Chapter 16 Networking

Similar documents

Mathatma Gandhi University

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

IT4405 Computer Networks (Compulsory)

Transport Layer Protocols

Lecture 28: Internet Protocols

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

CSCI 362 Computer and Network Security

Based on Computer Networking, 4 th Edition by Kurose and Ross

Data Communication and Computer Network

Introduction to computer networks and Cloud Computing

Internet Concepts. What is a Network?

Objectives of Lecture. Network Architecture. Protocols. Contents

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Module 15: Network Structures

Overview of Computer Networks

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

IP - The Internet Protocol

Data Communication Networks and Converged Networks

Chapter 14: Distributed Operating Systems

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

IT Data Communication and Networks (Optional)

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

Network Models and Protocols

Chapter 16: Distributed Operating Systems

COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Network System Design Lesson Objectives

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

Overview of TCP/IP. TCP/IP and Internet

Chapter 5. Data Communication And Internet Technology

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Computer Networks Vs. Distributed Systems

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Technical Support Information Belkin internal use only

How To Understand The Layered Architecture Of A Network

Introduction to Ethernet

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Level 2 Routing: LAN Bridges and Switches

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

BASIC ANALYSIS OF TCP/IP NETWORKS

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

RARP: Reverse Address Resolution Protocol

Network Topologies. Network Topologies

Protocols and Architecture. Protocol Architecture.

Internet Protocol version 4 Part I

Computer Networks III

How do I get to

The OSI and TCP/IP Models. Lesson 2

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

Communications and Networking

Introduction to Computer Networks

Computer Networking: A Survey

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Internet Protocols. Addressing & Services. Updated:

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

CPS221 Lecture: Layered Network Architecture

Transport and Network Layer

Network Simulation Traffic, Paths and Impairment

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

UPPER LAYER SWITCHING

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Chapter 11. User Datagram Protocol (UDP)

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

CS335 Sample Questions for Exam #2

CS 348: Computer Networks. - IP addressing; 21 st Aug Instructor: Sridhar Iyer IIT Bombay

IP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

Computer Networks. By Hardeep Singh

DATA COMMUNICATION AND NETWORKS

Networked AV Systems Pretest

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

Answer FIVE Questions only. Each carries 20 marks.

CSMA/CA. Information Networks p. 1

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

Networking Test 4 Study Guide

Remote Serial over IP Introduction on serial connections via IP/Ethernet

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Communication Systems Internetworking (Bridges & Co)

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT

6LoWPAN Technical Overview

Protocol Data Units and Encapsulation

The OSI Model: Understanding the Seven Layers of Computer Networks

Transcription:

Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer Protocol (FTP) 16.6 Transport Layer 16.6.1 Transmission Control Protocol (TCP) 16.6.2 User Datagram Protocol (UDP) 16.7 Network Layer 16.7.1 Internet Protocol (IP) 16.7.2 Internet Protocol version 6 (IPv6) 16.8 Link Layer 16.8.1 Ethernet 16.8.2 Token Ring Chapter 16 Networking Outline (continued) 16.8.3 Fiber Distributed Data Interface (FDDI) 16.8.4 IEEE 802.11 (Wireless) 16.9 Client/Server Model 1

Objectives After reading this chapter, you should understand: the central role of networking in today s computer systems. various networking types and topologies. the TCP/IP protocol stack. the capabilities of TCP/IP s application, transport, network and link layers. protocols such as HTTP, FTP, TCP, UDP, IP and IPv6. network hardware and hardware protocols such as Ethernet and Wireless 802.11. the client/server networking model. 16.1 Introduction Hosts Entities that receive and provide services over a network Connected by links TCP/IP protocol stack Provides well-defined interfaces to enable communication between computers across a network and to allow problems to be fixed as they arise Layers Implemented by following certain protocols 2

16.2 Network Topology Network topology Describes relationship between different hosts Logical topology Displays which nodes in a network are directly connected Ring networks Consist of a set of nodes, each maintaining exactly two connections to other nodes Each node in the ring forwards each message, limiting attenuation but introducing a delay for retransmission Star networks Contain a hub that is connected to all other nodes in the network Lower transmission delay than ring networks Messages cannot reach recipients if central hub fails 16.2 Network Topology Network topology (cont) Tree networks Hierarchical networks that consist of a root node and several children that can have children of their own Mesh networks At least two nodes have more than one path connecting them Fully-connected mesh network Directly connects every node to every other node Ad hoc networks Spontaneous Any combination of wireless and wired devices may be connected to it at any time The network topology is not fixed Difficult to have a network governed by central node 3

16.2 Network Topologies Figure 16.1 Network topologies. 16.3 Network Types Local area network (LAN) Limited geographic dispersion and designed to optimize data transfer rates between its hosts Interconnect resources using high-speed communication paths with optimized network protocols for local area environments Error rates lower than those of larger networks Greater management flexibility Independence from constraints of public networking system Wide area networks (WANs) Broader than LAN, connecting two or more LANs Example: the Internet Generally employ mesh topology Operate at slower speeds than LANs and have higher error rates 4

16.4 TCP/IP Protocol Stack TCP/IP protocol stack Composed of four logical levels called layers Application layer Highest level Provides protocols for applications to communicate Transport layer End-to-end communication Relies on network layer to determine proper path from one end of communication to the other Network layer Moving data between computers Link layer Provides an interface between the network layer and the underlying physical medium of the connection 16.5 Application Layer Application layer protocols Specify rules that govern remote interprocess communication Determine how processes should interact Many of the protocols interact with resources on remote hosts Resources are specified by a Uniform Resource Identifier (URI) 5

