Вы находитесь на странице: 1из 11

Introduction to Networking

433-522 Internet Technologies


Week 1

Contents III Network Architecture Models 7


Protocols, Layers and Services 7
I Introduction 1 Protocol Hierarchies . . . . . . . . . . . . . . 7
Design of Layer Models . . . . . . . . . . . . 7
About me 1 Connection-Oriented and Connectionless Ser-
vices . . . . . . . . . . . . . . . . . . . . 7
About you 2 Services Primitives . . . . . . . . . . . . . . . 7
Services and Protocols . . . . . . . . . . . . . 8
About the subject 2
Network Reference Models 8
Open Systems Interconnect . . . . . . . . . . 8
II Network Fundamentals 3 TCP/IP . . . . . . . . . . . . . . . . . . . . . 8

Computer Networks 3 Network Standards 9

Network Types 3
IV Tutorial: Network Fundamen-
The Internet 5 tals 10

Lecture I
Introduction

About me ARC Research Associate, Department of


Mathematics, RMIT University
A little bit about me
University of Melbourne since 2000
Udaya Parampalli
How to contact me?
Research Interests:
Preferably at the end of lectures
Cryptography
Email: udaya@csse.unimelb.edu.au (with
Sequences for Communication and Securuty subject 522 or COMP90007)
Network Security
Expect 48 hours turn around on occasions!
Publications: www.csse.unimelb.edu.au/udaya
Office: 4.14 in ICT Building
Experience:
Consultation: By appointment (unless there is
4 years of Industrial research after Ph.D demand)

1
Introduction 433-522 Internet Technologies

About you Subject Description

Who are you? develop an understanding of network


technologies and applications, and be able to
Get into groups of two and ask each other:
demonstrate proficiency in internetworking and
What is your name? its management
What course are you doing?
Topics drawn from:
Which city were you born in?
Introduction to Internet
Everyone will then tell us what they have learnt.
OSI reference model layers
protocols and services
About the subject
data transmission basics
Subject Structure interface standards
12 Weeks of Lectures network topologies
2 hours of teaching + 1 hour of tutorial Visit data link protocols
LMS pages for time an venue of lectures. message routing
Assessment: LANs / WANs
40% Project/Assignment (50% Hurdle) TCP/IP suite
2 assignments (10% each individual work) detailed study of common network
1 project with presentation (20%- groups applications (e.g., email, news, FTP, Web)
of 2) network operations and management
60% Final examination (50% Hurdle) current and future developments in
Anyone failing a hurdle will fail the subject network hardware and protocols.
by at least the amount they failed the
hurdle Course Plan (Dates to be confirmed)
Topics by week:
Subject Resources
1 Introduction to Networking (Ch 1)
Prescribed Textbook: Computer Networks (4th
Edition) by Andrew S. Tanenbaum 2 Physical Layer (Ch 2) Assignment 1 handed out
Subject LMS: 3 Data link Layer (Ch 3)
http://www.lms.unimelb.edu.au/
4 Medium Access Control Sublayer (Ch 4)
The textbook website: Assignment 1 due
http://www.prenhall.com/tanenbaum
5 Network Layer (Ch 5) Assignment 2 handed out
Your fellow students (for discussion, not sharing
assignments) 6 Transport Layer (Ch 6) Project topics handed
The University Libraries out

7 Applications (current) (Ch 7) Assignment 2 due


Other References
8 Applications (emerging) (Ch 7)
Data and Computer Communications by
Richard Stallings (ERC 004.6 Stal) 9 Network Management
High-Performance Communication Networks by 10 Security (Ch 8)
Walrand & Varaiya (ERC 621.3821 Walr)
11 Project presentations
Computer Networks by Andrew Tanenbaum
(ERC 004.6 Tane) 12 Review Project report due

2
433-522 Internet Technologies Network Fundamentals

Generic Skills functionality of the different layers within a


network architecture
Familiarity with correct terminology within the
domain of computer networks
Able to explain the architecture and operation
Able to conceptualise and explain the of the Internet

Lecture II
Network Fundamentals

Computer Networks A Simple Client-Server Network 1.1.1

What is a Network? 1

Network (Noun):
An intricately connected system of things
or people.
An interconnected or intersecting
configuration or system of components.
Computer Network:
Requests/Replies in a Client-Server Model
A data network with computers at one or 1.1.1
more of the nodes. [Oxford Dictionary of
Computing]
A collection of autonomous computers
interconnected by a single technology.

