CS412 Computer Networks - Winona State University

Download Report

Transcript CS412 Computer Networks - Winona State University

CS 313 Introduction to
Computer Networking &
Telecommunication
Introduction
Chi-Cheng Lin, Winona State University
Topics
Introduction
 Metric Units
 Network Hardware
 Network Software
 Reference Models
 Example Networks
 Standards and Standards Organizations

2
Network Software

Old computer networks:
HW main concern
SW afterthought
Not working now!

Network SW is now highly structured
Approach: Protocol Hierarchies
3
Protocol Hierarchies

What is protocol?
Agreement between communication parties
on HOW communication is processed

Layered architecture
Reduce design complexity: Lower layer
offers service to higher layer
Hiding implementation details
Layer n on one machine talks to layer n on
another
Rules and conventions used in layer n’s
talk: Layer n protocol
4
Protocol Hierarchies

Peers
Entities comprising corresponding layers on
different machines
Virtual communication using protocol
Peer process abstraction make network design
becomes that of individual layers

Physical communication
Sender: Data and control passed to layer below
Data transmitted via physical media
Receiver: Data and control passed to layer
above
5
Layers, Protocols, and Interfaces
Virtual Communication
Physical Communication
6
Protocol Hierarchies

Interface between two adjacent layers
Defines primitive operations and services a
lower layer offers to the upper one
Minimizes amount of information passed
between two layers
Simplifies replacement of implementation
E.g., telephone lines  satellite channels
7
Protocol Hierarchies

Network architecture
Set of layers and protocols
Implementation and interface specification
not included

Protocol stack
A list of protocols used by a certain system,
one protocol per layer
8
Multilayer Communication - Example

Philosopher-translator-secretary
architecture
It is ok if
Dutch is
replaced by
Finnish
fax is
replaced by
email
9
Information Flow - Example

Virtual communication for layer 5
Header: control information
00011100011100001110 …
Layer 1
protocol
00011100011100001110 …
10
Key Design Issues for the Layers

Reliability
Error control
Error-detecting
Error-correcting
Routing
Selecting the best path for sending a packet from
one point to another
11
Key Design Issues for the Layers

Sender/receiver identification mechanism
Addressing/naming
Sequencing
 Message disassembling, transmitting,
reassembling

12
Key Design Issues for the Layers

Resource allocation
Multiplexing
The process of combining signals from multiple
sources for transmission across a single data link
Multiple connections can share the link

Flow control
Needed for fast sender, slow receiver
Congestion control
 Quality of service
 Security

13
Connection-Oriented and
Connectionless Services

Two basic types of services
Connection-oriented
Connectionless

Consider reliability …
Reliable
Unreliable

Connection-oriented
Connectionless
Note that: Connection  Reliability
14
Connection-Oriented Service
A connection is established first, then
used, and then released when done.
 Works like a pipe:

Sender pushes data in at one end
Receiver takes them out, often in the same
order, at the other end

Analogy
Telephone system
15
Connectionless Service
No need to set up a connection first
 Each message carrying full destination
address is routed independently of
others

No guarantees on the order

Analogy
Postal system
16
Service Primitives
Service is formally specified by a set of
primitives (e.g., OS’s system calls)
available to users or entities
 Five service primitives for implementing
a simple connection-oriented service.

17
Service Primitives

Packets sent in a simple client-server
interaction on a connection-oriented
network.
18
Relationship of Services to Protocols

Service
Set of primitives a layer provides to the
layer above it
Define WHAT operations
not HOW implemented

Protocol
Set of rules governing format and meaning
of message exchanged by peer entities
within a layer
Used by entities to implement service
definitions
19
Services to Protocols Relationship

The relationship between a service and
a protocol.
20
Relationship of Services to Protocols

Analogy: object-oriented languages
Service :: ADT or Object
Users do not know the implementation of a
service
Protocol :: Implementation
The protocol of the service is invisible to users
Do you have to understand http (hypertext
transport protocol) before you can surf the
Internet?
21
Reference Models

Two reference models will be discussed
OSI reference model
TCP/IP model
22
OSI Reference Model
ISO/OSI (Open Systems Interconnection)
Reference Model
 NOT a network architecture itself

Exact services and protocols are not specified
Just "what should be done" in each layer
However, standards are produced for all
layers
23
OSI Reference Model

Seven layers
Layer
Layer
Layer
Layer
Layer
Layer
Layer

7:
6:
5:
4:
3:
2:
1:
application layer
presentation layer
session layer
transport layer
network layer
data link layer
physical layer (lowest)
Diagram of OSI reference model
Note: this is one of the most important figures
in the whole book!!
24
Physical medium
25
26
Physical medium
End-to-End
Point-to-Point
Point-to-Point
Host A
Subnet
Point-to-Point
Host B
27
Physical Layer
Transmitting raw bits (0s and 1s) over
communication channel
 Design issues

