Overview. Communication Networks. Nodes and Links. Nodes and Links. Topology. Topology. Telecommunications 1 P. Mathys



Similar documents
Computer Networks Vs. Distributed Systems

Computer Networks CS321

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Protocols. Packets. What's in an IP packet

Chapter 5. Data Communication And Internet Technology

ICS 153 Introduction to Computer Networks. Inst: Chris Davison

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

TCP/IP Protocol Suite. Marshal Miller Chris Chase

MANAGEMENT INFORMATION SYSTEMS 8/E

Telecommunications, Networks, and Wireless Computing

Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Ethernet. Ethernet. Network Devices

Communication Networks. MAP-TELE 2011/12 José Ruela

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

CSE 3461 / 5461: Computer Networking & Internet Technologies

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

The OSI and TCP/IP Models. Lesson 2

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

28 Networks and Communication Protocols

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

Based on Computer Networking, 4 th Edition by Kurose and Ross

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Computer Networking: A Survey

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

C Information Systems for Managers Fall 1999

IT4405 Computer Networks (Compulsory)

Introduction to computer networks and Cloud Computing

CSCI 362 Computer and Network Security

Local-Area Network -LAN

Objectives of Lecture. Network Architecture. Protocols. Contents

ICTTEN8195B Evaluate and apply network security

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.


Network Edge and Network Core

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

Introduction cont. Some Structure in the Chaos. Packet switching versus circuit switching. Access networks and physical media

Think! Think! Data communications. Long-Distance. Modems: to analog and back. Transmission Media. The last mile is the hardest for digital information

How To Understand The Layered Architecture Of A Network

WAN Technology. Heng Sovannarith

Local Area Networks (LANs) Blueprint (May 2012 Release)

Introduction Chapter 1. Uses of Computer Networks

Computer Networks. Computer Networks. Telecommunication Links. Connecting. Connecting via Telephone Lines ISDN

Computer Networking Networks

Layered protocol (service) architecture

Computer Networks III

Network+ Guide to Networks 6 th Edition. Chapter 7 Wide Area Networks

Network Layer. Introduction Datagrams and Virtual Circuits Routing Traffic Control. Data delivery from source to destination.

Data Communication Networks and Converged Networks

Introduction to Computer Networks and Data Communications

Protocols and Architecture. Protocol Architecture.

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Chapter 2 - The TCP/IP and OSI Networking Models

Module 15: Network Structures

SSVVP SIP School VVoIP Professional Certification

Chapter 4 Connecting to the Internet through an ISP

1 Introduction to mobile telecommunications

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

Chapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN)

Chapter 14: Distributed Operating Systems

Real-Time (Paradigms) (51)

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Chapter 16: Distributed Operating Systems

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

TCIPG Reading Group. Introduction to Computer Networks. Introduction 1-1

Networking 4 Voice and Video over IP (VVoIP)

Lecture 28: Internet Protocols

CHAPTER - 10 COMPUTER NETWORKING

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Communications and Computer Networks

SSVP SIP School VoIP Professional Certification

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Communication Systems Internetworking (Bridges & Co)

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

This course has been retired. View the schedule of current <a href=

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Terms VON. VoIP LAN WAN CODEC

Chapter 9. IP Secure

Overview of Computer Networks

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

: Instructor

Zarządzanie sieciami telekomunikacyjnymi

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Planeamento e Gestão de Redes. Análise de Requisitos

Analog vs. Digital Transmission

Transcription:

Overview ommunication Networks ommunication Networks Telecommunications 1 P. Mathys Layout (Hardware) - Nodes, Links - Topology -Media - apacity, Speed - onnectivity - Redundancy - Switches, Routers - Geographical Extent - ackbone - Wireless - Satellite Protocols (Software) - ircuit Switching - Packet Switching - Multiplexing -TP/IP -TM, Frame Relay -Protocol Stack - Error ontrol, RQ - onflict Resolution - Point-to-point bit pipe - Routing, Flow ontrol - Encryption Systems Level - Throughput, elay - Reliability -IP Network - PSTN, SL, ISN - LN, MN, WN - Ethernet, Token Ring - Traffic: Voice, ata, Multimedia - Gateways, Firewalls - OSI Model Nodes and Links Nodes and Links network has nodes connected by links: External Node Internal Node Network External Node External nodes are users and sometimes access points to other networks. Internal nodes are part of the network infrastructure and perform various tasks. Links provide interconnections between nodes. The goal is to have a path from any node to any other node without the need for an excessive number of links. Topology Topology Fully connected Star Ring us Tree Spanning Tree In a spanning tree there is exactly one path from every node to every other node and there are no cycles. Spanning Tree Topology Uses the least amount of links to connect all nodes, but offers no redundancy. Topology: onfiguration formed by the connection between internal/external nodes of a network.

