Chapter Nine. Introduction to Metropolitan Area Networks and Wide Area Networks

Similar documents
Introduction to Metropolitan Area Networks and Wide Area Networks

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Routing in packet-switching networks

Introduction to LAN/WAN. Network Layer

Computer Networks. By Hardeep Singh

College 5, Routing, Internet. Host A. Host B. The Network Layer: functions

Communication Networks. MAP-TELE 2011/12 José Ruela

CS335 Sample Questions for Exam #2

Computer Networks Vs. Distributed Systems

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

WAN Technology. Heng Sovannarith

The Network Layer Functions: Congestion Control

WAN Data Link Protocols

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Routing with OSPF. Introduction

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Computer Networks. Main Functions

Introduction To Computer Networks

Computer Network and Communication

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Internet Protocol version 4 Part I

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Computer Networking Networks

PART III. OPS-based wide area networks

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Introduction to Ethernet

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

Internet Control Message Protocol (ICMP)

Communications and Computer Networks

Multi Protocol Label Switching (MPLS) is a core networking technology that

Module 15: Network Structures

Voice Over IP. MultiFlow IP Phone # 3071 Subnet # Subnet Mask IP address Telephone.

8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2)

Chapter 14: Distributed Operating Systems

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

The OSI Model: Understanding the Seven Layers of Computer Networks

Chapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN)

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Data Communication and Computer Network

Computer Networks and the Internet

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

CSE 3461 / 5461: Computer Networking & Internet Technologies

Chapter 16: Distributed Operating Systems

Network Layer: Network Layer and IP Protocol

Transport and Network Layer

Computer Networks: LANs, WANs The Internet

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT

RIP: Routing Information Protocol

Analysis of QoS Routing Approach and the starvation`s evaluation in LAN

Network Structure or Topology

ELEC3030 Computer Networks

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

QoS issues in Voice over IP

RIP: Routing Information Protocol

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Router and Routing Basics

Local-Area Network -LAN

Level 2 Routing: LAN Bridges and Switches

IP Multicasting. Applications with multiple receivers

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Chapter# 19 INTERNETWORK OPERATION

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Module 2 Overview of Computer Networks

CMPT 165: The Internet, Part 3

Connection-Oriented Ethernet On-Ramp Aggregation for Next-Generation Networks

Transport Layer Protocols

November Defining the Value of MPLS VPNs

NETWORKING TECHNOLOGIES

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Ethernet (LAN switching)

WAN Wide Area Networks. Packet Switch Operation. Packet Switches. COMP476 Networked Computer Systems. WANs are made of store and forward switches.

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

Networking TCP/IP routing and workload balancing

ET225 Networking Concepts. Chapter 1 What is a Computer Network?

20. Switched Local Area Networks

Chapter 4. Distance Vector Routing Protocols

John Ragan Director of Product Management. Billy Wise Communications Specialist

Introduction to WAN Technologies

How To Provide Qos Based Routing In The Internet

CSCI 362 Computer and Network Security

iseries TCP/IP routing and workload balancing

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding

RARP: Reverse Address Resolution Protocol

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

2 Basic Concepts. Contents

IST 220 Exam 3 Notes Prepared by Dan Veltri

Protocols and Architecture. Protocol Architecture.

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Packet Tracer 3 Lab VLSM 2 Solution

WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter

Real-Time (Paradigms) (51)

Transcription:

Chapter Nine Introduction to Metropolitan Area Networks and Wide Area Networks Data Communications and Computer Networks: A Business User s Approach Seventh Edition

After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks, and wide area networks from each other Identify the characteristics of metropolitan area networks and compare to LANs and WANs Describe how circuit-switched, datagram packetswitched, and virtual circuit packet-switched networks work Identify the differences between connectionoriented and connectionless networks 2

After reading this chapter, you should be able to: Describe the differences between centralized and distributed routing Describe the differences between static and adaptive routing Document the main characteristics of flooding and use hop count and hop limit in a simple example Discuss the basic concepts of network congestion, including quality of service 3

Introduction As we have seen, a local area network covers a room, a building or a campus. A metropolitan area network (MAN) covers a city or a region of a city. A wide area network (WAN) covers multiple cities, states, countries, and even the solar system. 4

Metropolitan Area Network Basics MANs borrow technologies from LANs and WANs. MANs support high-speed disaster recovery systems, real-time transaction backup systems, interconnections between corporate data centers and Internet service providers, and government, business, medicine, and education high-speed interconnections. Almost exclusively fiber optic systems 5

Metropolitan Area Network Basics MANs have very high transfer speeds MANs can recover from network faults very quickly (failover time) MANs are very often a ring topology (not a starwired ring) Some MANs can be provisioned dynamically 6