What are the Internet and the World Wide


Web? 1

Neither the internet nor the WWW is a


computer network!
Simple Client-Server Interaction 1.1.1
Simple answers:
The internet is not a single network but a
network of networks!
The WWW is a distributed system that
runs on top of the internet

Uses of Computer Networks 1.1

Business Applications
Home Applications Network Types
Mobile Users Network Types 1.2

Social Issues Local Area Networks

How many different types of networks have you used? Metropolitan Area Networks

3
Network Fundamentals 433-522 Internet Technologies

Wide Area Networks Worst-case transmission time can be


predicted in advance
Wireless Networks
Transmission Technology
Internetworks
Physically wired network
Differentiating Factors of Networks 1.2
Topology
Transmission Type
Bus

Broadcast links only a single machine on the network


can transmit at any point in time
Broadcast networks have a single
requires a negotation mechanism to
communication channel shared by all
resolve transmission conflicts
machines on a network. Packets sent
by any machine are received by all Ethernet (IEEE 802.3) is the most
others, an address field in the packet common bus network
specifies the intended recipient. Ring
Intended recipients process the packet
contents, others simply ignore it. Each transmission bit is propagated
individually
Broadcasting is a mode of operation
which allows a packet to be Requires access control to resolve
transmitted that every machine must propagation queuing
process. Token Ring (outdated), FDDI is the
Multicasting is a mode of operation most common ring network type
which allows a subset of machines to
process a given packet. Bus vs Ring Network Types 1.2.1

Differentiating Factors of Networks 1.2

Transmission Type cont

Point-to-point links
Point to point networks consist of
many connections between individual
pairs of machines. Packets traveling
from source to destination must visit
Metropolitan Area Networks (MAN) 1.2.2
intermediate machines to determine a
route - often multiple routes of variant
efficiencies are available and Coverage typically larger than a LAN
optimisation is an important principle.
Cable TV networks are a prime example
Unicasting is the term used where
point-to-point networks with a single
sender and receiver pair can exchange data.

Scale

Local Area Networks 1.2.1


Distinguished by 3 factors

Size

4
433-522 Internet Technologies Network Fundamentals

Wide Area Networks 1.2.3 The Internet


Large scale geographical coverage - cities, states,
countries The Internet 1.5.1

Typically a single network provider is used


across the WAN, although aggregation models The Internet is composed of the aggregation of
are increasingly common many smaller networks - not a single network or
under a single point of control
WANs feature multiple hosts, typically owned
by non-network providers
Historically, the Internet developed in 3 distinct
WANs also feature multiple subnetworks, phases
including different transmission types and a
range of routing and switching infrastructure
ARPANET (1960s - early 1970s)
LANs and Subnets on a WAN 1.2.3 NSFNET (1970s - early 1980s)

Internet (1980s - present)

Network Topology Prior to ARPANET 1.5.1

In (a), the traditional topology of a telephone


network, primarily hierarchical with many single
Packet Switching on a WAN 1.2.3
points of failure, characteristic of networks prior
to the late 1960s

For primarily military purposes, a high degree


of fault tolerance was desirable, hence single
points of failure need to be eliminated

ARPANET design (b) included a distributed,


redundant switching and routing infrastructure
Types of Wireless Networks 1.2.4 to address these weaknesses

System Interconnection
Short range radio (< 10m)
Low bandwidth (-100Kbps)
Numerous technologies including Infrared
(IR), Bluetooth . . .
Wireless LAN
Longer range radio (typically 100-200m,
but up to 3-4km with the right equipment)
Moderate bandwidth (1-54Mbps)
Requires transmission and reception
devices
802.11 family is the most common

5
Network Fundamentals 433-522 Internet Technologies

Layers in ARPANETs Network Design 1.5.1 interoperable network types. The TCP/IP
model still underlies the Internet we use
today.
The basic unit of ARPANET was the IMP
(Interface Message Processors) - each connected Software
to at least 2 other IMPs
Entities such as as BBN and UCB built
At each node, an IMP and a single host were protocol support into computer operating
connected - the host generated or collected systems, notably Berkeley Unix. These
messages and passed them to the IMP for basic protocol stacks are still used by
transmission modern operating systems.
IMP software was split into host and network
components Strategic Network Backbones: NSFNet in the
1970s 1.5.1

