing systems all over the country using leased phone lines. Provided mail, file transfer, remote login. Usenet: eveloped late 70 s, early 80 s. Unix systems phone each other up to send mail and transfer files. Local area networks (LNs): eveloped early 80 s to hook together personal computers. Most popular interconnection for LNs is thernet. LNs were used very differently than wide-area networks.

Operating Systems 114 Internet: ties together many existing networks, including LNs. Network hardware: Point-to-point links (used by most early networks, current long-haul networks). xamples are leased phone lines (56kbits/sec-RPnet), leased trunks (1Mbit/sec 10Gbit/sec), ISN (digital phone lines), analog phone line plus modem, residential broadband (SL, cable). ifferent styles: Fully connected: every site can talk directly to any other site (e.g. Usenet). Partially connected: star, ring or general graph. Intermediate nodes must forward messages. Multi-access bus (used by most LNs today). single cable, group of cables or wireless radio channel connects many machines together. est examples are thernet (one wire), FI, satellite links, 802.11 wireless networks, cellular networks. Networks are usually characterized in terms of two things: Latency: the minimum time to get the minimum amount of information between two sites. andwidth: once information is flowing, how many bits per second can be transmitted (i.e. the marginal cost per bit). Latency and bandwidth are often used to characterize higher-level protocols too. Protocols: these are the key to networks. protocol is just an agreement between the parties on the network about how information will be transmitted between them. There are many different protocols to do different things (e.g. mail, file transfer, remote login). Typically, protocols are built up in layers. Lowest protocol layer: physical layer. etermines the physical mechanisms (electrical/optical) for transmitting bits: voltages, delays, currents, frequencies, power, connectors, etc.

Operating Systems 115 ata Link protocol layer: how to get data frames between two directly-connected components. roadcast networks: single shared communication medium, no central controller to mediate access to it. Simplest scheme is the loha mechanism: just broadcast blindly, use recovery protocols if packet doesn t get through. This system has stability problems: can t get more than 18% utilization of channel, and system completely falls apart under heavy loads. thernet adds two things. First is carrier sense: listen before broadcasting, defer until channel is clear, then broadcast. lso listen while broadcasting. ollision can still happen if two stations start up at the same time (within one propagation delay). If collision detected, jam network so that everyone will know about collision (don t waste time transmitting junk). Then wait a random interval, retry. If repeated collisions, wait longer and longer intervals. This is called SM/ (carrier sense multiple access, with collision detection). Problem with thernet: Reliability: if any station jams network, nobody can do anything, can t even figure out who s doing it. (Switched thernet fixes this to some extent). Fairness: there s no guarantee against starvation. esigners of real-time systems don t like this, but it hasn t been a problem in practice. Ring networks: an additional protocol built on top of a ring-structured set of point-to-point links. Normally, an electronic token (special packet) circulates at high speed around the ring. If a station doesn t have anything to broadcast, it just retransmits everything it receives. When ready to broadcast, a station waits until the token passes by. Instead of retransmitting the token, send packet instead.

Operating Systems 116 When packet has been transmitted, put token back on ring for next station to use. Packet loops all the way around, gets swallowed by sender when it comes back again (recognize self as destination). Problem with ring system: if any station dies, token can t circulate so ring dies. Solution: multiple rings or hardware bypass. t this point, packets can be transmitted from one host on a local network to another. Next step: get packets from any machine in the internetwork to any other machine. This is called the network layer of protocols. Packets must be forwarded from machine to machine until they reach the destination. Forwarding machines are called routers. istinguish between circuit switching and message switching (also called packet switching). Names vs. addresses vs. routes: Name: a symbolic term for something: lice, or owlnet. Good for people to remember. ddress: where the thing is: in an internetwork situation, usually consists of the number of the network, the number of the host on the network, and perhaps also the id of a process or mailbox within a host. Route: directions for how to get there from here (a sequence of hosts and links to pass through to reach the destination). ompare to names, addresses, and routes for humans. Sometimes the sender has to provide the route, e.g. in UUP: hplabs!hp-pcd!hpcvc0!cliff. ll each machine has to be able to do is remember its neighbors and forward messages. This is clumsy for users. It s better if the hosts of the internetwork can figure out the routing stuff for themselves. This involves a special protocol between the hosts to build routing tables..g. in RPnet, hosts send messages to nearest neighbors, build up tables of most direct paths from each host to each other host (fewest hops).

Operating Systems 117 In LNs, only gateways have to worry about routing: all the other hosts just ship packets to gateway unless for host on local net. uilding Routing Tables estination Ship Via istance Unfortunately, in packet networks, packets can get lost in a number of ways: Transmission errors. host has all its packet buffers full so it has no place to put another incoming packet: an happen at intermediate host if packets are arriving on a fast network but have to be forwarded onto a much slower network. This is called network congestion. an happen at destination if user process can t work fast enough to process all the packets as they arrive.

Operating Systems 118 nother problem is that packets can arrive out of order: if some hosts suddenly go down, or if routing tables change, packets might wander off into the network and come back much later. Most protocols include a time-to-live mechanism: after a certain time, packets are killed so that they don t wander endlessly. The basic network protocols described above are sometimes called datagram protocols. They are used to deliver individual packets, and the packets are not guaranteed to get through or to arrive in any particular order. This is useful for some applications, but not very many. Most applications would like guarantees about delivery and order. To do this, the sender and receiver must remember state about what has been happening. This is called a connection, and the protocols to implement it are called transport protocols. Simple acknowledgement-based protocol: Store a sequence number in each packet. Sender assigns sequence numbers, increments for each packet. Whenever receiver gets a packet, it sends back an acknowledgement packet with the serial number of the packet being acknowledged. Sender waits for acknowledgement before sending next packet. If sender doesn t receive acknowledgement within a reasonable time, it assumes that the packet got lost and retransmits it. Retransmission could result in receiver getting two packets with same serial number: it checks serial numbers and throws away duplicates and out-of-order packets. Problems with simple ack scheme: requires one ack for every data packet, may be slow in high-latency situations like satellite links (must wait for ack before sending next packet). Most transport protocols are more elaborate: sender can transmit several packets before waiting for acks, receiver sends a single ack for several received packets. Sender and receiver must negotiate about how far ahead the sender can send: otherwise the receiver might run out of buffer space and have to discard packets. This is called the flow control problem.

Operating Systems 119 Solution: sliding-window protocols. No matter what the transport mechanism, setting up the connection is complex and time-consuming. It s tricky to get two hosts to agree to communicate with each other and get their state initialized correctly. nother problem: different machines may use different data formats (e.g. floating-point numbers may have different bit arrangements). It may be necessary to do conversion whenever information is shipped. The protocols to do this conversion are called the presentation layer. Lastly, there is the application layer, which uses virtual circuits to perform various functions like mail, web, file transfer, remote login, etc. Typically, various machines on the network contain application programs to provide particular services: mail delivery, time-of-day, file access, name-to-address binding, etc. These machines are called servers. Layered protocols: movement through levels, header additions and removals. The mechanisms described above form the basis for tying together distributed systems. Until the mid 80s, though, they ve only been used for loose coupling: ach machine is completely autonomous: separate accounting, separate file system, separate password file, etc. an send mail between machines. an transfer files between machines (but only with special commands). an execute commands remotely. an login remotely. Loose coupling like this is OK for a network with only a few machines spread all over the country, but not for the modern Internet. istributed systems provide tighter integration over a network.