Transcript Chapter 1
Basic Concepts and
Principles
Chapter 1
Copyright 2001 Panko
Stars
Mark material that is especially important, or
Mark material that is especially difficult or easy to
confuse with similar material
In either case, the star indicates something to
which you should pay special attention.
Multiple stars are for especially important or
difficult material
2
3
Ovals
New
Mark slide as not being from the chapter or
module of the main PowerPoint presentation
–
New information added since the book went to
press
Often
available in the supplementary readings
for the chapter or module
Ch 5
Mod N
–
From Chapter 5
–
From Module N
Error
–
Corrects error in the original text
Box
–
Material in box within chapter
4
Network
A Network is an Any-to-Any Communication
System
– Can connect any station to any other
Network
5
Network
Each Station has a Unique Network Address
–
–
To connect, only need to know the receiver’s address
Like telephone number
GHI
DEF
ABC
MNO
“Connect to GHI”
JKL
Data Communications
Originally, There was a Sharp Distinction:
–
Voice and Video Communication versus
–
Data Communications, in which one or both
parties is a computer
Database
Electronic
mail
World Wide Web
–
Distinction is fading because voice and video
communication are increasingly computerbased
6
7
Voice and Video Networks
Telephone Network
–
–
Customer premises (home or office)
Local loop (access line) connects customer premises to
first switching office
Switching Office
Local Loop
(Access Line)
Connection
Customer
Premises
Customer
Premises
Voice and Video Networks
Hierarchy of switches
Trunk lines connect switches
Trunk Line
Switch
8
9
Voice and Video Networks
Circuit
–
–
–
–
End-to-End Connection between Phones
May pass through multiple switches
And trunk lines
Reserved (guaranteed)
capacity during call
Circuit
Circuit
Voice and Video Networks
10
Reserved Circuit Capacity is Expensive
–
Good for voice, because conversations are fairly
constant
–
Bad for data, because most data transmission is bursty;
e.g., in World Wide Web, download, then stare at screen
for average of 60 seconds between brief downloads
–
Capacity is wasted between bursts; still must pay of
capacity
Packet-Switched Data Networks
11
Packet Switching
–
–
Circuit switching is expensive due to reserved capacity
Packet switching breaks transmissions into messages
–
Messages are short (averaging a few hundred bytes)
because switches handle short messages efficiently
–
Messages are called packets (sometimes, frames or
other names)
Message
Packets
Packet-Switched Data Networks
12
Packet Switching Decision
–
–
–
When a packet arrives at a switch, the switch must
decide which of several ports (connections) to use to
send the packet back out
Complex
B
Made at each packet switch
B?
D?
Switch A
D
Packet
C?
C
Packet Switched Data Networks
Multiplexing
–
–
–
–
Packets from many conversations are mixed
(multiplexed) over each trunk line
Only pay for the trunk line capacity used
Dramatic trunk line cost savings
The reason for packet switching
Multiplexing on
Trunk Line
13
14
Analog Transmission
In analog transmission, the state of the line can
vary continuously, rising and falling smoothly in
intensity among an infinite number of states
–
–
New
–
State may be voltage, frequency or another line signal
characteristic
The human voice is like this
When we speak into a telephone, we generate
analogous (similar) electrical signals, hence the name
Strength
Time
15
Digital Transmission
In digital transmission, time is divided into periods of
fixed length called clock cycles
Line is in one state (voltage level, etc.) during each clock
cycle; at end of cycle, stays same or changes abruptly.
State 1
Abrupt Change
Stays Same
State 2
Clock Cycle
Time
16
Digital Transmission
Only a few possible states
–
–
New
2, 4, 8, 16, 32, rarely more
If a signal is near one state but a bit off, the receiver
will still read it correctly as being at that state
Strength
Clock Cycle
Time
Digital Versus Binary Transmission
Digital transmission: a few states (2, 4, 8, 16, etc.)