Metropolitan Area Network Basics 7

SONET versus Ethernet MANs Most MANs are SONET network built of multiple rings (for failover purposes) SONET is well-proven but complex, fairly expensive, and cannot be provisioned dynamically. SONET is based upon T-1 rates and does not fit nicely into 1 Mbps, 10 Mbps, 100 Mbps, 1000 Mbps chunks, like Ethernet systems do. Ethernet MANs generally have high failover times 8

SONET versus Ethernet MANs 9

SONET versus Ethernet MANs 10

Metro Ethernet One of the latest forms of the metropolitan area network is metro Ethernet Metro Ethernet is a service in which the provider creates a door-to-door Ethernet connection between two locations For example, you may connect your business with a second business using a point-to-point Ethernet connection (Figure 9-4a) 11

Metro Ethernet 12

Metro Ethernet You may also connect your business with multiple businesses using a connection similar to a large local area network (Figure 9-4b) Thus, by simply sending out one packet, multiple companies may receive the data Neat thing about metro Ethernet is the way it seamlessly connects with a company s internal Ethernet network(s) 13

Metro Ethernet 14

Wide Area Network Basics WANs used to be characterized with slow, noisy lines. Today WANs are very high speed with very low error rates. WANs usually follow a mesh topology. 15

Wide Area Network Basics 16

Wide Area Network Basics A station is a device that interfaces a user to a network. A node is a device that allows one or more stations to access the physical network and is a transfer point for passing information through a network. A node is often a computer, a router, or a telephone switch. The sub-network or physical network is the underlying connection of nodes and telecommunication links. 17

Wide Area Network Basics 18

Types of Network Structures Circuit switched network - a sub-network in which a dedicated circuit is established between sender and receiver and all data passes over this circuit. The telephone system is a common example. The connection is dedicated until one party or another terminates the connection. AT&T announced end of 2009 that they will begin phasing out their switched networks 19

Types of Network Structures 20

Types of Network Structures Packet switched network - a network in which all data messages are transmitted using fixed-sized packages, called packets. More efficient use of a telecommunications line since packets from multiple sources can share the medium. One form of packet switched network is the datagram. With a datagram, each packet is on its own and may follow its own path. Virtual circuit packet switched network create a logical path through the subnet and all packets from one connection follow this path. 21

Types of Network Structures Broadcast network - a network typically found in local area networks but occasionally found in wide area networks. A workstation transmits its data and all other workstations connected to the network hear the data. Only the workstation(s) with the proper address will accept the data. 22

Summary of Network Structures 23

Connection-oriented versus Connectionless The network structure is the underlying physical component of a network. What about the software or application that uses the network? A network application can be either connection-oriented or connectionless. 24

Connection-oriented versus Connectionless A connection-oriented application requires both sender and receiver to create a connection before any data is transferred. Applications such as large file transfers and sensitive transactions such as banking and business are typically connection-oriented. A connectionless application does not create a connection first but simply sends the data. Electronic mail is a common example. 25

Connection-oriented versus Connectionless 26

Connection-oriented versus Connectionless 27

Connection-oriented versus Connectionless A connection-oriented application can operate over both a circuit switched network or a packet switched network. A connectionless application can also operate over both a circuit switched network or a packet switched network but a packet switched network may be more efficient. 28

Routing Each node in a WAN is a router that accepts an input packet, examines the destination address, and forwards the packet on to a particular telecommunications line. How does a router decide which line to transmit on? A router must select the one transmission line that will best provide a path to the destination and in an optimal manner. Often many possible routes exist between sender and receiver. 29

Routing 30

Routing The communications network with its nodes and telecommunication links is essentially a weighted network graph. The edges, or telecommunication links, between nodes, have a cost associated with them. The cost could be a delay cost, a queue size cost, a limiting speed, or simply a dollar amount for using that link. 31

Routing 32

Routing The routing method, or algorithm, chosen to move packets through a network should be: Optimal, so the least cost can be found Fair, so all packets are treated equally Robust, in case link or node failures occur and the network has to reroute traffic. Not too robust so that the chosen paths do not oscillate too quickly between troubled spots. 33

Least Cost Routing Algorithm Dijkstra s least cost algorithm finds all possible paths between two locations. By identifying all possible paths, it also identifies the least cost path. The algorithm can be applied to determine the least cost path between any pair of nodes. 34

Least Cost Routing Algorithm 35

Flooding Routing When a packet arrives at a node, the node sends a copy of the packet out every link except the link the packet arrived on. Traffic grows very quickly when every node floods the packet. To limit uncontrolled growth, each packet has a hop count. Every time a packet hops, its hop count is incremented. When a packet s hop count equals a global hop limit, the packet is discarded. 36

