Slide - Computer Science

Download Report

Transcript Slide - Computer Science

Chapter 7
Computer Networks, the
Internet, and the World Wide
Web
Objectives
In this chapter, you will learn about

Basic networking concepts

Communication protocols

Network services and benefits

A brief history of the Internet and the World
Wide Web
Introduction

Computer network



Computers connected together
Purpose: Exchanging resources and
information
Just about any kind of information can be sent
• Examples: Television and radio signals, voice,
graphics, handwriting, photographs, movies
Basic Networking Concepts

Computer network



Set of independent computer systems
connected by telecommunication links
Purpose: Sharing information and resources
Nodes, hosts, or end systems

Individual computers on a network
Communication Links

Switched, dial-up telephone line

A circuit is temporarily established between
the caller and callee
• Circuit lasts for the duration of the call.


Analog medium
Requires modem at both ends to transmit
information produced by a computer
• Computer produces digital information
Figure 7.1 Two Forms of Information Representation
Figure 7.2
Modulation of a Carrier to Encode Binary Information
Communication Links
(continued)

Dial-up phone links



Initial transmission rates of 300 bps
Later in 1980s increased to 1,200-9,600 bps
Transmission rate now: 56,000 bps (56 Kbps)
• Too slow for web pages, MP3, streaming video


Still used to access networks in remote areas.
Broadband


Transmission rate: Exceeding 256,000 bps
(256 Kbps)
Is “always on”, so do not have to wait for
connection
Communication Links
(continued)

Options for broadband communications


Broadband refers to transmission rates over 256K
bps.
Home use
• Digital subscriber line (DSL)
• Cable modem

Commercial and office environment
• Ethernet
• Fast Ethernet
• Gigabit Ethernet
Communication Links (continued)
 Digital



DSL is a “permanently on” connection
Transmits digital signals at different
frequencies, so no interference with voice.
Line is often asymmetric with download &
upload bandwidths.
 Cable



subscriber line (DSL)
modem
Uses links that deliver TV signals to homes.
Speeds roughly comparable to DSL.
Signal is “always on”.
Communication Links (continued)
 Commercial

and office environment
Ethernet – mid 1970’s
• Most common with 10Mbps
• Often available in dorms and new homes

Fast Ethernet developed in
• 100 Mbps – 1990’s
• Coaxial cable, fiber-optic cable, or regular
twisted-pair copper wire.

Gigabit Ethernet project
• In 1998, achieved 1000 Mbps
• In 2003 achieved 10 billion bps

Transmit entire contents of 1,700 books, each 300
pages long in a single second
Figure 7.3
Transmission Time of an Image at Different Transmission
Speeds
Gigabit Networks Applications
 Transmitting
real-time video images
without flicker or delay
 Exchanging 3D medical images
 Transmitting weather satellite data
 Supporting researchers working on
Human Genome project.
Communication Links
(continued)

Wireless data communication

Uses radio, microwave, and infrared signals

Enables “mobile computing”

Types of wireless data communication
• Wireless local access network
• Wireless wide-area access network
Wireless data communication

Wireless local access network





Transmits few hundred feet
Connected to standard wired network
Found in home, coffee shops, offices
Wi-Fi (Wireless Fidility) connects wireless computer
to internet within 150-300 ft of access point (called
hot spots).
Wireless wide-area access network



Computer transmits message to remote base
station, which may be miles away
Base station typically a large antenna on top of a
tower.
Some are only line-of-sight, so not more than 10-50
miles apart.
Local Area Networks

Local area network (LAN)



Connects hardware devices that are in close
proximity
The owner of the devices is also the owner of
the means of communications
Common wired LAN topologies
• Bus
• Ring
• Star
Figure 7.4
Some Common
LAN
Topologies
Common LAN Topologies
 Buses


If two or more nodes use the link at the same
time, messages collide and are unreadable
Nodes must take turns using net.
 Rings

Messages circulate in either clockwise or
counterclockwise direction until at destination
 Star

Central node routes information directly to any
other node.
Local Area Networks (continued)

Ethernet





Most widely used LAN technology
Uses the bus topology
Node places message including destination
address on bus.
This message is received by all other nodes
All nodes check address to see if message is
for them.
• Nodes who are not addressed discard message
Local Area Networks (continued)

Two ways to construct an Ethernet LAN



Shared cable
Hubs: The most widely used technology
Shared cable features



Wire is strung through the building.
Users connect into cable at nearest point.
Repeater amplifies and forwards signal
• If two Ethernets are connected using a repeater, they
function as a single network.

