Chapter 7 Powerpoints
Download
Report
Transcript Chapter 7 Powerpoints
Chapter 7: Computer
Networks, the Internet, and
the World Wide Web
Invitation to Computer Science,
C++ Version, Third Edition
2004 Course Technology
Additions by Paul Durand, Kent State Univ, 2005
Objectives
In this chapter, you will learn about:
Basic networking concepts
Communication protocols
Network services and benefits
A brief history of the Internet and the World Wide
Web
Invitation to Computer Science, C++ Version, Third Edition
2
Introduction
Computer network
Computers connected together
Purpose: exchanging resources and information
Just about any kind of information can be sent
Examples: television and radio signals, voice,
graphics, handwriting, photographs, movies
Invitation to Computer Science, C++ Version, Third Edition
3
Basic Networking Concepts
Computer network
Set of independent computer systems connected
by telecommunication links
Purpose: sharing information and resources
Nodes, hosts, or end systems
Individual computers on a network
Invitation to Computer Science, C++ Version, Third Edition
4
Communication Links
Switched, dial-up telephone
line
A circuit is temporarily
established between the
caller and callee
Analog medium
Requires modem at both
ends to transmit information
produced by a computer
Computer produces digital
information
Invitation to Computer Science, C++ Version, Third Edition
Diagram by PJD, 2005
5
Invitation to Computer Science, C++ Version, Third Edition
Diagram by PJD, 2005
6
Figure 7.1 Two Forms of Information Representation
Invitation to Computer Science, C++ Version, Third Edition
7
Figure 7.2
Modulation of a Carrier to Encode Binary Information
Invitation to Computer Science, C++ Version, Third Edition
8
Communication Links (continued)
Dial-up phone links
Transmission rate: 56,000 bps (56 Kbps)
Broadband
Transmission rate: exceeding 128,000 bps (128
Kbps)
Invitation to Computer Science, C++ Version, Third Edition
9
Communication Links (continued)
Options for broadband communications
Home use
Digital subscriber line (DSL)
Broadband Tutorial
Cable modem
CableModem Tutorial
Commercial and office environment
Ethernet
Fast Ethernet
Gigabit Ethernet
Invitation to Computer Science, C++ Version, Third Edition
Ethernet Tutorial
Links added by PJD, 2005
10
Figure 7.3
Transmission Time of an Image at Different Transmission Speeds
Invitation to Computer Science, C++ Version, Third Edition
11
Communication Links (continued)
Wireless data communication
Uses radio, microwave, and infrared signals
Enables “mobile computing”
Types of wireless data communication
Wireless local access network
Wireless wide-area access network
Invitation to Computer Science, C++ Version, Third Edition
12
Local Area Networks
Local area network (LAN)
Connects hardware devices that are in close
proximity
The owner of the devices is also the owner of the
means of communications
Common wired LAN topologies
Bus
Ring
Star
Invitation to Computer Science, C++ Version, Third Edition
13
Figure 7.4
Some Common
LAN Topologies
Invitation to Computer Science, C++ Version, Third Edition
14
Local Area Networks (continued)
Ethernet
Most widely used LAN technology
Uses the bus topology
Two ways to construct an Ethernet LAN
Shared cable
Hubs: the most widely used technology
Invitation to Computer Science, C++ Version, Third Edition
15
KSU
12/1/2004
A bridge is also called a switch.
- It is 'smarter' than a repeater.
- It is aware of which nodes are on which side
of the lan.
- It determines whether a message should be
passed on to another network
Figure 7.5: An Ethernet
LAN Implemented
Using Shared Cables
Invitation to Computer Science, C++ Version, Third Edition
Comment by PJD, 2005
16
Figure 7.6
An Ethernet LAN Implemented Using a Hub
Invitation to Computer Science, C++ Version, Third Edition
17
Wide Area Networks
Wide area networks (WANs)
Connect devices that are across town, across the
country, or across the ocean
Users must purchase telecommunications
services from an external provider
Dedicated point-to-point lines
Most use a store-and-forward, packet-switched
technology to deliver messages
Invitation to Computer Science, C++ Version, Third Edition
18
•UOT = Packet
- approx 1000 bytes
•Non-fixed routing
•Fault Tolerant
Text by PJD, 2005
Figure 7.7
Typical Structure of a Wide Area Network
Invitation to Computer Science, C++ Version, Third Edition
19
Overall Structure of the Internet
All real-world networks, including the Internet,
are a mix of LANs and WANs
Example: a company or a college
One or more LANs connecting its local computers
Individual LANs interconnected into a wide-area
“company network”
Invitation to Computer Science, C++ Version, Third Edition
20
KSU
12/1/2004
A router connects various networks.
