Network Devices - Pennsylvania State University

Download Report

Transcript Network Devices - Pennsylvania State University

IST 228\Ch1\Internetworking
Chapter 1: Internetworking
• Internetworking Basics
• Network segmentation
• How bridges, switches, and routers are
used to physically segment a network
• How routers are used to create
internetwork
• OSI model
1
IST 228\Ch1\Internetworking
2
Internetworking Models
• Most networks are designed as a stack of
layers, each one built upon the one below
it. Why?
Host 1
Layer 3
Host 2
Layer 3 protocol
Layer 3
Layer 2/3 interface
Layer 2 protocol
Layer 2
Layer 2
Layer 1/2 interface
Layer 1 protocol
Layer 1
Layer 1
Physical Medium
IST 228\Ch1\Internetworking
• Each layer provides services to the higher
levels.
• Each layer behaves as a black box.
• Layer n on one machine talks to layer n on
another machines.
• The corresponding layer in the layered
structure are called peers.
• The communication between peers must
follow certain rules, known as protocol.
• No data are directly transferred between
layers. Actual communication is through a
physical medium below layer 1.
3
IST 228\Ch1\Internetworking
4
An Analogy
Professor A
Professor B
I like
rabbits
Urdu & English
Translator
L: Dutch
Ik vind
konijnen
leuk
Secretary
Fax:#
L: Ducth
Ik vind
konijnen
leuk
J’aime
bien les
lapins
Message
Information
for the
remote
translator
Chinese & French
Translator
Ik vind
konijnen
leuk
use Dutch
Information
for the
remote
secretary
use fax
L: Ducth
Secretary
Fax:#
L: Ducth
Ik vind
konijnen
leuk
IST 228\Ch1\Internetworking
The lower levels
The upper levels
Open Systems Interconnection (OSI)
Reference Model
Application
Presentation
Session
• Provides user interface
• Initiates services
• Transfer data into standard format
before transmission
• Keeps data different applications’ data
separate
• Control the data exchange
Transport
• End-to-end data error free data
transmission
Network
• Logical addressing for data packets
Routing and error handling
Data Link
• NIC software function
• How data in packaged
• Error detection
Physical
• Moves bits between devices
• Specifies voltages, cables, and cables
5
IST 228\Ch1\Internetworking
Reasons for Layering
• Simplifies the network model
• Enables programmers to specialize in a
particular level or layer of the networking
model
• Provides design modularity
• Encourages interoperability
• Allows for standardized interfaces to be
produced by networking vendors
6
IST 228\Ch1\Internetworking
The Application Layer (Layer 7)
• The layer where users communicate to the computer
• Contains protocols and utilities that provides services to
network applications
– (True/False) MsWord, Eudora Mail, Netscape are in the
application layer.
– Eudora (application) uses SMTP (Simple Mail Transfer Protocol)
(protocol).
• E-mail:
– Message formats such as RFC 822
– SMTP, POP3 (Post Office Protocol Version 3), IMAP (Internet
Message Access Protocol)
• WWW:
– HTML (The HyperText Markup Language), XML (eXtensible
Markup Language), XSL (eXtensible Style Language)
– HTTP (The HyperText Transfer Protocol)
7
IST 228\Ch1\Internetworking
The Presentation Layer (Layer 6)
• The presentation layer prepares the data from
the application layer for transmission over the
network or from the network to the application
layer.
• Include protocols specifying how to represent
data (MPEG, JPEG, PIC, WAV)
• Responsible for data translation, formatting,
encryption, compression.
• We need these services because different
computers use different internal representation
for data (integers and characters)
8
IST 228\Ch1\Internetworking
The Session Layer (Layer 5)
• Enables two applications on the network to have
an ongoing conversation
• Provide following services
–
–
–
–
Communication setup and teardown
Control for data exchange
Data synchronization definition
Failure recovery
• Examples:
– Structured Query Language (SQL)
– X Windows
– AppleTalk Session Protocol (ASP)
9
IST 228\Ch1\Internetworking
The Transport Layer (Layer 4)
• Provides
– end-to-end error free data transport services
– establish a logical connection
– data segmentation into maximum transmission unit
size
– messaging service for session layer
• Protocols in this layer can be
– connection-oriented : require an acknowledgment of
the receipt of data packets.
– connectionless : do not require an acknowledgment of
the receipt of data packets.
10
IST 228\Ch1\Internetworking
11
• Connection-oriented protocols:
sender
Synchronize
Negotiate connection
Synchronize
Acknowledge
Virtual Circuit
Connection Establish
Data Transfer
receiver
IST 228\Ch1\Internetworking
12
• Flow Control
• The segments delivered back to the sender upon their
reception
• Any segment not acknowledged are retransmitted.
• Segments are sequence back into their proper order upon
arrival at their destination
