Architectures de communication



Similar documents
Domain 1 - Describe Cisco VoIP Implementations

Security Functions and Purposes of Network Devices and Technologies (SY0-301) Firewalls. Audiobooks

Domain 1 Components of the Cisco Unified Communications Architecture

Your organization has a Class B IP address of Before you implement subnetting, the Network ID and Host ID are divided as follows:

Management of Wireless Sensor Networks using TCP/IP

June 3, Voice over IP

Data Center Ethernet Facilitation of Enterprise Clustering. David Flynn, Linux Networx Orlando, Florida March 16, 2004

Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out

E-Plex Enterprise Access Control System

iprox sensors iprox inductive sensors iprox programming tools ProxView programming software iprox the world s most versatile proximity sensor

BaanERP 5.0c. EDI User Guide

! encor e networks TM

Verizon Wireless Broadband Network Connectivity and Data Transport Solutions. Verizon Wireless White Paper

ODBC. Getting Started With Sage Timberline Office ODBC

Message Exchange in the Utility Market Using SAP for Utilities. Point of View by Marc Metz and Maarten Vriesema

BaanERP. BaanERP Windows Client Installation Guide

(VCP-310)

Domain 1: Configuring Domain Name System (DNS) for Active Directory

Baan Service Master Data Management

Configuring Additional Active Directory Server Roles

InventoryControl. The Complete Inventory Tracking Solution for Small Businesses

SYSTEM INFO. MDK - Multifunctional Digital Communications System. Efficient Solutions for Information and Safety

Engineering Data Management

Bio-Plex Manager Software

Domain 1: Designing a SQL Server Instance and a Database Solution

The OSI and TCP/IP Models. Lesson 2

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

Telecom. White Paper. Actionable Intelligence in the SDN Ecosystem: Optimizing Network Traffic through FRSA

Communication Networks. MAP-TELE 2011/12 José Ruela

Network Models OSI vs. TCP/IP

Desktop Management. Desktop Management Tools

Protocol Architecture

CS100: Introduction to Computer Science

Lesson 17 Pearson s Correlation Coefficient

PUBLIC RELATIONS PROJECT 2016

STUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA. Maya Maria, Universitas Terbuka, Indonesia

Systems Design Project: Indoor Location of Wireless Devices

How To Design A Layered Network In A Computer Network

Professional Networking

Communications and Computer Networks

IT Support n n support@premierchoiceinternet.com. 30 Day FREE Trial. IT Support from 8p/user

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

One Goal. 18-Months. Unlimited Opportunities.

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine

L5352 Ethernet Communications Interface

Networking Test 4 Study Guide

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.

CPS221 Lecture: Layered Network Architecture

Agenda. Outsourcing and Globalization in Software Development. Outsourcing. Outsourcing here to stay. Outsourcing Alternatives

How To Understand The Layered Architecture Of A Network

Equalizer Installation and Administration Guide

Confidence Intervals for One Mean

Z-TEST / Z-STATISTIC: used to test hypotheses about. µ when the population standard deviation is unknown

Objectives of Lecture. Network Architecture. Protocols. Contents

3G Security VoIP Wi-Fi IP Telephony Routing/Switching Unified Communications. NetVanta. Business Networking Solutions

THE TCP/IP PROTOCOL SUITE

8 Interconnection. Networks and Clusters 8

SOCIAL MEDIA. Keep the conversations going

Determining the sample size

Distributed Queue Dual Bus (DQDB) Metropolitan Area Networks. DQDB - Transmission principle. DQDB - Example MAN

Properties of MLE: consistency, asymptotic normality. Fisher information.

FUEL / VEHICLE TRACKING UNIT GPS tracking and fuel monitoring solution providers

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Flood Emergency Response Plan

National Institute on Aging. What Is A Nursing Home?