It differs from a bridge. a bridge connects
two identical types of networks.
A router can transfer messages between
Figure
two distinct networks, each using
a totally7.8(a)
different communication
technique.
Structure
of a Typical Company
Invitation to Computer Science, C++ Version, Third Edition
Network
Comment by PJD, 2005
21
Overall Structure of the Internet
(continued)
Internet Service Provider (ISP)
A wide-area network
Provides a pathway from a specific network to
other networks, or from an individual to other
networks
ISPs are hierarchical
Interconnect to each other in multiple layers to
provide greater geographical coverage
Invitation to Computer Science, C++ Version, Third Edition
22
Figure 7.8(b)
Structure of a Network Using an ISP
Invitation to Computer Science, C++ Version, Third Edition
23
Figure 7.8(c)
Hierarchy of Internet Service
Providers
Invitation to Computer Science, C++ Version, Third Edition
24
Overall Structure of the Internet
(continued)
Internet
A huge interconnected “network of networks”
Includes nodes, LANs, WANs, bridges, routers,
and multiple levels of ISPs
Early 2003
170 million nodes (hosts)
Hundreds of thousands of separate networks
located in over 225 countries
Invitation to Computer Science, C++ Version, Third Edition
25
Communication Protocols
The internet is operated by the Internet Society, a non-profit, nongovernmental, professional society.
This group establishes and enforces network protocol standards.
A protocol
IAB – Internet Architecture Board
IETF – Internet Engineering Task Force
A mutually agreed upon set of rules, conventions,
and agreements for the efficient and orderly
exchange of information
TCP/IP
The Internet protocol hierarchy
Governs the operation of the Internet
Five layers
Invitation to Computer Science, C++ Version, Third Edition
Comment by PJD, 2005
26
Internet Maps
http://www.cybergeography.org/atlas/more_isp_maps.html
http://www.isoc.org/internet/infrastructure/maps.shtml
Invitation to Computer Science, C++ Version, Third Edition
27
Figure 7.10
The Five-Layer TCP/IP Internet Protocol Hierarchy
Invitation to Computer Science, C++ Version, Third Edition
28
Physical Layer
Protocols govern the
exchange of binary digits
across a physical
communication channel
Goal: create a “bit pipe”
between two computers
Invitation to Computer Science, C++ Version, Third Edition
Figure added by PJD, 2005
29
Data Link KSU
Layer
12/1/2004
Medium access control
- How to arbitrate ownership of a shared line?
Protocols carry out
- Central master control node?
Error handling
Framing
- Contention based approach?
- no central control
(identify
start
and end
message)
- equal
access
forofall
Creates an error-free “message pipe”
Composed of two services
Layer 2a: medium access control
Layer 2b: logical link control
Invitation to Computer Science, C++ Version, Third Edition
30
Data Link Layer (continued)
Medium access control protocols
Determine how to arbitrate ownership of a shared
line when multiple nodes want to send at the
same time
Logical link control protocols
Ensure that a message traveling across a channel
from source to destination arrives correctly
Invitation to Computer Science, C++ Version, Third Edition
31
Layer 2a
Medium access
control protocols
Invitation to Computer Science, C++ Version, Third Edition
32
Automatic Repeat Request (ARQ) Algorithm
Part of Logical Link Protocols - layer 2b
Assures message travels from A to B correctly
Invitation to Computer Science, C++ Version, Third Edition
33
Automatic Repeat Request (ARQ)
Process of requesting that a data transmission be
resent
Main ARQ protocols
Stop and Wait ARQ (A half duplex technique)
Sender sends a message and waits for acknowledgment,
then sends the next message
Receiver receives the message and sends an
acknowledgement, then waits for the next message
Continuous ARQ (A full duplex technique)
Sender continues sending packets without waiting for the
receiver to acknowledge
Receiver continues receiving messages without
acknowledging them right away
Invitation to Computer Science, C++ Version, Third Edition
34
Stop and Wait ARQ
Sender
Sends the packet,
then waits to hear
from receiver.
Receiver
Sends
acknowledgement
Sends the
next packet
Sends negative
acknowledgement
Resends the
packet again
Invitation to Computer Science, C++ Version, Third Edition
35
Continuous ARQ
Sender sends packets
continuously without
waiting for receiver to
acknowledge
Notice that
acknowledgments now
identify the packet
being acknowledged.
Receiver sends back
a NAK for a specific
packet to be resent.