Binary transmission: exactly two states
– One state represents 1, the other 0
– Binary is a type of digital transmission
Few States (4)
Two States
1
0
Digital
Binary
17
18
Digital Communication
Modems
–
Computers have digital output
–
Telephone network assumes analog input
–
Modem translates between digital device and analog
line for data transmission over the phone system
Digital
Signal
Analog
Signal
Modem
LANs and WANs
Networks Have Different Geographical Scopes
Local Area Networks (LANs)
–
–
–
Small Office
Office Building
Industrial Park / University Campus
Wide Area Networks (WANs)
–
–
Connect corporate sites or
Connect corporate sites with sites of customers and
suppliers
19
Elements of a Simple LAN
Hub or Switch
Hub or Switch connects
all stations
Wiring
Wiring is standard
business telephone wiring
(4 pairs in a bundle)
20
21
Elements of a Simple LAN
Client PC
Client PCs are used by
ordinary managers and
professionals; receive service
Have network interface cards (NICs)
NIC
Servers provide services to client PCs
Also have NICs
There usually are multiple servers
Have special server operating system
Have service software (e-mail, etc.)
Server
Client PC
22
Terminal-Host Systems
Created in the 1960s
–
–
–
Central host computer does all the processing
Terminal is dumb--only a remote screen and keyboard
Largest hosts are mainframes
Dominate host business use today
Terminals
Host
Terminal-Host Systems
23
Many Mainframe Applications Were Created in
the 1960s through 1980s
–
Legacy systems--systems created by your predecessors
–
Would not use the same platform today if built new
–
But too expensive to rewrite all legacy applications at
once
–
Must live with many host legacy applications for now
–
Older networks can be legacy systems as well; “legacy
system” is not just limited to mainframe applications
24
PC Networks
The Most Common Platform in Organizations
Allows PCs to share resources
Both Wintel (Windows/Intel) PCs and Macintoshes
–
–
Client
PC
PC Server
Network
PC Server
Client
PC
PC Network Components
File Servers
–
–
–
Store files (data files and programs)
The most common type of server in PC networks
Almost all file servers are themselves PCs
File Server
25
26
File Server Program Access
File Server Program Access is the Most Common
Way to Execute Programs in PC Networks
–
–
–
Program files are stored on the file server
But downloaded (copied) to client PC for execution
Executed on client PC, not on file server
Executed
on
Client PC
Stored
on the
File
Server
Download
Client PC
File Server
27
File Server Program Access
PC Processing Power Limits FSPA Programs
–
–
Client PCs do not get very large
Only programs small enough to operate on limited
client PCs can be used
Executed on the
Client PC
Client PC
File Server
28
Client/Server Processing
Client and Server Machines
–
–
–
Neither has to be a PC (Although the client usually is)
Platform independence
Two programs: client and server programs
Example: browser and webserver application program
Client Machine
Client
Program
Server
Program
Server
29
Client/Server Processing
Cooperation Through Message Exchange
–
Client program sends Request message, such as a
database retrieval request
–
Server program sends a Response message to deliver
the requested information or an explanation for failure
Server
Program
Client Program
Request
Response
Client Machine
Server
C/S Servers often are Workstation
Servers
Workstations
–
Look like PCs but…
–
More powerful (and expensive) than PCs
–
Do not use standard Intel PC microprocessors
–
Usually run the UNIX operating system
–
Client and server workstations
Special Microprocessor
UNIX Operating System
30
Program Functionality (Size)
31
High program functionality requires large program
size
File Server Program Access
–
Client/Server Processing
–
–
Poor: client PCs are small, can only execute small
programs
Good: not limited to client PC processing power
Heavy work can be done on the server machine
Terminal-Host Systems
–
Good: Hosts can be very large
Platform Independence
File Server Program Access
–
Poor: Only works with PC clients and PC file servers
Client/Server Processing
–
32
Excellent: use any server you want, also any client
Terminal-Host Systems
–
Poor: Hosts require terminals and only work with a few
terminal types
Scalability
Ability to grow as demand grows
File Server Program Access
–
Poor: client PCs do not get very large
Client/Server Processing
–
–
33
Very good: Platform independence allows servers to be