Bridge (or switch) joining two networks has
knowledge about nodes on each
• It forwards messages to other network only if needed.
Figure 7.5
An Ethernet LAN Implemented
Using Shared Cables
Hubs for LANs
 In
this construction of a LAN, a box called
a hub is used in place of shared cable
 Hubs are boxes with a number of ports.
 Hubs are placed in a wiring closet.

Each node in Ethernet LAN is connected to a
port
 Hubs
connects these ports using a shared
cable inside hub
Figure 7.6
An Ethernet LAN Implemented Using a Hub
Wide Area Networks

Wide area networks (WANs)




Connect devices that are across town, across
the country, or across the ocean
Users must purchase telecommunications
services from an external provider
Dedicated point-to-point lines
Most use a store-and-forward, packetswitched technology to deliver messages
Figure 7.7
Typical Structure of a Wide Area Network
Overall Structure of the Internet

All real-world networks, including the Internet,
are a mix of LANs and WANs

Example: A company or a college
• One or more LANs connecting its local
computers
• Individual LANs interconnected into a wide-area
company network

Routers are used to connect networks of both
similar and dissimilar types.
• A router can connect an LAN to a WAN.
• A bridge can only connect two networks of
identical type.
Figure 7.8(a)
Structure of a Typical Company Network
Overall Structure of the Internet
(continued)

Internet Service Provider (ISP)




Normally a business
Provides a pathway from a specific network to other
networks, or from an individual’s computer to other
networks
This access occurs through a WAN owned by the ISP
ISPs are hierarchical


Interconnect to each other in multiple layers to
provide greater geographical coverage
A regional or national ISP may connect to an
international IPS called a tier-1 network or Internet
backbone.
T1 & T3 Lines

A dedicated phone connection supporting data
rates of 1.544 Mbits per second.



Consists of 24 individual channels, each of which
supports 64Kbits per second.
Each 64Kbit/second channel can be configured to
carry voice or data traffic.
T-1 lines are a popular leased line option for
businesses connecting to the Internet and for
Internet Service Providers (ISPs) connecting to
the Internet backbone.
 The Internet backbone itself consists of faster
T-3 connections.
 Reference: Webopedia
Figure 7.8(b)
Structure of a Network Using an ISP
Figure 7.8(c)
Hierarchy of Internet Service
Providers
Overall Structure of the Internet
(continued)

Internet



A huge interconnected “network of networks”
Includes nodes, LANs, WANs, bridges,
routers, and multiple levels of ISPs
Early 2005
• 317 million nodes (hosts)
• Hundreds of thousands of separate networks
located in over 225 countries
Communication Protocols

A protocol

A mutually agreed upon set of rules, conventions, and
agreements for the efficient and orderly exchange of
information

Internet is operated by the Internet Society, a
nonprofit society consisting of over 100
worldwide organizations, foundations,
businesses, etc.
 TCP/IP




The Internet protocol hierarchy
Governs the operation of the Internet
Named after 2 of the most successful protocols
Consists of five layers (see next slide)
Figure 7.10
The Five-Layer TCP/IP Internet Protocol Hierarchy
Physical Layer

Protocols govern the exchange of binary
digits across a physical communication
channel
 Specify such things as





What signal is used to indicate a bit on the line
How long will “bit on the line” signal last
Will signal be digital or analog
What voltage levels are used to represent 0 & 1
Goal: Create a bit pipe between two
computers
Data Link Layer