Example: Telephone Network Example: Internet WN: Wide rea Network MN: Metropolitan rea Network LN: Local rea Network ompetitors Telephone EO Router WN 1 ompetitors ackbone Network LN 2 ackbone Network WN 2 Router LN 1 Switch Switch Firewall EO EO EO Telephone omputer Gateway LN LT Gateway EO: End office or local central office LT: Local access and transport area LN: Long distance network LN omputer MN Geographical Extent Example: able & Wireless US ackbone WN (wide area network), 100-1000 km MN (metropolitan area network), 10-100 km LN (local area network), 10-1000 m PN (personal area network), 1-10 m From: http://www.cw.com Internal Nodes Main function: onnect incoming link to right outgoing link. Telephone network: Internal nodes are called switches. Internet: Internal nodes are called routers. Nodes are computers that are program-med and adapt to network conditions. Internet Terminology Gateway: device which interconnects two or more networks. Firewall: Security system to protect a network against external threats. Router: n internal network device that forwards messages from incoming to outgoing links based on address and network state information.

What are Links Made From? Wire, twisted wire e.g., telephone, Ethernet oaxial cable e.g., cable TV Optical fiber e.g., backbone of Internet Wireless: M, FM, microwave, optical e.g., radio, satellite, IR beams Link haracterization Rate or speed in bps (bits per second), kbps, Mbps, Gbps (kilo-, Mega-, Giga-bps). single telephone channel without compression uses 64 kbps. 24 telephone channels plus overhead use 24x64+8=1544 kbps or 1.544 Mbps (T1). T-arrier Hierarchy T1 is a high speed digital network using pulse code modulation (PM), developed and implemented by T&T around 1960. T1: 1.544 Mbps (24 voice channels) T1: 3.152 Mbps (48 voice channels) T2: 6.312 Mbps (96 voice channels) T3: 44.736 Mbps (1 video or 672 voice ch.) T4: 274.176 Mbps (6 video or 4032 voice) Optical arrier (O) Levels O-1: 51.84 Mbps (approx 1 video or 750 voice channels) O-3: 155.52 Mbps O-12: 622.08 Mbps O-48: 2488.32 Mbps O-192: 10 Gbps O-768: 40 Gbps (approx 1000 video ch.) IEEE 802.x Standards 802.3 SM/ (carrier sense multiple access with collision detection) Ethernet 802.5 Token ring LNs 802.11 Wireless LNs 802.15 Wireless PNs (personal area networks) 802.16 Wireless stationary point-tomultipoint LNs/MNs How to Transport ata Suppose you have data that needs to be transmitted from user to user. Should you ask the network to set up a dedicated path from user to user? Or should you break up the data into standard size packets and let the network decide on the fly how to best send the packets from user to user?

ircuit vs. Packet Switching The telephone network was optimized for analog voice communication. direct path between two parties is established for each conversation session. Traffic between computers is usually bursty, i.e., short packets of data are exchanged rapidly, followed by relatively long periods of inactivity. ircuit vs. Packet Switching ecause of the relatively long periods of inactivity between transactions or messages, it is not economical to set up a dedicated network path between two computers. Instead, successive messages between two computers are addressed and sent individually, not necessarily using the same path. Long messages are broken up into packets. Example: ar Rental Example: Using the us Suppose you re on a vacation and rent a car for one week. You will have to pay the rental fee whether you actually drive the car or have it parked in a parking lot. ut whenever you need to go somewhere, the car is right there and you can use it immediately. This is the essential idea behind circuit switching. Suppose you go downtown with the bus. You only pay the bus while you ride it. The fare is cheap because you can share the bus with many other people. ut the bus route is fixed and you may have to change along the way to get to your destination. In addition, you may have to wait for the next available bus. This is similar to packet switching in networks. ircuit Switching Packet Switching Telephone network: Fixed path between two users is established at beginning of telephone call. Internet: Messages are broken into packets which travel individually over dynamically assigned paths. ->... annot have -> and -> simultaneously Link sharing: an have -> and -> simultaneously (alternating rapidly)