Representation of bits
How is 0/1 represented?
Data rate: number of bits sent per second
How long does a bit last?
Transmission mode (bi-directional?)
Mechanical, electrical, timing interfaces
Underlying physical transmission medium
28
Data Link Layer
Takes a raw transmission facility and
transforms it into a line (link) that
appears free of undetected transmission
errors to network layer
 Basic function

Breaks up input data to data frames
Transmits data frames sequentially
Processes acknowledgement frames sent
back from receiver for reliable transmission
29
Data Link Layer

Responsibilities
Physical addressing (e.g. MAC address)
Framing
Creating and recognizing frame boundaries
Error control (adjacent nodes, node-to-node)
Errors: damaged, lost, duplicate
Flow control (adjacent nodes, node-to-node)
Traffic regulation between fast sender and slow
receiver
Medium access control
Shared channel access control in broadcast
networks
30
Network Layer
Subnet operation control
 Responsibilities

Logical addressing (e.g., IP address)
Routing
Static tables
Determined at the start of conversation
Dynamic
Congestion control
Quality of service
Accounting
Heterogeneous network interconnection
31
Transport Layer

End-to-end layer
Talk to destination machine directly (virtually)
Layers 4 through 7 are end-to-end
Layers 1 through 3 are node-to-node (chained)

Basic function
Split data from session layer into smaller units
Pass units to network layer
Ensure units arrive correctly at the other end
32
Transport Layer

Determine services provided to session
layer (and ultimately to users)
Error-free point-to-point channel that
delivers messages in the order in which
they were sent
Transport of isolated messages w/o
guarantee about order
Broadcasting
33
Transport Layer

Responsibilities include
Service-point addressing (e.g., port number)
Which message belong to which connection
(application):
(End-to-end) Flow control
(End-to-end) Error control
Compare to the
Data Link layer
34
Session layer
Session establishment between users
on different machines
 Responsibilities

Dialogue control
Deciding who sends, and when
Token management
Control of same critical operation not to be
performed at the same time
Synchronization
Inserting checkpoints (checkpointing)
35
Presentation Layer
Syntax/semantics of information
transmitted
 Responsibilities

Make communication between computers
with different internal data representations
possible
Approach: standard encoding
Convert from data representation used in one
host to the standard abstract data structure
and back
36
Application Layer
Provides interface and support for
services to users (human, software,
robots)
 Examples

File transfer
Email
Network news
Hypertext transfer
37
TCP/IP Reference Model

Goals
Internetworking
Fault tolerance
Flexible architecture

Four layers of TCP/IP Reference Model
Host-to-network layer
Internet layer
Transport layer
Application layer
38
Internet Layer
Packet-switching, connectionless
 Packets injected to network

Independent travel
Out-of-order arrival

Analogy
Mail system

IP (Internet Protocol)
Packet routing
Congestion control
39
Transport Layer

Two end-to-end protocols
UDP (User Datagram Protocol)
TCP (Transmission Control Protocol)

UDP (User Datagram Protocol)
Unreliable, connectionless
Widely used for
client-server type request-reply queries
speech, video
40
Transport Layer

TCP
Reliable connection-oriented
Incoming byte stream (form application
layer) is fragmented into discrete
messages and passed onto internet layer
Message is reassembled at destination
Flow control
Analogy
A
B
Pipe
41
Applications and Host-to-Network
Layers

Application layer
No session and presentation layers
TELNET, FTP, SMTP, DNS, NNTP, HTTP

Link layer
Defines what links must do to meet the
need of connectionless internet layer
42
TCP/IP Protocols
43
OSI and TCP/IP Models

Correspondence
44
OSI and TCP/IP Models

Similarities
Stack of independent protocols
Layer functionality
Transport layer
Application layer
45

OSI
Differences between
OSI and TCP/IP Models
Distinction between services, interfaces, and
protocols (perhaps the biggest contribution)
Better Protocol-Hidden
Model first, then protocols
 Pro: No bias, more general
 Con: Designers did not have
 much experience with the subject
 a good idea of which functionality to put in which layer
No thought given to internetworking
7 layers
Communication
 Connection-Oriented and connectionless in network layer
 Only connection-oriented in transport layer
46
Differences between
OSI and TCP/IP Models

TCP/IP:
No clear distinction between services, interfaces, and
protocols
Worse protocol-hidden
Protocol first, then model
 Pro: Protocols fit model perfectly
 Con: Model does not fit any other protocol stacks (not
general)
4 layers
Communication
 Connectionless in network layer
 Both in transport layer (good for request-response
protocols)
47
Summary of Reference Models

OSI
OSI model exceptionally useful for
discussing computer networks
OSI protocols not popular

TCP/IP
TCP/IP model practically nonexistent
TCP/IP protocols widely used

Modified framework is used in the text
48
Summary of Reference Models

Modified framework is used in the text
49
Example Networks

The Internet
Overview of the Internet architecture
50
Example Networks
3G mobile networks
 Wireless LANs: 802.11
 RFID and sensor networks

51
Standards and Standards Organizations
Why standards?
 Categories

de facto
de jure

Organizations
ITU-T (formerly CCITT)
ISO
ANSI
IEEE
IETF
ATM Forum
52