Protocols carry out


Error detection and correction
Framing
• Which bits in incoming stream belong together
• Identifying start and end of message

Creates an error-free message pipe
 Composed of two stages

Layer 2a: Medium access control

Layer 2b: Logical link control
Data Link Layer (continued)

Medium access control protocols


Determine how to arbitrate ownership of a
shared line when multiple nodes want to send
at the same time
Logical link control protocols

Ensure that a message traveling across a
channel from source to destination arrives
correctly
Layer 2a
Medium access
control protocols
Automatic Repeat Request (ARQ) Algorithm
Part of Logical Link Protocols - layer 2b
Assures message travels from A to B correctly
Automatic Repeat Request
(ARQ)

Process of requesting that a data transmission
be resent
 Main ARQ protocols

Stop and Wait ARQ (A half duplex technique)
• Sender sends a message and waits for
acknowledgment, then sends the next message
• Receiver receives the message and sends an
acknowledgement, then waits for the next message

Continuous ARQ (A full duplex technique)
• Sender continues sending packets without waiting for
the receiver to acknowledge
• Receiver continues receiving messages without
acknowledging them right away
Stop and Wait ARQ
Sender
Sends the packet,
then waits to hear
from receiver.
Sends the
next packet
Receiver
Sends
acknowledgement
Sends negative
acknowledgement
Resends the
packet again
Continuous
ARQ
Sender sends packets
continuously without
waiting for receiver to
acknowledge
Notice that
acknowledgments now
identify the packet
being acknowledged.
Receiver sends back
a NAK for a specific
packet to be resent.
Sources of Errors and Prevention
Source of Error
What causes it
How to prevent it
More important
mostly on analog
Line Outages
Faulty equipment, Storms,
Accidents (circuit fails)
White Noise (hiss)
(Gaussian Noise)
Movement of electrons (thermal
energy)
Increase signal strength
(increase SNR)
Impulse Noise
Sudden increases in electricity
(e.g., lightning, power surges)
Shield or move the wires
Cross-talk
Multiplexer guard bands are too
small or wires too close together
Increase the guard bands, or
move or shield the wires
Echo
Poor connections (causing signal to
be reflected back to the source)
Fix the connections, or
tune equipment
Attenuation
Gradual decrease in signal over
distance (weakening of a signal)
Intermodulation
Noise
Signals from several circuits
combine
Use repeaters or
amplifiers
Move or shield the wires
Jitter
Analog signals change (small
changes in amp., freq., and phase)
Tune equipment
Harmonic
Distortion
Amplifier changes phase (does not
correctly amplify its input signal)
Tune equipment
(Spikes)
Error Detection
Sender calculates an
Error Detection Value
(EDV) and transmits
it along with data
Receiver recalculates
EDV and checks it
against the received EDV
Mathematical
calculations
Mathematical
calculations
?
=
Data to be
transmitted
EDV
Larger the size, better
error detection (but
lower efficiency)
– If the same  No
errors in transmission
– If different  Error(s)
in transmission
Error Detection Techniques
 Parity
checks
 Longitudinal Redundancy Checking (LRC)
 Polynomial checking


Checksum
Cyclic Redundancy Check (CRC)
Parity Checking

One of the oldest and simplest
 A single bit added to each character



Receiving end recalculates parity bit


Even parity: number of 1’s remains even
Odd parity: number of 1’s remains odd
If one bit has been transmitted in error the received
parity bit will differ from the recalculated one
Simple, but doesn’t catch all errors


If two (or an even number of) bits have been
transmitted in error at the same time, the parity check
appears to be correct
Detects about 50% of errors
Examples of Using Parity
To be sent: Letter V in 7-bit ASCII: 0110101
EVEN parity
sender
01101010
number of all
transmitted 1’s
remains EVEN
ODD parity
receiver
parity
sender
number of all transmitted
1’s remains ODD
receiver
01101011
parity
LRC - Longitudinal Redundancy
Checking

