EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst
Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for example web surf. Internet 2
Internetworking Therefore, we need protocols and mechanisms for sending data across networks of different types. LAN LAN LAN LAN 3
Link protocols are not enough 4
Addressing and routing We need an address system that is universal for all networks. This is called the network address. We need rules for how data is forwarded from network to network to the destination. This is called routing. We need network entities that are connected to several networks and can forward data between networks. These entities are called routers. 5
Network protocol Therefore, we need a universal network protocol that handles the connection across networks. source destination Application Application Network Network protocol router Network Network protocol Network Link Link Link PHY PHY PHY 6
Host-to-host delivery 7
Datagram networks In this course, we basically only consider packet switched datagram networks, where each packet is treated independently of all others. 4 3 2 1 3 1 4 1 2 2 4 1 3 2 3 4 1 8
Transmission delay Each router has buffers so that packets can be stored when waiting for service. The end-to-end transmission delay includes both waiting time and transmission time on links. 9
One network protocol: IP Internet protocol (IP) is the only network protocol used in the Internet. Addressing with IP addresses Example: 130.235.18.158 (IPv4) Data is sent as IP packets (or datagrams) Datagram delivery Checksum used but no Error control or Flow control. 10
IP addresses (IPv4) Every host and router that are connected to the Internet have a unique network address (IP address) that is 32 bits long. The address is usually written in a dotted-decimal format. 11
Routing table Each router has a table with information about the next hop. The routing decision is based on the destination address. The source and destination address are included in the packet header. 12
Routing algorithm Routing tables are updated using a routing algorithm. The general idea is to find the route with the least cost between source and destination. Note: The networks between the routers are only represented as costs. 13
Transport protocol Each client computer may have several applications running. Therefore, you need a protocol that handles the end-to-end control for each application. This protocol is called the Transport Protocol. The main objective of the Transport protocol is to ensure that the data is transmitted from source to destination applications. 14
Transport protocol application transport network link PHY Application protocol Transport protocol application transport network link PHY 15
Process-to-process delivery 16
Logical end-to-end connection The transport protocol creates a logical (virtual) connection between source and destination. 17
Function of transport protocol The transport protocol encapsulates the data from the application and ensures that it is sent to the correct receiving application where the data is decapsulated. 18
Port numbers The transport protocol uses port numbers (addresses) for separating applications.
Socket address The IP address + port number becomes the socket address. 20
IP addresses versus port numbers 21
Multiplexing of applications Also, the transport protocol multiplexes and demultiplexes data from/to different applications. 22
A Transport protocol: TCP Transmission Control Protocol (TCP) is one of the transport protocols used in the Internet. Provides a connection-oriented service with error and flow control. TCP uses a Go-back-N ARQ algorithm for error control. 23
Connection-oriented service Packet 2 24
A Transport protocol: UDP User Datagram Protocol (UDP) is another transport protocol used in the Internet. UDP provides a connectionless service without error or flow control. 25
Connectionless service 26
Layered protocol models By using layers of protocols, the development process becomes easier since each protocol has specific tasks. The development of new applications also becomes much easier since they don t have to know that much of the underlying network infrastructures or protocols. 27
The OSI model In the middle of the 70s, the standardisation organisation ISO started work on a standard that should cover all aspects of network communication. In 1983, the Open System Interconnection (OSI) model was presented. The OSI model has since then been used as a framework for the design of network systems. 28
The OSI-model 29
Protocol interaction in several layers 30
Physical layer The physical layer is responsible for movements of individual bits from one hop (node) to the next. 31
Data link layer The data link layer is responsible for moving frames from one hop (node) to the next. 32
Network layer The network layer is responsible for the delivery of individual packets from the source host to the destination host. 33
Transport layer The transport layer is responsible for the delivery of a message from one process to another. 34
Session layer The session layer is responsible for dialog control and synchronization. 35
Presentation layer The presentation layer is responsible for translation, compression, and encryption. 36
Application layer The application layer is responsible for providing services to the user. 37
Connecting devices (1) Sender Application Data Protocol Receiver Application Presentation Presentation Session Session Transport Transport Network Link Physical Switch Link PHY PHY Network Link Physical 38
Switches are used within a network 39
Connecting devices(2) Sender Application Data Protocol Receiver Application Presentation Presentation Session Session Transport Network Router Network Transport Network Link Link Link Link Physical PHY PHY Physical 40
Routers are used between networks using the same network protocol IP network IP network 41
Connecting devices (3) Sender Application Data Gateway Application Receiver Application Presentation P. P. Presentation Session S. S. Session Transport T. T. Transport Network Net Net Network Link Link Link Link Physical PHY PHY Physical 42
Gateways are used between networks of different types (However, the definition is not really clear) IP-network Mobile network 43
So what happens with the data? Assume that the sender application wants to send a message to a receiver. What happens with this message in the different protocol layers on the way to the destination? Network 1 router Network 2 44
The sender side application transport network NH S AH S TH S AH S AHS TH S link LH S NH S TH S AH S PHY 11010101100011100011... 45
Switches A switch changes the link header so that it fits the next link. To outgoing link LH X NH S TH S AH S New link header LH S NH S TH S AH S Old link header 11010101100... PHY 46
Routers A Router handles both the link and network protocol. To next network NH Z TH S AH S LH U NH S TH S AH S LH X New headers Old headers 11010101100... PHY 47
The receiver side application AH S transport TH S AH S network NH Z TH S AH S link NH Z LH U TH S AH S PHY 110100111011000011... 48
Layered data communication 49
Fragmentation If data from an upper layer cannot fit in one data packet, the data is fragmented (according to some prespecified rules) Layer 1 H1 data Layer 2 H2 H1+data H2 data 50
Reassembly At the receiver side the data is reassembled. Layer 1 H1 data Layer 2 H2 H1+data H2 data 51
Maximum transfer unit (MTU) A protocol may define a Maximum Transfer Unit (MTU) that specifies the maximum length of the payload that can be encapsulated. Example: 52