Network Architectures - Computing Sciences

Download Report

Transcript Network Architectures - Computing Sciences

Network Architectures
ITEC 370
George Vaughan
1
Sources for Slides
• Material in these slides comes primarily
from course text, Guide to Networking
Essentials,Tomsho, Tittel, Johnson (2007).
• Other sources are cited in line and listed in
reference section.
2
TCP/IP and OSI Models
TCP/IP and OSI Models (OSI-Model, n.d.) and (Tomsho, 2007)
TCP/IP
Layers
Application
PDU
Data
OSI Layers
7 Application
6
5
Transport
Segments 4
Network
Packets
3
Link
Frames
2
Function
Network process to application,
Initiates or accepts a request to transfer
data
Presentation Adds formatting, display, and
encryption of information
Session
Adds communication session control
information, Login/Logout
Transport
Adds End-to-end connections and
reliability, re-sequencing, flow control
Network
Path determination and logical
addressing (IP), translates MAC
address to logical address
LLC
Data
Adds error checking and physical
Link
addressing (MAC & LLC)
Devices - Apps
Standards
Browsers,
servers,
Gateways
Gateways
HTTP, SNMP,
FTP, Telnet
DNS,
Gateways
Gateways
NetBIOS
Routers
IP, ICMP,
ARP, NetBEUI
Switches,
Bridges, NICs
802.3, 802.11,
FDDI
ASCII, MPEG
TCP, UDP
MAC
Bits
1 Physical
Media, signal and binary transmission, Hubs,
sends data as a bit stream
Repeaters
10Base-T, T1,
E1
3
Major Access Methods
• Channel access is handled at the MAC
sublayer of the Data Link layer in the OSI
model
• Five major types of channel access
– Contention
– Switching
– Token passing
– Demand priority
– Polling
4
Contention
•
Carrier Sense Multiple Access Collision Detection
(CSMA/CD)
–
–
–
–
•
Used by Ethernet
Computer listens – if quiet then transmit
If collision occurs, wait and then retry
Server doesn’t have priority over workstation
Carrier Sense Multiple Access with Collision Avoidance
(CSMA/CA)
–
–
–
Used by wireless LANs because not all wireless devices can
hear each other
When network is quiet, device sends ‘intent-to-transmit’ signal
Slower than CSMA/CD
5
Carrier Sense Multiple Access with Collision Detection
(CSMA/CD)
Tomsho, Tittel, Johnson (2007)
6
Switching
•
•
•
•
•
•
Contention only occurs when 2 or more
senders try to access the same receiver
More fair than contention based technologies
Supports multiple, simultaneous transmissions.
Priorities can be assigned for Quality of
Service (QoS)
Different ports can operate at different speeds.
Can emulate all common topologies
7
Token Passing
•
•
•
•
All devices have equal guaranteed
access
Good for time sensitive applications
If only computer is sending it must share
token periodically with other non-sending
devices
Requires more expensive hardware
8
Token Passing
Tomsho, Tittel, Johnson (2007)
9
Demand Priority
•
•
•
Used only by 100VG-AnyLAN (IEEE
802.12)
Smart hubs use ‘round-robin’ to control
access.
Not common, therefore expensive
10
Polling
•
•
•
•
•
One of oldest access methods
Uses centralized controller to control
access
Supports priorities
Not efficient use of network media
Used in IBM’s Systems Network
Architecture (SNA)
11
Polling
Tomsho, Tittel, Johnson (2007)
12
Ethernet Architecture
• Most popular network architecture
• Ranges from 10Mbps – 10 Gbps
• Uses NIC’s MAC address to address frames.
• Access handled at MAC sub-layer of Data Link
layer (layer 2)
• MAC – Media Access Control address
– 48 bits in length
– Unique physical address defined in NIC
• What differs is cable/speed – Frame format is
common – backward compatibility.
13
Ethernet Architecture
• Best effort transmission – no guarantee of frame
delivery.
• Upper layers must ensure reliable delivery.
• Access method is
– CSMA/CD (logical bus – Half Duplex)
– Switching
•
•
•
•
Relies on CRC at frame for error detection.
Bad frames are just dropped at destination
Collisions can occur in Half-Duplex
In Switched topology (Full Duplex), collisions do not
occur.