Layered Network rchitecture ata networks are rather complex to design and implement. To make the complexity manageable, most networks use a layered architecture. Each layer has specific, well defined tasks. Layers at the same level in different computers are referred to as peers. Protocols The rules and conventions used in the peer-to-peer communications at a given layer are collectively called a protocol. Protocols used on the Internet are TP, IP, and UP (User atagram Protocol). list of protocols that is used at each layer in a certain network architecture is called a protocol stack. Layers: Example You are the president of company in oulder and want to offer the services of your company to your peer, the president of company Y in New York. You write a letter, starting with ear ob, may I, and ending with Sincerely yours, Jim. The phrases ear ob and Sincerely yours are part of the peer-to-peer protocol when writing letters. Layers: Example (contd.) To actually get the letter to the president of company Y, you use the services of the next lower layer. Specifically, you ask your secretary to put a destination address, a return address, and a stamp onto an envelope, and to put the letter inside the envelope. The peer of the secretary in company is the secretary in company Y. Layers: Example (contd.) The secretary in turn uses the services of the next lower layer and brings the letter to the post office in oulder. Its peer is the post office in New York. The post office in oulder collects all letters for New York, brings them to the airport, and flies them to New York. The airplane represents the bottom layer, which is called physical layer. The OSI 7 Layer Model In an attempt to standardize network architectures, the ISO (International Standards Organization) issued the OSI (Open Systems Interconnection) model in 1984 (ten years after the TP/IP reference model was first defined in 1974). The OSI model has 7 layers which are shown on the following slide.

OSI 7 Layer Model WWW and Internet Open Systems Interconnect (OSI) Reference Model for computer networking Web rowser/www Server Level where applications access network services, e.g., e-mail, WWW Intermediary format that specifies/handles presentation of data, e.g., html Used to establish, use and end sessions between applications, e.g., http oes packetizing, error recognition/recovery between end users, e.g., TP Physical/logical addressing, routing, switching, flow control, e.g., IP Package bits into frames, media access, point-to-point comm, e.g., Ethernet Transmits bits over physical medium such as optical fiber, twisted pair wire, etc HTML (Hypertext Markup Language) HTTP (Hypertext Transfer Protocol) Telnet, ftp, SMTP TP (Transmission ontrol Protocol) IP (Internet protocol) Ethernet, TM, PPP Twisted pair wire, optical fiber, wireless OSI Model Networking OSI Model (7) pplication Layer (6) Presentation Layer (5) Session Layer (4) Transport Layer (3) Network Layer (2) ata Link Layer (1) Physical Layer Services Performed by Layers Physical Layer (1): Transmit raw bits over physical medium onvert bits to waveforms and vice versa ata Link Layer (2): Transfer data frames reliably on point-topoint or multi-access links Error detection/correction, RQ (automatic repeat request), contention resolution Services Performed by Layers Network Layer (3): Transfer and route packets reliably between sub-networks Routing algorithms, congestion control Transport Layer (4): Transparent, reliable and cost-effective data transfer between end systems reak messages into packets, flow control, additional end-to-end reliability.

Services Performed by Layers Session Layer (5): Provide mechanism for organizing and structuring interactions between application processes (e.g., token management) Presentation Layer (6): Provide independence from differences in data representations (e.g., SII vs. Unicode) ata compression, code conversion Services Performed by Layers pplication Layer (7): Provide uniform semantics for applications running in different environments Terminal emulation, file conversion/transfer Note: In practice the most important layers are 1 4, the others are seldom implemented explicitly within the network architecture. TP/IP Model The TP/IP model grew out of the RP-NET project. Researchers recognized early on (1974) the importance of interconnecting networks of different makes and topologies. TP/IP deliberately only specifies layers 3 and 4 of the OSI model; lower layers can be implemented in a variety of ways. TP/IP is the most widely implemented model. MIME Layer 4 Layer 3 Layer 2 Layer 1 TP/IP Model SMTP Telnet RP FTP HTTP TP IP NS UP Ethernet, Token Ring, Token us, FI, Sonet, ISN, TM, Wireless, etc SNMP Physical Medium (able) TP/IP Model TP/IP Model cronyms: SMTP: Simple mail transfer protocol MIME: Multipurpose internet mail extensions FTP: File transfer protocol HTTP: Hypertext transfer protocol NS: omain name system SNMP: Simple network management protocol SNTP: Simple network time protocol cronyms: TP: Transmission control protocol UP: User datagram protocol RP: ddress resolution protocol (IP <--> LN) IP: Internet protocol FI: Fiber distributed data interface ISN: Integrated services digital network TM: synchronous transfer mode