Location, Location, Location! Modeling Data Proximity in the Cloud

Protocols. Packets. What's in an IP packet

Overview of TCP/IP. TCP/IP and Internet

CREATIVE MARKETING PROJECT 2016

Understanding Active Directory Services

OpenText RightFax Fax Server

Repeating Decimals are decimal numbers that have number(s) after the decimal point that repeat in a pattern.

Computer Networks CS321

Document Control Solutions

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

Multiplexers and Demultiplexers

ORBCOMM - SYSTEM STATUS, EVOLUTION AND APPLICATIONS. Workshop Satellitenkommunikation in Deutschland DLR / Köln-Porz

On the Capacity of Hybrid Wireless Networks

Transport and Network Layer

Incremental calculation of weighted mean and variance

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method

5: Introduction to Estimation

Radio Dispatch Systems

CCH Accountants Starter Pack

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

PENSION ANNUITY. Policy Conditions Document reference: PPAS1(7) This is an important document. Please keep it in a safe place.

CHAPTER 3 DIGITAL CODING OF SIGNALS

Transcription:

Architectures de commuicatio C. Pham RESO-LIP/INRIA Uiversité Lyo 1, http://www.es-lyo.fr/~cpham basé sur les supports de Keshav, du livre: A Egieerig Approach to Computer Networkig et les supports de l UREC

Ce que ous allos voir Pourquoi avos ous besoi de défiir ue architecture de commuicatio? Quelle architecture? Les avatages et les icovéiets de ces architectures. Cours de C. Pham, Uiv. Lyo 1

Example Exchage a file over a etwork that corrupts packets but does t lose or reorder them A simple protocol sed file as a series of packets sed a checksum receiver seds OK or ot-ok message seder waits for OK message if o respose, reseds etire file Problems sigle bit corruptio requires retrasmissio of etire file what if lik goes dow? what if ot-ok message itself is corrupted? Cours de C. Pham, Uiv. Lyo 1

Défiir ue architecture de commuicatio Peut-o défiir ue architecture qui soit: Modulaire? Flexible? Performate? Portable? Même problématique que lorsque l o écrit u programme O cherche à idetifier les procédures de base (gééricité, modularité ) O découpe le programme e esemble foctioel, chaque esemble pouvat être iter-chageable. O va doc idetifier les services de base d u réseau et ce que doit fourir ue architecture de commuicatio Cours de C. Pham, Uiv. Lyo 1

Les services de base A vous de jouer! Cours de C. Pham, Uiv. Lyo 1

Protocols Key poit i etworkig: tells how to behave ad commuicate to be uderstood Sytax of a message what fields does it cotai? i what format? Sematics of a message what does a message mea? for example, ot-ok message meas receiver got a corrupted file Actios to take o receipt of a message for example, o receivig ot-ok message, retrasmit the etire file Cours de C. Pham, Uiv. Lyo 1

Aother way to view a protocol As providig a service The example protocol provides reliable file trasfer service Peer etities use a protocol to provide a service to a higher-level peer etity for example, postal workers use a protocol to preset customers with the abstractio of a ureliable letter trasfer service Cours de C. Pham, Uiv. Lyo 1

Protocol layerig A etwork that provides may services eeds may protocols Turs out that some services are idepedet But others deped o each other Protocol A may use protocol B as a step i its executio for example, packet trasfer is oe step i the executio of the example reliable file trasfer protocol This form of depedecy is called layerig reliable file trasfer is layered above packet trasfer protocol like a subroutie Cours de C. Pham, Uiv. Lyo 1

Protocol stack A set of protocol layers Each layer uses the layer below ad provides a service to the layer above Key idea oce we defie a service provided by a layer, we eed kow othig more about the details of how the layer actually implemets the service iformatio hidig decouples chages Cours de C. Pham, Uiv. Lyo 1

Some termiology Service access poit (SAP) iterface betwee a upper layer ad a lower layer Protocol data uits (PDUs) packets exchaged betwee peer etities Service data uits (SDUs) packets haded to a layer by a upper layer PDU = SDU + optioal header or trailer Example letter trasfer service protocol data uit betwee customers = letter service data uit for postal service = letter protocol data uit = mailbag (aggregatio of letters) (what is the SDU header?) Cours de C. Pham, Uiv. Lyo 1