larger than PCs
To grow, leave client machine the same, increase the
size of the server machine
Terminal-Host Systems
–
Excellent: have an enormous range of processing power
User Interface
File Server Program Access
–
Client/Server Processing
–
Very good: uses local PC processing power
Very good: uses local PC processing power for user
interface
Terminal-Host System
–
–
Poor: Relies on distant hosts; user interface quality
limited by high long-distance transmission costs
Monochrome, text-only screen; no animation
34
Response Time (When User Hits a Key)
File Server Program Access
–
Very good: uses local PC processing power
Client/Server Processing
–
–
35
Very good: local PC processing power for user interface
But retrievals from the server can cause delays
Terminal-Host System
–
Poor: Relies on distant hosts; long delays if overloaded
Accessing the WWW from Home
A Common and Important Situation
–
Must be understood
–
Good way of introducing networking concepts
36
The Internet
The Internet is a Worldwide Group of Networks
–
Not a single network
–
Individual networks on the Internet are called subnets
37
38
The Internet
Routers
–
–
Connect the Internet’s individual networks (subnets)
Cooperate to give an end-to-end route for each packet
(message)
Routers
Route
The Internet
39
Hosts
–
–
–
Host
Any computer attached to the Internet is a host
Webservers are host
Desktop and notebook PCs are hosts too
Host
The Internet
40
Network deliver messages based on network
addresses
–
Host
The Internet has two addressing systems for hosts
Host
IP addresses
Host names
The Internet
41
Host IP addresses
–
–
–
–
Strings of 32 ones and zeros
Usually represented by four number segments separated
by dots: dotted decimal notation
For example, 128.171.17.13
Official addresses for hosts
127.18.47.145
127.47.17.47
The Internet
42
Dotted Decimal Notation
–
IP addresses are really strings of 32 bits (1s and 0s)
10000000101010100001000100001101
–
To convert this to dotted decimal notation, first, divide
them into four bytes (also called octets)
10000000 10101010 00010001 00001101
Note: Conversion is for human convenience;
computers work with 32-bit sequences, not dotted
decimal notation
–
Both octets and bytes are collections of eight bits
But “octet” is used in networking
The Internet
Dotted Decimal Notation
–
Convert each binary (Base 2) octet into decimal (Base
10)
10000000 binary is 128 decimal
10101011 binary is 171 decimal
00010001 binary is 17 decimal
00001101 binary is 13 decimal
43
44
Binary to Decimal Conversion
Position
7
Position
0
Binary
10100011
=
Decimal
163
Note: Starts with 0
Position
(N)
Value
(2N)
7
6
5
4
3
2
1
0
128
64
32
16
8
4
2
1
Bit Decimal
1
0
1
0
0
0
1
1
128
0
32
0
0
0
2
1
163
45
The Internet
Host Names
CNN.COM
–
The other network addressing system on the Internet
–
Easy to remember
www.microsoft.com
voyager.cba.hawaii.edu
Two or more text “labels” separated by dots
No relationship between segments and labels
–
Not official names of hosts
Like nicknames
–
Usually, only servers have host names
46
The Internet
Internet Service Providers (ISPs)
–
–
–
You must have an account with an ISP
Connects you to the Internet
May provide other services (e-mail account, etc.)
Carrier Access Line
–
–
–
Usually provided by local telephone carrier
Connects you to the ISP
You pay for this separately from your ISP charges
Carrier Access Line
ISP
47
The Internet
The Internet is Not Free
–
–
–
You pay your ISP around $20 per month, sometimes
more
Part of this pays for ISP expenses
Part of this pays the Internet backbone to carry your
messages
You Usually Also Pay the Telephone Carrier
Separately for the Carrier Access Line
Carrier Access Line
ISP
48
The Internet
Internet Backbone
–
Itself consists of many competing but interconnected
backbone carriers
–
Sometimes, backbone carriers are also ISPs
Internet Backbone
ISP
Carriers
ISP
Standards
49
Standards are rules of operation that most or all
vendors follow
Open standards are created and owned by public
standards organizations
–
No single vendor controls these standards
Standards Are Layered
For Internet Access to a Webserver, standards are
set at five layers
–
–
–
–
–
50
Application
Transport
Internet
Data Link
Physical
Together, these standards provide all that is needed
for application programs on different hosts on
different networks to work together
51
Internet Standards
Messages are Exchanged at Multiple Layers
App
HTTP
App
Trans
TCP
Trans
Int
IP
Int
IP
Int
DL
PPP
DL
?