Towards the Internet 1.5.1

Privatisation of telecommunications
infrastructures (particularly Network Access
Points (NAPs) in the USA in the 1970s and
Expanding ARPANET 1969-1973 1.5.1 1980s allowed commercial providers to build
internetworks

The widespread adoption of the TCP/IP


protocol stack ensured these networks and
associated developments were interoperable
regardless of who built them

From 1970 until around 1990, there were only a


small number of Internet applications - email,
news, remote login, file transfer
Significant ARPANET Contributions 1.5.1
In the early 1990s the invention of the WWW,
In addition to geographical growth, ARPA an application and protocol stack which built on
funded transmission research to allow multiple TCP/IP, together with a GUI by which to
transmission methods to be utilised to transfer navigate connected resources, massively
packets eg radio waves in combination with promoted the use of the Internet by
copper wires. non-academic users.
Protocols
In the mid 1990s, growth fuelled by ISPs who
Cerf and Kahn (1974) designed the offered individual users the ability to connect to
TCP/IP model to allow communication their networks via a modem, and thus connect
using a single protocol stack over multiple to the Internet.

6
433-522 Internet Technologies Network Architecture Models

Architecture of the Internet 1.5.1

Lecture III
Network Architecture Models

Protocols, Layers and Services Connection-Oriented and


Connectionless Services
Protocol Hierarchies
Connection-Oriented and Connectionless
Network Hierarchies 1.3.1 Services 1.3.3

Consider the network as a stack of layers Connection Oriented: connect, use, disconnect
(similar to telephone service)
Each layer offers services to layers above it
Negotiation inherent in connection setup
Inter-layer exchanges are conducted according
to a protocol Connectionless: use (similar to postal service)

Design of Layer Models Choice of service type has a corresponding


impact on the reliability and quality of the
Layers, Protocols and Interfaces 1.3.1 service itself

Types of Service 1.3.3

Protocol Hierarchies 1.3.1


Services Primitives
Service Primitives 1.3.4

Primitives are a formal set of operations for


services

The number and type of primitives in any


particular context is dependent on nature of
service itself - in general more complex services
require more primitives

7
Network Architecture Models 433-522 Internet Technologies

Open Systems Interconnect


OSI Reference Model 1.4.1
Open Systems Interconnection (OSI)
ISO, Day (1995)
7 layers
Services and Protocols
Layer divisions based on principled decisions
Relationship of Services and Protocols 1.3.5
OSI Layer Division Principles 1.4.1
Service = set of primitives that a layer provides
to a layer above it A layer should be created where a different
abstraction is needed.
interfaces between layers
Each layer should perform a well defined
function
Protocol = rules which govern the format and
meaning of packets that are exchanged by peers The function of each layer should be chosen
within a layer with a view toward defining internationally
standardised protocols
Packets sent between peer entities
The layer boundaries should be chosen to
minimise the information flow across the
interfaces
Network Reference Models
The number of layers should be large enough
Reference Models 1.4 that distinct functions need not to be thrown
together in the same layer out of necessity, and
OSI Reference Model small enough that the architecture does not
become unwieldy.
TCP/IP Reference Model
OSI Model Illustrated 1.4.1
OSI and TCP/IP Compared

OSI Model Critique

TCP/IP Model Critique

Why do we need a network reference model?


1.4

A reference model provides a common baseline


for the development of many services and
protocols by independent parties TCP/IP
Since networks are multi-dimensional, a TCP/IP Reference Model 1.4.2
reference model can serve to simplify the design Transmission Control Protocol/Internet
process Protocol

Its engineering best practice to have an Cerf & Kahn (1974)


abstract reference model, and a reference model
Infrastructure independent
and corresponding implementations are always
required for validation purposes 4 layers

8
433-522 Internet Technologies Network Architecture Models

TCP/IP Model Illustrated 1.4.2 Additionally some functions such as


addressing, flow control and error control
are recurring at each layer.
Implementations
early implementations of OSI were
inefficient, contrast with TCP/IP
implementations which are easy to use,
scalable and robust.
Politics
OSI was widely perceived as the product of
Comparing OSI and TCP/IP 1.4.3 quasi-government standards processes
Compare reference models, not the protocol rather than driven by good design
stacks processes