• Manageable data flow is maintained in order to avoid
congestion
sender
receiver
Buffer full
GO
IST 228\Ch1\Internetworking
13
• Windowing: The quantity of data segment
(in bytes) is sent without receiving an
acknowledgment (ack) is called a window.
sender
receiver
sender
Window
size of 3
Window
size of 1
send 1
receive 1
ack. 2
send 2
receive 2
send 1
send 2
send 3
ack. 3
send 3
receiver
ack. 4
send 4
IST 228\Ch1\Internetworking
14
• Acknowledgments:
sender
receiver
Positive Acknowledgment
with retransmission
1 2 3 4 5 6
1 2 3 4 5 6
send 1
send 2
send 3
ack. 4
send 4
send 5
Connection lost!
send 6
ack. 5
send 5
ack. 7
IST 228\Ch1\Internetworking
The Network Layer (Layer 3)
• Provides services
– to manage devices addressing
– to tracks the location of devices on the
network
– to determine the best way to move data on
the network
• The network layer must transport traffic
between devices that are not directly
connected.
• Routers are specified at this layer.
15
IST 228\Ch1\Internetworking
The Data Link (Layer 2)
• Services
– Identification of the source and destination nodes via
their physical address (Media Access Control (MAC)
address)
– Definition of how data is packaged for transport as
frames
– Error detection
– Flow control of information sent across the link
• Has two sublayers:
– Media Access Control (MAC) 802.3
– Logical Link Control (LLC) 802.2
16
IST 228\Ch1\Internetworking
The Physical Layer (Layer 1)
• This layer communicates directly with the
various types of actual communication
media
• Services
– definition of the physical characteristics of the
network hardware, including cable and
connector
– Encoding
– Transmission of signals on the wire
17
IST 228\Ch1\Internetworking
Example:
568B twisted pair wiring scheme
18
IST 228\Ch1\Internetworking
Layer 1 Network Devices: Repeaters
• The number of nodes on a network and the length of
cable used influence the quality of communication on the
network
• Attenuation
– Natural degradation of a transmitted signal over distance
• Repeaters work against attenuation by repeating signals
that they receive on a network
• Why are repeaters Layer 1 devices?
19
IST 228\Ch1\Internetworking
Layer 1 Network Devices: Hubs
• Generic connection device used to tie several
networking cables together to create a link
between different stations on a network
20
IST 228\Ch1\Internetworking
• Hubs that are plugged into electric power are
called active hubs
• A hub that merely connects different cables
on a network and provides no signal
regeneration is called a passive hub and is
not a repeater
• “Hub” is a generic term applied to many
different network-connection devices
• If a hub in some way segments or subdivides
the traffic on a network, it is an intelligent, or
switching, hub
• For the purpose of the CCNS exam, the term
hub—by itself—is a device that does not
segment the network
21
IST 228\Ch1\Internetworking
Network Segmentation
• Segmentation
– Process of breaking a network into smaller broadcast or
collision domains
• Ethernet network, which are characterized by IEEE
802.3 standard, define the use of a Carrier Sense
Multiple Access with Collision Detection
(CSMA/CD) access method
– Backoff algorithm : Mathematical calculation
performed by computers after a collision occurs on a
CSMA/CD network
– Backoff period : Random time interval used after a
collision has been detected on an Ethernet network
22
IST 228\Ch1\Internetworking
Network Segmentation via Bridges
23
IST 228\Ch1\Internetworking
Layer 2 Devices: Bridges
• Operate at the Data Link layer of the OSI
model
• Filters traffic between network segments
by examining the destination MAC address
– Based on this destination MAC address, the
bridge either forwards or discards the frame
– When a client sends a broadcast frame to
the entire network, the bridge will always
forward the frame
24
IST 228\Ch1\Internetworking
• Transparent Bridges : Also called learning
bridges because they build a table of MAC
addresses as they receive frames
– This means that they “learn” which addresses
are on which segments
– Ethernet networks mainly use transparent
bridges
• Source-routing bridges : Rely on the
source of the frame transmission to
provide the routing information
– Usually employed by Token Ring networks
• Translation bridges : Can connect
networks with different architectures
25
IST 228\Ch1\Internetworking
Layer 2 Devices: Switches
• Increase network performance by reducing the
number of packets transmitted to the rest of the
network
• Like bridges, operate at the Data Link layer of
the OSI model
• In an Ethernet network, computers are usually
connected directly to a switch
• Virtual circuit
– Private connections between two points created by a
switch that allows the two points to use the entire
available bandwidth between those two points without
contention
26