Академический Документы
Профессиональный Документы
Культура Документы
Communication
Transmission of information. Examples:
Speaking. Smoke signal. Body language. Telephone. Broadcast systems (radio, television). Internet
Analyzing network
What is flowing ? What is flowing ? Data Data What different forms flow ? What different forms flow ? Text, Graphic, Video ... Text, Graphic, Video ... What rules govern flow ? What rules govern flow ? Standard, Protocol ... Standard, Protocol ... Where does the flow occur ? Where does the flow occur ? Cable, Atmosphere ... Cable, Atmosphere ...
Addresses
Communication characteristics
Media
Where is the communication take place?
Protocols
How to make the communication process effectively?
Communication:
Human Address conversation
Hello Mr.A, I am B Media Atmosphere Protocol Language Speed Handshaking Source address, Destination address Media Cable, Fiber, Atmosphere Protocol Format Procedure
Approaches to Networking
Devices connected using dedicated link more devices impractical Multipoint connectionsdistance, no. of. device increase beyond capacity Solution switching series of interlinked nodes (switches) temporary connection between devices linked to switch
Circuit switching
Connection Oriented Dedicated communications path established for the duration of the conversation Fixed Cost
10
11
Size of crossbar huge, 25% of crosspoint in use Multistage switching combination of crossbar in stages
12
Multi path
13
Time division switching --uses time division multiplexing Time-slot interchange TDM bus
14
TDM bus
Involves high speed bus with micro-switches swicthing at th time slot 1 in input side and one in output side
15
16
Connectionless Multiple communications proceed concurrently Packets, typically containing a few hundred bytes of data, are sent across shared connections Packets passed from node to node between source and destination No guaranteed capacity Cheaper fewer connection required
Packet switching
17
Datagram approach
--each packet (datagram) independently
18
20
Message switching
Store and forward Node stores after receiving, until appropriate is route free, then sends
(a)
22
Network hierarchy
23
24
25
26
27
28
29
30
Mesh Topology
31
Star Topology
32
Tree Topology
33
Bus Topology
34
Ring Topology
35
Hybrid Topology
36
OSI MODEL
37
Proprietary
TCP/IP
DECNET
38
1977: establish a subcommittee to develop a communications architecture. 1984: publish ISO-7498, the Open System Interconnection (OSI) reference model.
39
40
It breaks network communication into smaller parts to make it easier to understand. It standardizes network components . It allows different types of network hardware and software to communicate with each other.
41
Layer 7: Application Layer 6: Presentation Layer 5: Session Layer 4: Transport Layer 3: Network Layer 2: Data Link Layer 1: Physical
42
#7
Is the OSI layer that is closest to the user Provides a user interface. Provides network services to the users applications. Example :
Browser, Email, FTP, Telnet ...
43
The client side is located on the local The client side is located on the local computer and is the requestor of the computer and is the requestor of the services. services. The server side is located on a remote The server side is located on a remote computer and provides services in computer and provides services in response to the clients requests.
44
Redirector
Redirector works with computer OS instead of specific application programs. Redirector allows to assign remote resources to logical names on the local computer. Examples of redirectors are:
NetBEUI. Novell IPX/SPX. NFS in TCP/IP.
45
46
DNS
The DNS server is a device on a network that manages domain names and responds to requests from clients to translate a domain name into the associated IP address.
47
DNS: System
..
com com
Companies
edu edu
gov gov
net net
Network providers
org org
Non Govt. organizations
int int
Internationa l org.
48
Email
E-mail client applications, such as Eudora, Outlook Express, and Netscape Mail, work with the POP3 protocol. For security, when message recipients check their e-mail they are often prompted for a password. An e-mail address consists of the recipients username and post-office address: ctt@yahoo.com.
49
Telnet
Telnet software provides the ability to remotely access another computer. The Telnet application works mainly at the application, presentation and session layers of the OSI model.
50
FTP
FTP is designed to download files or upload files on the Internet. An FTP session is established the same way in which a Telnet session is established. Just like Telnet, the FTP session is maintained until the client terminates it, or there is some sort of communication error.
51
HTTP
Hypertext Transfer Protocol (HTTP) works with the World Wide Web, which is the fastest growing and most used part of the Internet.