14
Ethernet Architecture (History)
• 1960s and 1970s: many organizations worked on methods to
connect computers and share data
– E.g., the ALOHA network at the University of Hawaii
– 1972: Robert Metcalf and David Boggs, from Xerox’s
PARC, developed an early version of Ethernet
• 1975: PARC released first commercial version (3 Mbps,
up to 100 computers, max. 1 km of total cable)
• DIX developed standard based on Xerox’s Ethernet (10
Mbps)
• 1990: IEEE defined the 802.3 specification
– Defines how Ethernet networks operate at layers 1-2
15
Accessing Network Media
• Ethernet uses CSMA/CD in a sharedmedia environment (a logical bus)
– Ethernet device listens for a signal or carrier
(carrier sense) on the medium first
– If no signal is present, no other device is
using the medium, so a frame can be sent
– Ethernet devices have circuitry that detects
collisions and automatically resends the frame
that was involved in the collision
16
Collisions and Collision Domains
Tomsho, Tittel, Johnson (2007)
17
Ethernet Error Handling
• Collisions are the only type of error for which Ethernet
automatically attempts to resend the data
• Errors can occur when data is altered in medium
– Usually caused by noise or faulty media connections
– When the destination computer receives a frame, the
CRC is recalculated and compared against the CRC
value in the FCS
– If values match, the data is assumed to be okay
– If values don’t match, the data was corrupted
• Destination computer discards the frame
• No notice is given to the sender
18
Half-Duplex Versus Full-Duplex
Communications
• When half-duplex communication is used with
Ethernet, CSMA/CD must also be used
• When using a switched topology, a computer can send
and receive data simultaneously (full-duplex
communication)
– The collision detection circuitry is turned off because
collisions aren’t possible
– Results in a considerable performance advantage
19
Ethernet Frame
Ethernet Frame Styles (Odom, 2006)
DIX (Ethernet II) – Used in TCP/IP
Preamble
Destination
8
6
Source
6
Type
2
Data
46-1500
FCS
4
IEEE 802.3 (Original)
Preamble
SFD
Destination
7
1
6
Source
6
Length
2
Data
46-1500
FCS
4
IEEE 802.3 (Revised 1997)
Preamble
SFD
Destination
Source
Length
xor Type
2
Data
FCS
46-1500
4
7
1
Field
Preamble
Start Frame Delimiter (SFD)
Destination MAC address
Source MAC Address
Length
Type
Data and Pad
Frame Check Sequence (FCS)
6
6
Length
(Bytes)
7
1
6
6
2
2
46-1500
4
Purpose
Synchronization
Signifies that next byte begins Destination MAC field
Identifies recipient
Sender
Length of data field
Type of protocol of encapsulated data
Holds data from higher layer
Info for receiving NIC to check for errors
20
TCPDUMP
• Unix/Linux command line protocol analyzer
(packet sniffer) used for:
– Debugging networks
– Debugging applications that depend on networking.
– Monitoring traffic
• Available for Windows
• Supports user defined filters
• Command Line syntax:
tcpdump -v –e
• Check Man page for other options
21
TCPDUMP (Cont.)
• Example: Ping (Internet Control Message Protocol)
– 16:23:57.892354 00:15:f2:4d:52:19 > 00:20:ed:73:b7:1d,
ethertype IPv4 (0x0800), length 74: IP (tos 0x0, ttl 128, id 8475,
offset 0, flags [none], proto 1, length: 60) 192.168.1.101 >
192.168.1.12: icmp 40: echo request seq 11520
–
–
–
–
–
–
Timestamp = 16:23:57.892354
Source (MAC Address) = 00:15:f2:4d:52:19
Destination (MAC Address) = 00:20:ed:73:b7:1d
Source IP = 192.168.1.101
Destination IP = 192.168.1.12
Protocol = icmp
22
TCPDUMP (Cont.)
• Example: arp (Address Resolution Protocol)
– 16:22:37.497442 00:15:f2:4d:52:19 > Broadcast,
ethertype ARP (0x0806), length 60: arp who-has
192.168.1.112 tell 192.168.1.101
–
–
–
–
Timestamp = 16:22:37.497442
Source (MAC Address) = 00:15:f2:4d:52:19
Destination (MAC Address) = Broadcast
Protocol = arp who-has 192.168.1.112 tell
192.168.1.101
23
TCPDUMP (Cont.)
• example: Web Request
– 16:22:43.383893 00:20:ed:73:b7:1d > 00:16:b6:21:71:d1,
ethertype IPv4 (0x0800), length 74: IP (tos 0x0, ttl 64, id 42626,
offset 0, flags [DF], proto 6, length: 60) 192.168.1.12.56478 >
www8.cnn.com.http: S [tcp sum ok] 970586877:970586877(0)
win 5840 <mss 1460,sackOK,timestamp 5790847 0,nop,wscale
2>
–
–
–
–
–
Timestamp = 16:22:43.383893
Source (MAC Address) = 00:20:ed:73:b7:1d
Destination (MAC Address) = 00:16:b6:21:71:d1
Source IP = 192. 92.168.1.12
Destination IP = www8.cnn.com.http
24
Ethereal
•
•
•
•
•
GUI based protocol analyzer
Available for Unix, Linux, Windows
Open Source application
www.ethereal.com
Can be used to analyze raw data files from
TCPDUMP tool.
• Supports user-defined filters.
25
Ethereal (Cont.)