Internet Protocol (IP) IP is the workhorse protocol of the TP/IP protocol stack. It provides an unreliable connectionless datagram delivery service. IP implements layer 3 (network layer) of the OSI model. The main task of the IP is the routing and the fragmentation and reassembly of datagrams. ata Transmission using the Internet Protocol (IP) How does data get transmitted on the Internet from one computer to another? ata is broken up into packets at the sender and reassembled at the receiver. Each data packet is individually labeled with a source and a destination address. Source and destination addresses are 32-bit numbers (under IP v4). Internet Protocol (IP) IP Header (for each packet) To perform its functions and to communicate among peers, the IP layer adds a header to the data packets (called payload ) that it receives for transmission, as shown in the next slide. The most important fields in the header are: Source/destination IP address Total length, TTL (time to live) 32 bits wide Network and Host Numbers Network numbers used to be globally administered by the InterNI. Now there are several commercial agents (e.g., http://www.networksolutions.com). Host numbers are locally administered Global routing decisions can be made on the basis of the network numbers. Local routing decisions only need to take the host numbers into account. IPv4 ddress lasses lass Network # Host # Usage 8 bits 24 bits Very large sites 16 bits 16 bits Large sites 24 bits 8 bits Small sites n/a n/a Multicast address E n/a n/a Reserved IP address = <network #><host #> (32 bits total)

IPv4 ddress lasses lass Network Numbers Hosts/Network 0 127 16,777,214 128.0 191.255 65,534 192.0.0 223.255.255 254 224.0.0.0 239.255.255.255 n/a E 240.0.0.0 255.255.255.255 n/a Subnets In practice, individual subnets rarely consist of more than 100...200 computers. Thus, the original host # is subdivided (by the local network administration) into a subnet # and a new (shorter) host #. For example, 128.138.129.2 is interpreted as Network #: 128.138 (administered globally) Subnet #: 129 (administered locally) Host #: 2 (administered locally) Examples 192.149.89.61 is a class address: Network #: 192.149.89 Host #: 61 128.138.129.2 is a class address: Network #: 128.138 Subnet #: 129 Host #: 2 18.69.0.27 is a class address: Network #: 18 Subnet #: 69.0 Host #: 27 Exploring Network Topology Try to find the website of a network operator, e.g., www.cw.com (able & Wireless), and see if network maps are available. Examine the numerical IP address for network, subnet, and host numbers. Use tools such as tracert or traceroute. traceroute TraceRoute Example traceroute (or tracert) probes the path that data packets take through the Internet, recording all the "hops" (routers) along the way. Using traceroute you can find out how to get to a site, where (approximately) it is located, where bottlenecks along the path are, and where packets are lost

(lmost) Fully onnected Example Weathermap of TEN-155 core Ring Topology Example i-21 fiber-optic network from sigma.dante.org.uk from www.interoute.com Star Topology Example What is est Topology? enters in Prague and rno The network topology is determined by the internal/external nodes and how they are interconnected by links There is no single right topology. Factors that determine topology choice: mount of traffic between locations. ost of links/nodes vs. revenue from users. elay requirements. from www.cesnet.cz Optimization riteria Throughput is the total number of (unit) messages that a communications system can transfer in a fixed time interval. Optimal for network: Maximize throughput. elay is the average amount of time it takes for a message to be transferred from a source node to a destination node. Optimal for user: Minimize delay. Example: elay and Throughput for a Ski Lift Throughput is the total number of skiers transported from bottom to top per hour. elay is the average amount of time it takes for a skier to go from bottom to top, including the time spent waiting in line. The ski lift operator wants to maximize throughput (= # of tickets sold), the skier wants to minimize delay (= time spent not skiing downhill). The two goals are contradictory. => ompromise is necessary.

elay vs. Number of Links elay vs. Number of Links H G F E H G F E ompared to ring: 50% more links, 30% less delay (hops) H G F E # of links: 8*7/2=28 vg delay: 1 hop ompared to ring: 250% more links, 57% less delay (hops) Hops -> 1 -> 2 -> 3 -> E 4 Hops -> F 3 -> G 2 -> H 1 # of links: 8 vg delay: 16/7 = 2.3 hops Hops -> 1 -> 2 -> 2 -> E 1 Hops -> F 2 -> G 2 -> H 1 # of links: 12 vg delay: 11/7 = 1.6 hops H G F E # of links: 8 vg delay: 2 hops One additional node ompared to ring: 0% more links, 13% less delay (hops) One additional node ifferent Topology Features ifferent Topology Features Fully connected N nodes N*(N-1)/2 links vg delay: 1 hop Very robust with respect to link failures Ring N nodes N links vg delay: approx N/4 hops an survive loss of any single link Star N+1 nodes N links vg delay: 2 hops Vulnerable: annot survive loss of central node us N nodes N+1 links vg delay: 1 hop (but collisions can occur) Vulnerable: cannot survive loss of bus ifferent Topology Features What is est Topology? Spanning Tree N nodes N-1 links vg delay: proportional to log N Has no cycles Loss of any link splits network in two onclusions: If links are very expensive, use more strategically placed (internal) nodes. If short delay is very crucial, use more links. Quality of service (QoS) differentiation: onnections with short delay (e.g., for two-way voice communication) can be requested from network if higher price is paid, similar to express mail.