Adds an additional character (instead of a bit)



Block Check Character (BCC) to each block of data
Determined like parity but, but counting longitudinally
through the message (as well as vertically)
Calculations are based on the 1st bit, 2nd bit, etc. (of
all characters) in the block
• 1st bit of BCC  number of 1’s in the 1st bit of
characters
• 2nd bit of BCC number of 1’s in the 2ndt bit of
characters

Major improvement over parity checking


98% error detection rate for burst errors ( > 10 bits)
Less capable of detecting single bit errors
Using LRC for Error Detection
Example:
Send the message “DATA” using ODD parity and LRC
Parity bit
Letter ASCII
D 10001001
A 10000011
T 10101000
A 10000011
BCC 1 1 0 1 1 1 1 1
Note that the BCC’s parity bit
is also determined by parity
Polynomial Checking

Adds 1 or more characters to the end of
message (based on a mathematical algorithm)
 Two types: Checksum and CRC
 Checksum





Calculated by adding decimal values of each
character in the message,
Dividing the total by 255. and
Saving the remainder (1 byte value) and using it as
the checksum
95% effective
Cyclic Redundancy Check (CRC)

Computed by calculating the remainder to a division
problem:
Cyclic Redundancy Check
(CRC)
P/G=Q+R/G
Quotient
Message
(whole
(treated as
number)
one long
binary
A fixed number
number)
(determines the
length of the R)
Example:
P = 58
G=8
Q=7
R =2
Remainder:
–added to the
message as EDV)
–could be 8 bits, 16
bits, 24 bits, or 32
bits long
– Most powerful and most common
– Detects 100% of errors (if number of errors <= size of R)
–Otherwise: CRC-16 (99.998%) and CRC-32 (99.9999%)
Network Layer

Delivers a message from the site where it
was created to its ultimate destination

Critical responsibilities


Create a universal addressing scheme for all
network nodes
Deliver messages between any two nodes in
the network
Network Layer (continued)

Provides a true network delivery service


Messages are delivered between any two
nodes in the network, regardless of where
they are located
Universal addressing scheme used

IP (Internet Protocol) layer

Example:
• One author’s host name is macalester.edu
• The IP address for host is (in decimal)
141.140.1.5
• Corresponds to following 32 bit address
10001101 10001100 0000000 100000101
• Clearly, the symbolic name is easier to remember.
Network Layer (cont.)

Domain Name System (DNS)




It is the job of the DNS to convert symbolic names to
a sequence of 32 binary bits
DNS is a massive distributed database
If local name server does not recognize host name, it
is forwarded to a remote name servers until one
locates its name.
Routing Algorithms



There are normally multiple routes a message can
take to its destination.
A routing algorithm called “Dijkstra’s shortest path”
algorithm is used, based on time required to send a
message along various paths.
For large networks with 107 nodes or more, algorithm
may require 1014 or more calculations.
Network Layer (cont)
 Keeping
these routing tables up to date is
an enormous task.


Data changes regularly, so they have to be
recalculated frequently.
When a network node or sections of network
fails, must route around the failed nodes.
 Network



Layer also handles other things
Network management
Broadcasting
Locating mobile nodes
Transport Layer

Provides a high-quality, error-free, order- preserving,
end-to-end delivery service

TCP (Transport Control Protocol)





Primary transport protocol on the Internet
Requires the source and destination programs to
initially establish a connection
Uses ARQ algorithm on sending & receiving
messages.
Messages sent in packets and have to be
reassembled in order at destination
Standard applications (e.g., POP3 or IMAP for email)
have fixed port numbers for all computers.
Figure 7.15
Logical View of a TCP Connection
Application Layer

Implements the end-user services provided
by a network

There are many application protocols

HTTP

SMTP

POP3

IMAP

FTP
Figure 7.16
Some Popular Application Protocols on the Internet
Application Layer (continued)

Uniform Resource Locator (URL)

A symbolic string that identifies a Web page

Form
protocol://host address/page

The most common Web page format is
hypertext information
• Accessed using the HTTP protocol
• Example:
http://www.macalester.edu/about/history.html
Network Services and Benefits

Services offered by computer networks

Electronic mail (email)
• Send message when you want & read at receiver’s
convenience
• From U.S., arrives anywhere in world in about a
minute.