52
53
54
Data formatting
55
Data encryption
56
Data compression
57
58
Process
Dialog control:
In the conversation, each host plays dual roles: requesting service and replying with service. Dialogue control determining which role they are playing at any given moment. Agree a set of guidelines to use during the communicating with each other.
Dialog separation:
Order to Initiate, terminate and manage of communication. Using a checkpoint to synchronize.
59
Dialog control
60
Dialog separation
61
63
Port
Both TCP and UDP use port (or socket) numbers to pass information to the upper layers.
64
Range of ports
2 bytes: 0 65535.
Numbers below 255 : for public applications. Numbers from 255 - 1023 : assigned to companies for marketable applications. Numbers above 1023 : are unregulated.
End systems use port numbers to select proper applications. Originating source port numbers are dynamically assigned by the source host; usually, it is a number larger than 1023.
65
66
Provides connectivity and path selection between two host systems that may be located on geographically separated networks.
Logical address or IP address
67
68
69
Data Encapsulation
70
71
72
73
Encapsulation
74
TCP/IP MODEL
75
It is important to note that some of the layers in the TCP/IP model have the same name as layers in the OSI model. Do not confuse the layers of the two models.
77
78
80
83
Similarities:
Differences:
Summary
86
87
88
ENQ/ACK
dedicated link between 2 terminal which as data to send (start communication) enquiry (enq) receiver is ready for the same Receiver send ack if free, else send nak (-ve ack) sender receives ack, send data after last data EOT(end of transmission) If no ack or nak, sender knows loss retransmits 3 attempts NAK for 3 attempts, disconnect link, retry later
89
ENQ/ACK
90
POLL/SELECT
with primary and secondary stations (addressed) *primary to send data alerts secondary select (sel), with address of secondary the addressee responds with ack when ready, else nak * primary wants to receive asks each secondary (poll) secondary responds with ack when ready with data, else nak, ack-receive data, nak- next secondary
91
Select
92
Poll
93
Sliding window
size of window based on network fixed several frames (numbered) sent before acknowledgement, update window after acknowledgement
94
95
Sliding window
96
Example
97
Error control
Automatic repeat request (ARQ) Error frames are detected and retransmission of the same is requested from the source Acts adjacent to flow control
98
Damaged Frame
99
Go back n ARQ
Damaged Frame
100
Go back n ARQ
Lost Frame
101
Go back n ARQ
Lost ACK
102
Selective Reject
103
Protocol
Protocol is a set of rules, or an agreement, that determines the format and transmission of data that make communication on a network more efficient.
104
asynchronous
each character independent receiver does not need time of data from sender each frame with start bit and stop bit Used for MODEM Slow in this layer so synchronous used
105
XMODEM
106
Binary Synchronous Transmission Protocol CRC-16 protocol is a 16 bit checksum Developed by IBM in 1960
BISYNC (BSC)
Used for batch communication between a System 360 computer and the IBM 2780 and 3780 Remote Job Entry terminals It requires every acknowledged(ACK) acknowledged(NACK) message or to be negatively
108
Simple Frame
Multiblock Frame
109
Multiframe Transmission
110
Control Frame
111
Control Frames
112
Figure 11-12
Byte Stuffing
WCB/McGraw-Hill
HDLC High-Level Data Link Control SDLC Synchronous Data Link Control
HDLC is the protocol which is now considered an umbrella under which many Wide Area protocols sit. ITU-T developed HDLC in 1979, and within HDLC there are three types of stations defined SDLC is the oldest layer 2 protocol designed by IBM in 1975 to carry Systems Network Architecture (SNA) traffic .SDLC is the 114 precursor to HDLC.
115
116
HDLC Configuration
117
118
119
Bit stuffing
data field more than 5 consecutive 1s, sixth replaced by zero
120
121
123
SDLC FRAME
Data - can contain Path Information Unit (PIU) or Exchange Identification (XID). Frame Check Sequence (FCS) - this check is carried out on the sending AND receiving of the frame.
124
126
Token Passing
127
Token Passing
128
Token Passing
129
Token Passing
130
131
132
Token Ring
133
134
Common medium for transmission which and when to use medium access Ready for transmission check medium status carrier sensing Far away can sense free medium and start transmission collide with each other collision detection, reported to source
135
MAC Frame
136