Computer Networks Fundamental terminology Network standards organizations Standard

  • Slides: 27
Download presentation
Computer Networks · Fundamental terminology · Network standards organizations · Standard network hardware examples

Computer Networks · Fundamental terminology · Network standards organizations · Standard network hardware examples – ethernet – token ring – ATM · Future issues · Protocols · OSI layers and internetworking – bridging and routing · Web-based commerce (9. 1)

Computer Networks (9. 2) · Networks are simply a set of computers connected by

Computer Networks (9. 2) · Networks are simply a set of computers connected by a communication medium, communicating by established conventions – typically bursty transmission characteristics · Network goals – resource sharing » expensive equipment » large, reliable data storage – high reliability » replication of services » although network may be single point of failure – lower overall system costs with better performance » a few shared high-end machines, many individual low-end machines

Computer Networks (continued) · Network categories – local area networks (LAN) » typically single

Computer Networks (continued) · Network categories – local area networks (LAN) » typically single transmission – wide area networks (WAN) » typically store and forward – interconnected networks (internets) (9. 3)

Fundamental Terminology (9. 4) · Circuit switched / packet switched – circuit switched =

Fundamental Terminology (9. 4) · Circuit switched / packet switched – circuit switched = telephone » connection route established at start of communication, maintained as long as communication continues » route is dedicated to one communication – packet switched » whole communication is broken down into smaller chunks called packets » each packet may take a different route to the destination » routes may be shared by other communications

Fundamental Terminology (continued) (9. 5) · Another categorization of packet switched networks is –

Fundamental Terminology (continued) (9. 5) · Another categorization of packet switched networks is – virtual circuit » packets all take same route, set up in advance – datagram » each packet routed independently, no connection established » typically more robust

Fundamental Terminology (continued) · Packets typically consist of – header » source and destination

Fundamental Terminology (continued) · Packets typically consist of – header » source and destination addresses » sequence number – data portion – trailer » error detecting and correcting information · Packets may be fixed or variable length head data tail (9. 6)

Network Standards Organizations (9. 7) · International Standards Organization (ISO) – makes standards for

Network Standards Organizations (9. 7) · International Standards Organization (ISO) – makes standards for many different activities · American National Standards Institute (ANSI) – US representative to ISO · CCITT – one part of the UN agency International Telecommunications Union – concerned with telephone and data communication services – US representative is the State Department

Network Standards Organizations (cont. ) (9. 8) · National Instituted of Standards and Technology

Network Standards Organizations (cont. ) (9. 8) · National Instituted of Standards and Technology (NIST) – standards body for US government purchases · Institute of Electrical and Electronics Engineers (IEEE) – key standards for LANs · Internet Engineering Task Force (IETF)

Local Area Network Standards (9. 9) · Ethernet (IEEE 802. 3) – Carrier Sense

Local Area Network Standards (9. 9) · Ethernet (IEEE 802. 3) – Carrier Sense Multiple Access / Collision Detect (CSMA/CD) » listen to cable, no one transmitting go ahead » if collide, delay random time and retransmit – multiple topologies – multiple media » coaxial cable (thick or thin) » twisted pair wire (10 Base. T) – minimum packet size 64 bytes » heavy overhead for one byte of data – fast ethernet technologies allow 100 Mbps on twisted pair » 1000 Mbps now available on optical fiber

(9. 10) Local Area Network Standards (continued) · Token ring (IEEE 802. 5) –

(9. 10) Local Area Network Standards (continued) · Token ring (IEEE 802. 5) – token determines which host gets to transmit » special bit pattern used for token » when station wants to transmit • watch network for token • take token off ring and transmit packet • drain packet as it comes around again • put token back on ring when done – single topology – one node monitors ring to regenerate token if necessary

(9. 11) Local Area Network Standards (continued) · Ethernet – faster access if light

(9. 11) Local Area Network Standards (continued) · Ethernet – faster access if light load – degrades rapidly as load increases » > 60% utilization is a problem – no guaranteed access » host can “starve” – most popular LAN technology

(9. 12) Local Area Network Standards (continued) · Token ring – minimum delay to

(9. 12) Local Area Network Standards (continued) · Token ring – minimum delay to transmit, since have to wait for token – delivers much better performance under heavy load » can reach close to 100% utilization – fair » host can hold token for 10 msec, then must put back on network » each host gets token at least every 10 * number of hosts msec – “sick” monitor station cause problems

Frame Relay and ATM (9. 13) · Frame Relay – virtual circuit organization –

Frame Relay and ATM (9. 13) · Frame Relay – virtual circuit organization – uses leased or private lines » vc set up at time subscribers are connected to the network – “light” protocol » no error checking by network, just delivery mechanism – 64 Kbps to 45 Mbps