DL
Phy
Modem
Phy
?
Phy
User PC
Router
Webserver
52
Internet Standards
Application Layer Standards
–
Standards at the application layer specify how two
application programs communicate
–
For example, browser on user PC and webserver
application program on webserver
Follow the HyperText Transfer Protocol (HTTP)
standard if webservice application
Browser
Webserver
Application program
HTTP if webservice application
53
Internet Standards
Transport Layer Protocols
–
Standards at the transport layer specify how two host
computers will work together, even if they are of
different platform types (PCs, workstations,
mainframes, and so forth)
–
Gives platform independence
PC
PC or
Other Computer
Internet Standards
HTTP Requires the Use of the TCP Transport
Standard at the transport layer
–
–
Transmission Control Protocol
TCP messages are called TCP segments
TCP if webservice application (HTTP)
TCP Segment
54
55
Internet Standards
Internet Layer Protocols
– Standards at the internet layer specify how hosts and
routers will act to route packets end to end, from the
source host to the destination host, across many single
networks (subnets) connected by routers
Route
Host
Host
Single Network
(Subnet)
Internet Standards
The Internet Protocol (IP) is the Main Protocol
for Routing Packets Across the Internet
–
–
–
The IP in “TCP/IP”
IP messages are called packets
All internet layer messages are called packets
Packet
IP
56
57
Internet Standards
Subnets
–
–
A subnet is a single networks (LANs, WANs, point-topoint link) on the Internet
A packet will pass through several subnets along its
route across the Internet
Subnet 3
Subnet 1
Subnet 2
58
Internet Standards
Different Subnets Can Have Different Subnet
Protocols
–
IP at the internet layer routes across different protocols
at the subnet layer
LAN Subnet
Protocol 3
Point-to-Point Subnet
Protocol 1
WAN Subnet
Protocol 2
Subnets Standards
Subnets are Single Networks on the Internet
Subnet Standards Divided into Two Layers
–
Physical layer standards govern the transmission of
individual bits within a subnet
–
Data Link layer standards govern the transmission of
messages within a subnet
Organize
individual bits into structured messages
59
60
Internet Standards
Data Link Layer Standards
–
–
Standards at the data link layer specify how to transmit
messages within a single network
Messages at the data link layer are called frames
Frame
10010001001
Data Link
61
Internet Standards
Data Link Layer Standards
–
For accessing the Internet from home via telephone
modem, use the Point-to-Point Protocol (PPP)
–
Only used between home and ISP!
–
Other subnets connecting routers are likely to use
different subnet protocols!
?
PPP
ISP
Internet Standards
62
Physical Layer Standards
–
–
While the data link layer is concerned with the
organization and transmission of organized messages,
standards at the physical layer specify how to transmit
single bits one at a time
Work bit by bit; no frame organization
63
Internet Standards
Physical Layer Standards in Internet Access from
Home
–
–
–
–
Telephone jack (RJ11)
Telephone wire
Serial port connection to external modem
Modem
Serial
Port
External Modem
Telephone
Wire
Wall Jack
Internet Standards
64
Subnet Versus Internet Layer Standards
–
–
Internet layer provides routing across multiple subnets
Subnet layer standards (data link and physical) provide
for transmission within a single network
Internet
Layer
Subnet Layer
Internet Standards
Analogy for Subnet versus Internet
–
–
–
Take a vacation
Route from beginning to end (like internet layer)
For different parts, may travel by car, airplane, or boat
(like subnet layer)
Internet
Layer
Subnet Layer
65
Standards Organizations and Architectures
Architecture is a Design for Standards Creation
–
Specifies what types of standards are needed
(application, transport, etc.)