Invitation to Computer Science, C++ Version, Third Edition
36
Sources of Errors and Prevention
Source of Error
What causes it
How to prevent it
More important
Line Outages
Faulty equipment, Storms,
Accidents (circuit fails)
White Noise (hiss)
(Gaussian Noise)
Movement of electrons (thermal
energy)
Increase signal strength
(increase SNR)
Impulse Noise
Sudden increases in electricity
(e.g., lightning, power surges)
Shield or move the wires
Cross-talk
Multiplexer guard bands are too
small or wires too close together
Increase the guard bands, or
move or shield the wires
Echo
Poor connections (causing signal to
be reflected back to the source)
Fix the connections, or
tune equipment
Attenuation
Gradual decrease in signal over
distance (weakening of a signal)
Intermodulation
Noise
Signals from several circuits
combine
Use repeaters or
amplifiers
Move or shield the wires
Jitter
Analog signals change (small
changes in amp., freq., and phase)
Tune equipment
Harmonic
Distortion
Amplifier changes phase (does not
correctly amplify its input signal)
Tune equipment
(Spikes)
mostly on analog
Invitation to Computer Science, C++ Version, Third Edition
37
Error Detection
Sender calculates an
Error Detection Value
(EDV) and transmits
it along with data
Receiver recalculates
EDV and checks it
against the received EDV
Mathematical
calculations
Mathematical
calculations
?
=
Data to be
transmitted
EDV
Larger the size, better
error detection (but
lower efficiency)
Invitation to Computer Science, C++ Version, Third Edition
– If the same No
errors in transmission
– If different Error(s)
in transmission
38
Error Detection Techniques
Parity checks
Longitudinal Redundancy Checking (LRC)
Polynomial checking
Checksum
Cyclic Redundancy Check (CRC)
Invitation to Computer Science, C++ Version, Third Edition
39
Parity Checking
One of the oldest and simplest
A single bit added to each character
Receiving end recalculates parity bit
Even parity: number of 1’s remains even
Odd parity: number of 1’s remains odd
If one bit has been transmitted in error the received parity
bit will differ from the recalculated one
Simple, but doesn’t catch all errors
If two (or an even number of) bits have been transmitted in
error at the same time, the parity check appears to be
correct
Detects about 50% of errors
Invitation to Computer Science, C++ Version, Third Edition
40
Examples of Using Parity
To be sent: Letter V in 7-bit ASCII: 0110101
EVEN parity
sender
01101010
number of all
transmitted 1’s
remains EVEN
ODD parity
receiver
parity
sender
number of all transmitted
1’s remains ODD
Invitation to Computer Science, C++ Version, Third Edition
receiver
01101011
parity
41
LRC - Longitudinal Redundancy Checking
Adds an additional character (instead of a bit)
Block Check Character (BCC) to each block of data
Determined like parity but, but counting longitudinally
through the message (as well as vertically)
Calculations are based on the 1st bit, 2nd bit, etc. (of all
characters) in the block
1st bit of BCC number of 1’s in the 1st bit of characters
2nd bit of BCC number of 1’s in the 2ndt bit of characters
Major improvement over parity checking
98% error detection rate for burst errors ( > 10 bits)
Less capable of detecting single bit errors
Invitation to Computer Science, C++ Version, Third Edition
42
Using LRC for Error Detection
Example:
Send the message “DATA” using ODD parity and LRC
Letter
ASCII
Parity bit
D 10001001
A 10000011
T 10101000
A 10000011
BCC 1 1 0 1 1 1 1 1
Note that the BCC’s parity bit
is also determined by parity
Invitation to Computer Science, C++ Version, Third Edition
43
Polynomial Checking
Adds 1 or more characters to the end of message
(based on a mathematical algorithm)
Two types: Checksum and CRC
Checksum
Calculated by adding decimal values of each character in
the message,
Dividing the total by 255. and
Saving the remainder (1 byte value) and using it as the
checksum
95% effective
Cyclic Redundancy Check (CRC)
Computed by calculating the remainder to a division
problem:
Invitation to Computer Science, C++ Version, Third Edition
44
Cyclic Redundancy Check (CRC)
P/G=Q+R/G
Quotient
Message
(whole
(treated as
number)
one long
binary
A fixed number
number)
(determines the
length of the R)
Example:
P = 58
G=8
Q=7
R =2
Remainder:
–added to the
message as EDV)
–could be 8 bits, 16
bits, 24 bits, or 32
bits long
– Most powerful and most common
– Detects 100% of errors (if number of errors <= size of R)
–Otherwise: CRC-16 (99.998%) and CRC-32 (99.9999%)
Invitation to Computer Science, C++ Version, Third Edition
45
Network Layer
Delivers a message from the site where it was
created to its ultimate destination