SAP, SDU, PDU... Cours de C. Pham, Uiv. Lyo 1

The importace of beig layered Breaks up a complex problem ito smaller maageable pieces ca compose simple service to provide complex oes for example, WWW (HTTP) is Java layered over TCP over IP (ad uses DNS, ARP, DHCP, RIP, OSPF, BGP, PPP, ICMP) Abstractio of implemetatio details separatio of implemetatio ad specificatio ca chage implemetatio as log as service iterface is maitaied Ca reuse fuctioality upper layers ca share lower layer fuctioality example: WiSock o Microsoft Widows Cours de C. Pham, Uiv. Lyo 1

Layerig There is a tesio betwee iformatio-hidig (abstractio) ad achievig good performace Art of protocol desig is to leak eough iformatio to allow good performace but ot so much that small chages i oe layer eed chages to other layers Cours de C. Pham, Uiv. Lyo 1

ISO OSI referece model A set of protocols is ope if protocol details are publicly available chages are maaged by a orgaizatio whose membership ad trasactios are ope to the public A system that implemets ope protocols is called a ope system Iteratioal Orgaizatio for Stadards (ISO) prescribes a stadard to coect ope systems ope system itercoect (OSI) Has greatly iflueced thikig o protocol stacks Cours de C. Pham, Uiv. Lyo 1

ISO OSI Referece model formally defies what is meat by a layer, a service etc. Service architecture describes the services provided by each layer ad the service access poit Protocol architecture set of protocols that implemet the service architecture compliat service architectures may still use o-compliat protocol architectures Cours de C. Pham, Uiv. Lyo 1

Le modèle OSI Cours de C. Pham, Uiv. Lyo 1

La couche physique Moves bits betwee physically coected edsystems 00110100011011001 Stadard prescribes codig scheme to represet a bit shapes ad sizes of coectors bit-level sychroizatio Postal etwork techology for movig letters from oe poit to aother (trais, plaes, vas, bicycles, ships ) Iteret 1 0 1 0 techology to move bits o a wire, wireless lik, satellite chael etc. Cours de C. Pham, Uiv. Lyo 1

La couche Liaiso Itroduit la otio de trame Esemble de bits faisat partie d ue iformatio a faire passer Ex: u e-mail From - Thu Ju 6 16:04:02 2002 Retur-Path: <saissa@bat710.uiv-lyo1.fr> Received: from pluvier (pluvier.es-lyo.fr [140.77.167.5]) by oceaite.es-lyo.fr (Postfix) with SMTP id 32AC0320017 for <Cogduc.Pham@es-lyo.fr>; Thu, 6 Ju 2002 15:55:33 +0200 (CEST) Received: from bat710.uiv-lyo1.fr ([134.214.88.10] idet=root) by pluvier with smtp (Exim 3.35 #1 (Debia)) id 17Fxjb-0002sg-00 for <Cogduc.Pham@es-lyo.fr>; Thu, 06 Ju 2002 15:55:27 +0200 Received: from b710paa (b710paa.uiv-lyo1.fr [134.214.89.94]) by bat710.uiv-lyo1.fr (8.9.3/8.9.3/Debia 8.9.3-21) with SMTP id PAA17174 for <Cogduc.Pham@es-lyo.fr>; Thu, 6 Ju 2002 15:55:26 +0200 X-Autheticatio-Warig: bat710.uiv-lyo1.fr: Host b710paa.uiv-lyo1.fr [134.214.89.94] claimed to be b710paa Message-Id: <3.0.1.32.20020606160536.0096f670@bat710.uiv-lyo1.fr> X-Seder: saissa@bat710.uiv-lyo1.fr X-Mailer: Widows Eudora Pro Versio 3.0.1 (32) [F] Date: Thu, 06 Ju 2002 16:05:36 +0200 To: Cogduc.Pham@es-lyo.fr From: Saida AISSA <saissa@bat710.uiv-lyo1.fr> Subject: hello Mime-Versio: 1.0 Cotet-Type: text/plai; charset="iso-8859-1" Cotet-Trasfer-Ecodig: quoted-pritable X-Mozilla-Status: 8001 X-Mozilla-Status2: 00000000 X-UIDL: 1023371733.25522.oceaite,S=1958 Cours de C. Pham, Uiv. Lyo 1