Differentiate Services, Interfaces, Protocols Criticisms of TCP/IP Model 1.4.5


Attachment to protocols Lack of distinction between concepts
Number of layers doesnt clearly distinguish between service,
Connectionless vs connection oriented interface and protocol
Not adaptable
Criticisms of OSI Model #1 1.4.4
not a general model, and hence poorly
Timing adapted to other protocol stacks

Juxtaposition research innovation and Ambiguous layers


standards development.
Host-to-network is not really a layer, but
Widespread adoption of the TCP/IP an interface between network and data link
protocols preceded the formalisation of layers
the OSI model
Vendors already begun offering Omitted layers
TCP/IP based products. Physical and data link layers are not
OSI emerged about 5 years after present
industry had adopted TCP/IP
Early implementations were fragile
Vendors were reticent to add support
for a second protocol stack until
momentum had gathered behind OSI. Network Standards
The combination of these factors
meant that OSI was never adopted in Network Standardization 1.6
practice
Standards provide an important common core,
allowing a wide range of implementations which
Criticisms of OSI Model #2 1.4.4 are interoperable
Technology Standardisation is a process of compromise
Some parts of the OSI model are between theortical desiderata and practical
fundamentally flawed. needs
Although theres 7 layers, 2 of these The existence of a standard can be
(session, presentation) are almost empty complemented or competed against by
and 2 others (data link, network) are implementations - compare OSI and
cramped. TCP/IP

9
Tutorial: Network Fundamentals 433-522 Internet Technologies

3 types of standards which affect networking Internet Standards 1.6.3


technologies
Internet Engineering Taskforce (IETF)
Telecommunications Standards
Open consortium
International Standards
Mainly protocol level standards
Internet Standards
RFCs
*Telecommunications Standards 1.6.1 http://www.ietf.org/rfc

International Telecommunications Union (ITU) World Wide Web Consortium (W3)

Membership based organisation


Radio communications (ITU-R)
Mainly applications level standards
Telecommunications (ITU-T)
http://www.w3.org
Development (ITU-D)
3000 recommendations Summary - Chapter 1
http://www.itu.int/
Network fundamentals
International Standards 1.6.2 Explain client-server model
International Standards Organisation (ISO) Characterise differences between:
Point-to-point vs broadcast links
Highly formalised standards development
Bus vs ring network types
process
13,000 standards Network Architecture Models
ISO Workgroups (WGs) design the Explain differences between protocols,
standard, Technical Committees (TCs) layers & services
ratify it
Characterise features of
http://www.iso.ch/ connection-oriented vs connectionless
services
National Standards Entities eg ANSI
Evaluate strengths & weaknesses of OSI &
Professional Organisations eg IEEE TCP/IP

Lecture IV
Tutorial: Network Fundamentals

1. An alternative to a LAN is simply a big


timesharing system with terminals for all users.
Give two advantages of a client-server system 3. A client-server system uses a satellite network,
using a LAN. with the satellite at a height of 40, 000 km.
What is the best case delay in respose to a
request?

2. Besides bandwidth and latency, what other


parameter is needed to give a good 4. A collection of five routers is to be connected to
characterisation of the quality of service offered a point-to-point subnet. Between each pair of
by a network used for digitised voice traffic. routers, the designers may put a high speed

10
433-522 Internet Technologies

line, a medium speed line, a low speed line, or 7. The Internet is roughly doubling in size every
no line. If it takes 100 ms of computer time to 18 months. Although no one really knows for
generate and inspect each topology, how long sure, one estimate put the number of hosts on it
will it take to inspect all of them? at 100 million in 2001. Use these data to
compute the expected number of Internet hosts
in the year 2010. Do you believe this? Explain
why or why not.
5. A disadvantage of a broadcast subnet is the
capacity wasted when multiple hosts attempt to
access the channel at the same time. As a
simpistic example, suppose that time is divided 8. List two advantages and two disadvatages of
into discrete slots with each of the n hosts having international standards for network
attempting to use the channel with probability protocols.
p during each slot. What fraction of slots are
wasted due to collisions?
9. Which of the OSI layers handles each of the
following: a) Dividing the transmitted bit
6. What are two reasons for using layered stream into frames. b) Determining which route
protocols? through the subnet to use.

11

Вам также может понравиться