Critical responsibilities
Creating a universal addressing scheme for all
network nodes
Delivering messages between any two nodes in
the network
Invitation to Computer Science, C++ Version, Third Edition
46
Network Layer (continued)
Provides a true “network delivery service”
Messages are delivered between any two nodes
in the network, regardless of where they are
located
IP (Internet Protocol) layer
Network layer in the Internet
Invitation to Computer Science, C++ Version, Third Edition
47
Ethernet (IEEE 802.3) Frame
Used by Virtual LANs; (if no
vLAN, the field is omitted
If used, first 2 bytes is set
to: 24,832 (8100H)
Repeating
pattern of 1’s
and 0’s
(1010101010)
(number of bytes
in the message
field)
Invitation to Computer Science, C++ Version, Third Edition
Used to hold sequence number,
ACK/NAK, etc., (1 or 2 bytes)
00
01
10
11
Used to exchange
control info (e.g.,
type of network layer
protocol used)
48
Transport Layer
Provides a high-quality, error-free, order
preserving end-to-end delivery service
TCP (Transport Control Protocol)
Primary transport protocol on the Internet
Requires the source and destination programs to
initially establish a connection
Invitation to Computer Science, C++ Version, Third Edition
49
Figure 7.15
Logical View of a TCP Connection
Invitation to Computer Science, C++ Version, Third Edition
50
Application Layer
Implements the end-user services provided by a
network
There are many application protocols, including:
HTTP
SMTP
POP3
IMAP
FTP
Invitation to Computer Science, C++ Version, Third Edition
51
Figure 7.16
Some Popular Application Protocols on the Internet
Invitation to Computer Science, C++ Version, Third Edition
52
Application Layer (continued)
Uniform Resource Locator (URL)
A symbolic string that identifies a Web page
Form
protocol://host address/page
The most common Web page format is hypertext
information
Accessed using the HTTP protocol
Invitation to Computer Science, C++ Version, Third Edition
53
Network Services and Benefits
Services offered by computer networks
Electronic mail (email)
Bulletin boards
News groups
Chat rooms
Resource sharing
Physical resources
Logical resources
Invitation to Computer Science, C++ Version, Third Edition
54
Network Services and Benefits
(continued)
Services offered by computer networks
Client-server computing
Information sharing
Information utility
Electronic commerce (e-commerce)
Invitation to Computer Science, C++ Version, Third Edition
55
A Brief History of the Internet and
the World Wide Web:
The Internet
August 1962: first proposal for building a
computer network
Made by J. C. R. Licklider of MIT
ARPANET
Built by the Advanced Research Projects Agency
(ARPA) in the 1960s
Grew quickly during the early 1970s
Invitation to Computer Science, C++ Version, Third Edition
56
The Internet (continued)
NSFNet: A national network built by the National
Science Foundation (NSF)
October 24, 1995: Formal acceptance of the
term “Internet”
Internet service providers start offering Internet
access once provided by the ARPANET and
NSFNet
Invitation to Computer Science, C++ Version, Third Edition
57
Figure 7.20
State of Networking in the Late 1980s
Invitation to Computer Science, C++ Version, Third Edition
58
The World Wide Web
Development completed in May 1991
Designed and built by Tim Berners-Lee
Components
Hypertext
A collection of documents interconnected by
pointers called links
URL (Uniform Resource Locator)
The worldwide identification of a Web page located
on a specific host computer
Invitation to Computer Science, C++ Version, Third Edition
59
Figure 7.21
Hypertext Documents
Invitation to Computer Science, C++ Version, Third Edition
60
Summary of Level 3
Virtual environment
Created by system software
Easy to use and easy to understand
Provides services such as:
Resource management
Security
Access control
Efficient resource use
Operating systems continue to evolve
Invitation to Computer Science, C++ Version, Third Edition
61
Summary
Computer network: a set of independent
computer systems connected by
telecommunication links
Options for transmitting data on a network: dialup telephone lines, DSL, cable modem,
Ethernet, Fast Ethernet
Types of networks: local area network (LAN) and
wide area network (WAN)
Invitation to Computer Science, C++ Version, Third Edition
62
Summary
The Internet is a huge interconnected "network
of networks"
TCP/IP is the Internet protocol hierarchy,
composed of five layers: physical, data link,
network, transport, and application
The World Wide Web is an information system
based on the concept of hypertext
Invitation to Computer Science, C++ Version, Third Edition
63