Bulletin boards
Internet Services (cont)
 Services
offered by c. networks (cont)

News groups

Chat rooms

Resource sharing
• Physical resources
• Logical resources
Network Services and Benefits
(continued)

Services offered by computer networks

Client-server computing

Information sharing (databases)

Information utility
• reference documents online

Electronic commerce (e-commerce)
A Brief History of the Internet and
the World Wide Web: The Internet

August 1962: First proposal for building a
computer network


Written by J. C. R. Licklider of MIT
ARPANET



Built by the Advanced Research Projects Agency
(ARPA) in Dept of Defense in the late1960s
Packet switching viewed as more secure than phone
lines.
First two nodes were at Stanford Research Institute
(SRI) and UCLA, in 1969
• Univ. of Calif. at Santa Barbara & Univ. Utah added in 1969

Grew quickly during the early 1970s
The Internet (continued)

ARPANET (cont)

Electronic Email developed in 1972

Huge success of ARPANET lead to creation of
other research and commercial networks
 In 1973, Kahn at ARPA and Cerf at Stanford
started work to allow different networks to
communicate



A common address scheme
The TCP/IP protocols that provided a common
language
Additional “Killer Applications” in early 1980’s


Telnet – Log on remotely to another computer
FTP – File Transfer Protocol
The Internet (continued)

Most people with Internet access in early 1980’s
were physicist, engineers, & computer scientist


ARPANET connected only 235 computers in 1982,
one of which was KSU Mathematical Science Dept.
NSFNet: A national “network of networks” built
by the National Science Foundation (NSF) in
1984


Goal was to bring internet services to all academic
and professional groups.
Included universities, libraries, museums, medical
centers, etc.
The Internet (continued)

Many countries quickly followed lead of NSFNet
and connected their professional groups to the
internet.
 October 24, 1995: Formal acceptance of the
term Internet by the U.S. Govt.
 Internet service providers start offering Internet
access once provided by the ARPANET and
NSFNet
Figure 7.20
State of Networking in the Late 1980s
The World Wide Web

Development completed in May 1991



Designed and built by Tim Berners-Lee at CERN
(European High Energy Physics Lab) in Geneva
Switzerland.
Purpose was to allow scientists to more easily
exchange information such as research articles,
experimental data
Would be a big improvement of earlier methods
of email messaging and FTP.
Figure 7.21
Hypertext Documents
The World Wide Web (cont)

Components
 Hypertext
• A collection of documents interconnected by
pointers called links

Hypertext links called a URL (Uniform
Resource Locator)
• The worldwide identification of a Web page located
on a specific host computer

In 1993 CERN announced their web technology
would be freely available.

Realized impact it could have on research throughout
world.
The World Wide Web (cont)

A graphic browser (MOSIAC) was also released
in late 1993



Allowed public to make use of new technology
Forerunner of Netscape Navigator (1994) and
Microsoft Internet Explorer (1995)
The WWW became the killer app of the 21
century
Summary of Level 3

Virtual environment



Created by system software
Easy to use and easy to understand
Provides services such as
•
•
•
•

Resource management
Security
Access control
Efficient resource use
Operating systems continue to evolve
Summary

Computer network: A set of independent
computer systems connected by
telecommunication links

Options for transmitting data on a network:
Dial-up telephone lines, DSL, cable modem,
Ethernet, Fast Ethernet

Types of networks: Local area network (LAN)
and wide area network (WAN)
Summary (continued)

The Internet is a huge interconnected
"network of networks"

TCP/IP is the Internet protocol hierarchy,
composed of five layers: physical, data link,
network, transport, and application

The World Wide Web is an information
system based on the concept of hypertext