16.5.1 Hypertext Transfer Protocol (HTTP) The Hypertext Transfer Protocol (HTTP) An application layer protocol that allows the transfer of a variety of data formats HTTP defines a request for a resource and a response Remote host processes the request and replies with a response 16.5.2 File Transfer Protocol (FTP) FTP Application layer protocol that allows file-sharing between remote hosts Specifies connections between two pairs of ports One pair sends control information that governs the session The other sends actual data After a connection is established, the client specifies actions for the FTP server to perform by issuing various requests to server Server attempts to satisfy each request, then issues a response specifying the result 6

16.5.2 File Transfer Protocol (FTP) Figure 16.2 FTP commands. 16.6 Transport Layer Transport layer is responsible for end-to-end communication of messages Connection-oriented approach Hosts send each other control information through handshaking to set up a logical end-to-end connection Imposes reliability on unreliable networks Guarantees that data sent from sender will arrive at intended receiver undamaged and in correct sequence Connectionless approach Two hosts do not handshake before transmission No guarantee that sent messages will be received in their original order, or at all 7

16.6.1 Transmission Control Protocol (TCP) TCP is a connection-oriented transmission protocol Guarantees that segments sent from a sender will arrive at the intended receiver undamaged and in correct sequence Handles error control, congestion control, and retransmission Allow protocols like HTTP and FTP to send information into network as simply and reliably as writing to a file on the local computer 16.6.2 User Datagram Protocol (UDP) Connectionless User Datagram Protocol (UDP) Provides minimum overhead necessary for the transport layer No guarantee that UDP datagrams will reach their destination in their original order, or at all 8

16.7 Network Layer Network layer Receives segments from transport layer and is responsible for sending these packets to the next stop toward destination through process known as routing Routing is a two-step procedure Determine the best route between two points Send packets along this route Routers determine the next host for a given datagram based on information, such as network topologies and link quality Link quality includes strength of signal, error rate and interference Interference is broadcast throughout networks using various router protocols, such as Routing Information Protocol (RIP) 16.7.1 Internet Protocol (IP) Internet Protocol version 4 (IPv4) is the dominant protocol for directing information over a network Destinations on the Internet are specified by IP address IP addresses are 32-bit numbers in IPv4 One of more names can be mapped to an IP address through the Domain Name System (DNS) 9

16.7.2 Internet Protocol version 6 (IPv6) In the near future, there will be more addressable nodes on the Internet than available addresses using IPv4 To combat this problem, Internet Engineering Task Force (IETF) introduced Internet Protocol version 6 (IPv6) IPv6 specifies three types of addresses Unicast Unicast address describes a particular host on the Internet Anycast Anycast addresses are designed to be sent to the nearest host in a group of hosts Multicast Multicast addresses are designed to send packets to all hosts in a group 16.8 Link Layer The link layer Interfaces the software-oriented layer with the physical medium over which frames are sent Is responsible for detecting and, if possible, correcting transmission errors Some systems employ error-correcting codes to correct corrupted frames 10

16.8.1 Ethernet Ethernet uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol 802.3-style CSMA/CD A transceiver tests a shared medium to determine if it is available before transmitting data Due to delays in medium, it is possible that multiple transceivers may decide that the medium is clear and begin transmitting simultaneously If transceivers detect a collision caused by simultaneous transmissions, they continue to transmit bytes for a specific period of time to ensure that all transceivers become aware of the collision Each transceiver, after learning of a collision, waits for a random interval before attempting to transmit again 16.8.2 Token Ring Token Rings Operate on ring networks Employs tokens to gain access to the transmission medium A token controls access to transmission medium is an empty frame that is circulated between machines over a network having logical ring topology 11

16.8.2 Token Ring Token When machine owns the token, it generates data, places it in the frame and sends the frame to its neighbor Each machine forwards the token until it reaches its destination At the destination, the machine Copies the content of the message Marks the frame as having been delivered Passes frame to its neighbor When the original sender receives the frame, it Removes the message from the frame Passes the token to its neighbor 16.8.2 Token Ring Figure 16.3 Sending a message via the Token Ring protocol (Part 1 of 2). 12

16.8.2 Token Ring Figure 16.3 Sending a message via the Token Ring protocol (Part 2 of 2). 16.8.3 Fiber Distributed Data Interface (FDDI) Operates over fiber-optic cable Support more transfers at greater speeds over larger distance Built on two Token Rings The second usually being reserved for backup 13

16.8.4 IEEE 802.11 (Wireless) 802.11 employs a method similar to Ethernet: Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) Require each sender broadcast a Request to Send (RTS) to entire network Upon receiving an RTS Receiver broadcasts a Clear to Send (CTS) message to the entire network if the medium is available 16.9 Client/Server Model In a two-tier system User interface resides on client Data resides on server Application logic lies on one or both of these components Three-tier system Offers a clearer separation of application logic from user interface and data Ideally, logic resides in its own layer Possibly on a separate machine Independent of client and data Increased flexibility and extensibility Trade-off in multitier system Increased network latency and more areas where the network could fail 14

16.9 Client/Server Model Figure 16.4 Three-tier client/server model. 15