ATM (9. 14) · Asynchronous Transfer Mode (ATM) – being standardized by CCITT –

ATM (9. 14) · Asynchronous Transfer Mode (ATM) – being standardized by CCITT – switched, virtual circuit approach – allows reserving network capacity – uses fixed size packets » easier for hardware to handle – twisted pair or fiber medium » 100 m to few km – 155 Mbps to 2400 Mbps – also used for LAN interconnect as backbone

Future Issues (9. 15) · Mobility – mobility within an office complex is possible

Future Issues (9. 15) · Mobility – mobility within an office complex is possible now » wireless LANs at 10 Mbps » low power radio connecting to wired communication – problem with computing outside the office – several factors force mobile computing outside office » cellular phone popularity » centrality of computing » reliance on networking and communication – problems are » creating enough bandwidth • possibly need multiple channels » not enough spectrum • current transmission / broadcast activities may swap

Network Protocols (9. 16) · A protocol is a set of conventions for communicating

Network Protocols (9. 16) · A protocol is a set of conventions for communicating · Concerned with issues such as – addressing and routing – error detection and correction – flow control and congestion control – higher level coordination depending on the purpose of the communication · International Standards Organization Open Systems Interconnection model (ISO OSI) – 7 layers of protocols – defined interfaces between each layer – lower layers typically implemented in hardware, upper in software

Network Protocols (continued) (9. 17)

Network Protocols (continued) (9. 17)

Network Protocols (continued) (9. 18) · ISO layers – application - detailed information about

Network Protocols (continued) (9. 18) · ISO layers – application - detailed information about data being exchanged – presentation - conventions for representing data – session - management of connections between programs – transport - delivery (reliable or otherwise) of sequences of packets – network - format of individual data packets – link - access to and control of transmission medium – physical - medium of transmission · Internet protocols (IP) are a competing set for lower layers – network and transport – defacto standard

Bridging · Bridging happens at Link layer – between LANs – provides » filtering

Bridging · Bridging happens at Link layer – between LANs – provides » filtering - only forward packets destined offnet » repacketization » speed matching (9. 19)

Routing (9. 20) · Internetworking (in WANs) – happens at network layer – routers

Routing (9. 20) · Internetworking (in WANs) – happens at network layer – routers connect WANs with very dissimilar characteristics » also called gateways · Routing – routers know whole network topology » determines which network to send packet on next from destination address – protocol conversion – fragmentation » when packet too large for next network it must pass through

Routing (continued) (9. 21)

Routing (continued) (9. 21)

Routing (continued) (9. 22)

Routing (continued) (9. 22)

(9. 23) Internet Futures · Current IP protocol is running out of addresses A

(9. 23) Internet Futures · Current IP protocol is running out of addresses A – 32 bits = 4 billion addresses – Class A - 127 large groups with 16 M machines B 7 24 0 14 » countries 1 0 – Class B - 16 K networks with 64 K or fewer C machines – Class C - 2 M networks 1 1 with 256 machines Multicast – each machine can only have one network address · Revised IP protocols (IPng) currently being devised – 128 bit addresses – also called IPv 6 1 1 16 21 8 0 28 1 0

(9. 24) Web-based Commerce · Conducting business (exchanging money) over the Internet requires several

(9. 24) Web-based Commerce · Conducting business (exchanging money) over the Internet requires several features that aren’t yet available – confidentiality » no one else listens to the transaction encryption – authentication » you really are who I think you are – data integrity » no one increases my order enroute – nonrepudiation » I can’t back out after I buy – selective application of services digital signatures and certificates » seller never sees my credit card number » I seal it and only give name of the bank, who authorizes payment

Web-based Commerce (continued) · Public-key systems provide confidentiality – I choose 2 keys, one

Web-based Commerce (continued) · Public-key systems provide confidentiality – I choose 2 keys, one public and one private » publish public key widely – I encode with private key – you decode with public key or – you encode with public key – I decode with private key (9. 25)

Web-based Commerce (continued) (9. 26) · Digital signatures use public key algorithms, usually on

Web-based Commerce (continued) (9. 26) · Digital signatures use public key algorithms, usually on digest of message to speed up – encode message digest (hash function) – cleartext message also digested at receiving end – if my decoded digest matches calculated one, I sent it and it hasn’t been changed

Web-based Commerce (continued) (9. 27) · Authentication provided by authentication entities – I don’t

Web-based Commerce (continued) (9. 27) · Authentication provided by authentication entities – I don’t send order directly to Nordstroms – send to authenticator instead, who verifies I’m me and sends the order to a prestored Nordstroms address – other variations exist · Several proposals to modify IP protocols at various levels to help this – IP protocol – Secure Sockets Layer session protocol – secure HTTP and MIME messaging