26
Data Link Protocols
(Tomsho, 2007)
Standard
Advantages
DisMin
advantages Cable
10BaseT
802.3
Cheap
Cat 3
Star
CSMA/CD 100m
1024
100BaseT
(Fast
Ethernet)
1000BaseT
802.3u
Fast, Easy
Small
segments
Cost,
distance
Cat 5
Star
CSMA/CD 100m
1024
802.3ab
Fast, Full
duplex
Cost,
distance
Cat 5
Star
1024
2
1024
1000
Mbps
Fast, Full
duplex
Fast, Full
duplex
Fast,
Reliable
High cost,
complex
Cost,
complex
Cost and
debugging
Fiber
Star
CSMA/CD 100m
or
Switching
Switching 5000m
1024
2
1024
Fiber
Star
Switching
550m
1024
2
1024
Cable Star
- fiber
Token
Passing
45m
33 hubs
Depends
on hub
72 UTP
260 STP
Very fast,
reliable,
distance
X-fast, Qos
Cost,
complex
Fiber
Ring
Token
Passing
100 km
1000
Mbps
1000
Mbps
4 and
16
Mbps
100
Mbps
Fiber
Dedicated
Circuit
Type
1000BaseLX 802.3z
1000BaseSX 802.3z
Token Ring
802.5
FDDI
X3T9.1
ATM/Sonet
Physical
Topology
Access
Max
Max
Segment Segments
Length
Max
Max
Trans
Devices Devices Speed
per
per
Segment Network
2
1024
10
Mbps
1
1024
100
Mbps
500
>100
Gps
27
The Token Ring Architecture
Tomsho, Tittel, Johnson (2007)
28
Token Ring Function
Tomsho, Tittel, Johnson (2007)
• A token passes around the ring
– If an “in use” token is received from the Nearest Active Upstream Neighbor (NAUN), and the computer has data to
send, it attaches its data to the token and sends it to its
Nearest Active Down-stream Neighbor (NADN)
– If received token is in use, NIC verifies if it is the
destination station
• If not, the computer re-creates the token and the data
exactly and sends them to its NADN
• If it is, data is sent to the upper-layer protocols
– Two bits in data packet are toggled and token is
sent to NADN; when original sender receives it, it
frees the token and then passes it along
29
Beaconing
Tomsho, Tittel, Johnson (2007)
30
Hardware Components
Tomsho, Tittel, Johnson (2007)
• A hub can be a multistation access unit (MSAU) or
smart multistation access unit (SMAU)
• IBM’s token ring implementation is the most popular
adaptation of the IEEE 802.5 standard
– Minor variations but very similar to IEEE specs
• IBM equipment is most often used
– 8228 MSAU has 10 connection ports, eight of which
can be used for connecting computers
– The RO port on one hub connects to RI port on the
next hub, and so on, to form a ring among the hubs
• IBM allows connecting 33 hubs
31
The Fiber Distributed Data Interface (FDDI)
Architecture Tomsho, Tittel, Johnson (2007)
32
The Fiber Distributed Data Interface (FDDI)
Architecture (continued)
Tomsho, Tittel, Johnson (2007)
33
Networking Alternatives
• Many other network architectures are available
• Some are good for specialized applications, and others
are emerging as new standards
• Topics
– Broadband technologies (cable modem and DSL)
– Broadcast technologies
– ATM
– ATM and SONET Signaling Rates
– High Performance Parallel Interface (HIPPI)
34
Broadband Technologies
Tomsho, Tittel, Johnson (2007)
• Baseband systems use a digital encoding scheme at a
single fixed frequency
• Broadband systems use analog techniques to encode
information across a continuous range of values
– Signals move across the medium in the form of
continuous electromagnetic or optical waves
– Data flows one way only, so two channels are
necessary for computers to send and receive data
– E.g., cable TV
35
Cable Modem Technology
Tomsho, Tittel, Johnson (2007)
36
Digital Subscriber Line (DSL)
Tomsho, Tittel, Johnson (2007)
• Competes with cable modem for Internet access
– Broadband technology that uses existing phone lines
to carry voice and data simultaneously
– Most prominent variation for home Internet access is
Asymmetric DSL (ADSL)
• Splits phone line in two ranges: Frequencies below
4 KHz are used for voice transmission, and
frequencies above 4 KHz are used to transmit data
• Typical connection speeds for downloading data
range from 256 Kbps to 8 Mbps; upload speeds
are in the range of 16 Kbps to 640 Kbps
37
Asynchronous Transfer Mode (ATM)
Tomsho, Tittel, Johnson (2007)
• High-speed network technology for LANs and WANs
– Connection-oriented switches
• Dedicated circuits are set up before communicating
– Data travels in fixed-size 53-byte cells (5 byte-header)
• Enables ATM to work at extremely high speeds
– Quick switching
– Predictable traffic flow
• Enables ATM to guarantee QoS
– Used quite heavily for the backbone and infrastructure in
large communications companies
– LAN emulation (LANE) required for LAN applications
38
ATM and SONET Signaling Rates
Tomsho, Tittel, Johnson (2007)
39
References
Tomsho, Tittel, Johnson (2007). Guide to Networking
Essentials. Boston: Thompson Course Technology.
Odom, Knott (2006). Networking Basics: CCNA 1
Companion Guide. Indianapolis: Cisco Press
Wikipedia (n.d.). OSI Model. Retrieved 09/12/2006 from
http://en.wikipedia.org/wiki/OSI_Model
40