La couche Liaiso (co( co t) Idle markers tell us that a lik is ot carryig a frame Begi ad ed markers delimit a frame O a broadcast lik (such as Etheret) ed-system must receive oly bits meat for it eed datalik-layer address also eed to decide who gets to speak ext these fuctios are provided by Medium Access sublayer (MAC) Some data liks also retrasmit corrupted packets ad pace the rate at which frames are placed o a lik part of logical lik cotrol sublayer layered over MAC sublayer Cours de C. Pham, Uiv. Lyo 1

La couche Liaiso (co( co t.) Datalik layer protocols are the first layer of software Very depedet o uderlyig physical lik propeties Usually budle both physical ad datalik layer o host adaptor card example: Etheret Postal service mail bag frames letters Iteret a variety of datalik layer protocols most commo is Etheret others are FDDI, SONET, HDLC Cours de C. Pham, Uiv. Lyo 1

Network layer Logically cocateates a set of liks to form the abstractio of a ed-to-ed lik Allows a ed-system to commuicate with ay other ed-system by computig a route betwee them Hides idiosycrasies of datalik layer Provides uique etwork-wide addresses Foud both i ed-systems ad i itermediate systems At ed-systems primarily hides details of datalik layer segmetatio ad reassembly error detectio Cours de C. Pham, Uiv. Lyo 1

Network layer (cotd.) At itermediate systems participates i routig protocol to create routig tables resposigle for forwardig packets schedulig the trasmissio order of packets choosig which packets to drop Cours de C. Pham, Uiv. Lyo 1

Two types of etwork layers I datagram etworks provides both routig ad data forwardig I coectio-orieted etwork we distiguish betwee data plae ad cotrol plae data plae oly forwards ad schedules data (touches every byte) cotrol plae resposible for routig, call-establishmet, callteardow (does t touch data bytes) Cours de C. Pham, Uiv. Lyo 1

Network layer Postal etwork set up iteral routig tables forward letters from source to destiatio static routig multiple qualities of service Iteret etwork layer is provided by Iteret Protocol foud i all ed-systems ad itermediate systems provides abstractio of ed-to-ed lik segmetatio ad reassembly packet-forwardig, routig, schedulig uique IP addresses ca be layered over aythig, but oly best-effort service Cours de C. Pham, Uiv. Lyo 1

Couche OSI pour l itercoexio Cours de C. Pham, Uiv. Lyo 1

Trasport layer Network provides a raw ed-to-ed service Trasport layer creates the abstractio of a errorcotrolled, flow-cotrolled ad multiplexed ed-toed lik Error cotrol message will reach destiatio despite packet loss, corruptio ad duplicatio retrasmit lost packets; detect, discard, ad retrasmit corrupted packets; detect ad discard duplicated packets Flow cotrol match trasmissio rat to rate curretly sustaiable o the path to destiatio, ad at the destiatio itself Cours de C. Pham, Uiv. Lyo 1

Trasport layer (cotd.) Multiplexes multiple applicatios to the same ed-toed coectio adds a applicatio-specific idetifier (port umber) so that receivig ed-system ca had i icomig packet to the correct applicatio Some trasport layers provide fewer services e.g. simple error detectio, o flow cotrol, ad o retrasmissio lightweight trasport layer Cours de C. Pham, Uiv. Lyo 1