–
After architecture is designed, individual standards of
each type are created
–
Analogy: architecture of house specifies what rooms
will be needed and their relationships.
–
After architecture is settled, individual rooms are
designed
66
Standards Organizations and Architectures
TCP/IP Architecture
–
Under the Internet Engineering Task Force (IETF)
–
TCP/IP is the architecture, while TCP and IP are
individual standards
There are other TCP/IP standards
–
IETF standards dominate in corporations at the
application, transport, and internet layers
However, application, transport, and internet
standards from other architectures are still used to
some degree
67
Standards Organizations and Architectures
68
OSI Standards
–
Reference Model of Open Systems Interconnection
–
Created by the International Telecommunications
Union-Telecommunications Standards Sector (ITU-T)
–
And the International Organization for
Standardization (ISO)
–
OSI standards dominate the data link and physical layers
Other
architectures specify the use of OSI standards at
these layers
69
Internet Standards
5-Layer Hybrid TCP/IP-OSI Architecture
–
–
Most widely used architecture in organizations today
Used on the Internet
Application
TCP/IP
Transport
TCP/IP
Internet
TCP/IP
Data Link
OSI
Physical
OSI
70
Internet Standards
Recap: Accessing the WWW from Home with a
Telephone Modem
App
HTTP
App
Trans
TCP
Trans
Int
IP
Int
IP
Int
DL
PPP
DL
?
DL
Phy
Modem
Phy
?
Phy
User PC
Router
Webserver
TCP/IP versus OSI
71
Box
Lowest Four Layers are Comparable in
Functionality
TCP/IP
OSI
Application
Application
Presentation
Session
Transport
Network
Data Link
Physical
Transport
Internet
Data Link (use OSI)
Physical (use OSI)
72
OSI Divides the Application Layer
Box
OSI Session Layer
–
–
Sets up a connection between two application programs
on different machines
Manage streams of transactions (session); if there is a
break, can resume at the last roll-back point
Transactions
73
OSI Divides the Application Layer
Box
OSI Presentation Layer
–
Handles presentation differences between the two
machines (how data are stored and represented)
–
Two presentation layer processes select and use a
common data format for exchanging data
Uses
Data
Format
A
Application Data
Exchange in
Common Format C
(Transfer Syntax)
Uses
Data
Format
B
OSI Divides the Application Layer
Box
OSI Application Layer
–
Governs application-to-application communication
freed from concerns about presentation format and
transaction management
74
Quality of Service (QoS)
Want network to have good quality of service
(QoS)—work well!
Congestion
–
–
When too many transmissions are on a network, traffic
will slow down; this is congestion
Latency
–
Latency is the amount of time that packets or frames
are delayed because of congestion. Measured in
milliseconds (ms),
Want guarantees of worst-case latency
Throughput
–
75
Throughput is the guaranteed speed in bits per second
Quality of Service (QoS)
Reliability Measures
Availability
–
–
Availability is the percentage of time the network is
available to users.
Telephone system has 99.999% availability
Error Rate
–
–
Error rate is the percentage of bits or messages that
contain errors
3% - 6% of all packets are lost on the Internet
76
77
Security
A Growing Problem
Encryption for Confidentiality
–
–
New
–
47
Sender encrypts messages before sending them so that
anyone intercepting them en route cannot read them
Receiver can decrypt encrypted messages and read
them
Have confidentiality (unreadability by interceptors)
Encryption
101101
Decryption
47
Security
Authentication
–
–
78
Sender of a message must prove their identity
To thwart impostors who impersonate people
Access Control
–
Prohibits or authorizes access to various resources
(files, programs, etc.)
–
Needs authentication but also more
–
Access control lists for resources specify what
resources the authorized person may use and how they
may use them