Flooding Routing 37

Flooding Routing 38

Centralized Routing One routing table is kept at a central node. Whenever a node needs a routing decision, the central node is consulted. To survive central node failure, the routing table should be kept at a backup location. The central node should be designed to support a high amount of traffic consisting of routing requests. 39

Centralized Routing 40

Distributed Routing Each node maintains its own routing table. No central site holds a global table. Somehow each node has to share information with other nodes so that the individual routing tables can be created. Possible problem with individual routing tables holding inaccurate information. 41

Distributed Routing 42

Adaptive Routing versus Static Routing With adaptive routing, routing tables can change to reflect changes in the network Static routing does not allow the routing tables to change. Static routing is simpler but does not adapt to network congestion or failures. 43

Routing Examples - RIP Routing Information Protocol (RIP) - First routing protocol used on the Internet. A form of distance vector routing. It was adaptive and distributed Each node kept its own table and exchanged routing information with its neighbors. 44

Routing Examples - RIP Suppose that Router A has connections to four networks (123, 234, 345, and 789) and has the following current routing table: Network Hop Cost Next Router 123 8 B 234 5 C 345 6 C 789 10 D 45

Routing Examples - RIP Now suppose Router D sends out the following routing information (note that Router D did not send Next Router information, since each router will determine that information for itself): Network Hop Cost 123 4 345 5 567 7 789 10 46

Routing Examples - RIP Router A will look at each entry in Router D s table and make the following decisions: 1. Router D says Network 123 is 4 hops away (from Router D). Since Router D is 1 hop away from Router A, Network 123 is actually 5 hops away from Router A. That is better than the current entry of 8 hops in Router A s table, so Router A will update the entry for Network 123. 2. Router D says Network 345 is 5 hops away. Add one hop to get to Router D and Network 345 is 6 hops away. That is currently the same hop count as shown in Router A s table for Network 345, so Router A will not update its table. 47

Routing Examples - RIP Router A will look at each entry in Router D s table and make the following decisions: 3. Router D says Network 567 is 7 hops away. Add 1 hop to get to Router D, giving 8 hops. Since Router A has no information about Network 567, Router A will add this entry to its table. And since the information is coming from Router D, Router A s Next Router entry for network 567 is set to D. 4. Router D says Network 789 is 10 hops away. Add 1 hop to get to Router D. The value of 11 hops is worse than the value currently in Router A s table. Since Router A currently has information from Router D, and Router D is now saying it takes more hops to get to Network 789, then Router A has to use this information. 48

Routing Examples - RIP Router A s updated routing table will thus look like the following: Network Hop Cost Next Router 123 5 D 234 5 C 345 6 C 567 8 D 789 11 D 49

Routing Examples - OSPF Open Shortest Path First (OSPF) - Second routing protocol used on the Internet A form of link state routing It too was adaptive and distributed but more complicated than RIP and performed much better 50

Network Congestion When a network or a part of a network becomes so saturated with data packets that packet transfer is noticeably impeded, network congestion occurs. What can cause network congestion? Node and link failures; high amounts of traffic; improper network planning. When serious congestion occurs buffers overflow and packets are lost. 51

Network Congestion What can we do to reduce or eliminate network congestion? An application can observe its own traffic and notice if packets are disappearing. If so, there may be congestion. This is called implicit congestion control. The network can inform its applications that congestion has occurred and the applications can take action. This is called explicit congestion control. 52

Congestion Avoidance Before making a connection, user requests how much bandwidth is needed, or if connection needs to be realtime Network checks to see if it can satisfy user request If user request can be satisfied, connection is established If a user does not need a high bandwidth or real-time, a simpler, cheaper connection is created This is often called connection admission control Asynchronous transfer mode is a very good example of Data this Communications (Chapter and Computer Eleven) Networks: A Business User's Approach, Seventh Edition 53

WANs In Action: The Smart Phone The network structure that support cell phones and smartphones is growing more complex every day All phones within transmission distance of a cell tower are participating in a broadcast network 54

WANs In Action: The Smart Phone Figure 9-15 Interconnection of network clouds 55

WANs In Action: The Smart Phone Once your data/signal reaches the cell tower, the data becomes part of a packet-switched network within the telephone company If the data moves from the telephone company into the Internet, then your data is passed from one packet switched network to another 56

Summary A metropolitan area network is fast, fiber-based, has very small failover times, and is often dynamically provisional Early MANs were SONET-based, but Ethernetbased MANs are becoming very popular SONET-based MANs are rings, while Ethernetbased MANs are meshes Metro Ethernet is a popular form of MAN 57

Summary (continued) Wide area networks cover states, countries, the world User connects to a station and the station interfaces to a network node A WAN cloud is based upon nodes (routers/switches) and high-speed links WANs can be circuit-switched (fading away) or packet switched (datagram and virtual circuit) RIP and OSPF are two routing protocols 58