Trasport layer (cotd.) Postal system does t have a trasport layer implemeted, if at all, by customers detect lost letters (how?) ad retrasmit them Iteret two popular protocols are TCP ad UDP TCP provides error cotrol, flow cotrol, multiplexig UDP provides oly multiplexig Cours de C. Pham, Uiv. Lyo 1

Sessio layer Not commo Provides full-duplex service, expedited data delivery, ad sessio sychroizatio Duplex if trasport layer is simplex, cocateates two trasport edpoits togeter Expedited data delivery allows some messages to skip ahead i ed-system queues, by usig a separate low-delay trasport layer edpoit Sychroizatio allows users to place marks i data stream ad to roll back to a prespecified mark Cours de C. Pham, Uiv. Lyo 1

Example Postal etwork suppose a compay has separate shippig ad receivig clerks chief clerk ca maage both to provide abstractio of a duplex service chief clerk may also sed some messages usig a courier (expedited service) chief clerk ca arrage to have a set of messages either delivered all at oce, or ot at all Iteret does t have a stadard sessio layer Cours de C. Pham, Uiv. Lyo 1

Presetatio layer Ulike other layers which deal with headers presetatio layer touches the applicatio data Hides data represetatio differeces betwee applicatios e.g. edia-ess Ca also ecrypt data Usually ad hoc Postal etwork traslator traslates cotets before givig it to chief clerk Iteret o stadard presetatio layer oly defies etwork byte order for 2- ad 4-byte itegers Cours de C. Pham, Uiv. Lyo 1

Applicatio layer The set of applicatios that use the etwork Does t provide services to ay other layer Postal etwork the perso who uses the postal system suppose maager wats to sed a set of recall letters traslator traslates letters goig abroad chief clerk seds some priority mail, ad some by regular mail mail clerk seds a message, retrasmits if ot acked postal system computes a route ad forwards the letters datalik layer: letters carried by plaes, trais, automobiles physical layer: the letter itself Cours de C. Pham, Uiv. Lyo 1

Les primitives de services das OSI X peut être 'importe quelle primitives de services d'ue couche doée. Ex: T_CONNECT.request, N_DATA.idicatio Cours de C. Pham, Uiv. Lyo 1

Layerig We have broke a complex problem ito smaller, simpler pieces Provides the applicatio with sophisticated services Each layer provides a clea abstractio to the layer above Cours de C. Pham, Uiv. Lyo 1

Why seve layers? Need a top ad a bottom -- 2 Need to hide physical lik, so eed datalik -- 3 Need both ed-to-ed ad hop-by-hop actios; so eed at least the etwork ad trasport layers -- 5 Sessio ad presetatio layers are ot so importat, ad are ofte igored So, we eed at least 5, ad 7 seems to be excessive Note that we ca place fuctios i differet layers Cours de C. Pham, Uiv. Lyo 1

Le modèle TCP/IP par rapport à OSI Cours de C. Pham, Uiv. Lyo 1

Problems with layerig Layerig hides iformatio if it did t the chages to oe layer could require chages everywhere layerig violatio But sometimes hidde iformatio ca be used to improve performace for example, flow cotrol protocol may thik packet loss is always because of etwork cogestio if it is, istead, due to a lossy lik, the flow cotrol breaks this is because we hid iformatio about reaso of packet loss from flow cotrol protocol Cours de C. Pham, Uiv. Lyo 1

La ormalisatio 2 orgaismes de ormalisatio pour les réseaux L'ISO (Iteratioal Stadardizatio Orgaizatio) UIT-T (Uio Iteratioale des Télécommuicatio) ex CCITT L'ISO est dépedat de l'onu, les représetats atioaux sot les orgaismes atioaux de ormalisatio ANSI (USA) AFNOR (Frace) DIN (Allemage) BSI (Royaume Ui) HSC (Japo) L'UIT-T compred des idustriels et des opérateurs de télécommuicatio Cours de C. Pham, Uiv. Lyo 1