CS 313 Introduction to Computer Networking & Telecommunication Introduction Chi-Cheng Lin, Winona State University Topics Introduction Metric Units Network Hardware Network Software Reference Models Example Networks Standards and Standards Organizations 2 Network Software Old computer networks: HW main concern SW afterthought Not working now! Network SW is now highly structured Approach: Protocol Hierarchies 3 Protocol Hierarchies What is protocol? Agreement between communication parties on HOW communication is processed Layered architecture Reduce design complexity: Lower layer offers service to higher layer Hiding implementation details Layer n on one machine talks to layer n on another Rules and conventions used in layer n’s talk: Layer n protocol 4 Protocol Hierarchies Peers Entities comprising corresponding layers on different machines Virtual communication using protocol Peer process abstraction make network design becomes that of individual layers Physical communication Sender: Data and control passed to layer below Data transmitted via physical media Receiver: Data and control passed to layer above 5 Layers, Protocols, and Interfaces Virtual Communication Physical Communication 6 Protocol Hierarchies Interface between two adjacent layers Defines primitive operations and services a lower layer offers to the upper one Minimizes amount of information passed between two layers Simplifies replacement of implementation E.g., telephone lines satellite channels 7 Protocol Hierarchies Network architecture Set of layers and protocols Implementation and interface specification not included Protocol stack A list of protocols used by a certain system, one protocol per layer 8 Multilayer Communication - Example Philosopher-translator-secretary architecture It is ok if Dutch is replaced by Finnish fax is replaced by email 9 Information Flow - Example Virtual communication for layer 5 Header: control information 00011100011100001110 … Layer 1 protocol 00011100011100001110 … 10 Key Design Issues for the Layers Reliability Error control Error-detecting Error-correcting Routing Selecting the best path for sending a packet from one point to another 11 Key Design Issues for the Layers Sender/receiver identification mechanism Addressing/naming Sequencing Message disassembling, transmitting, reassembling 12 Key Design Issues for the Layers Resource allocation Multiplexing The process of combining signals from multiple sources for transmission across a single data link Multiple connections can share the link Flow control Needed for fast sender, slow receiver Congestion control Quality of service Security 13 Connection-Oriented and Connectionless Services Two basic types of services Connection-oriented Connectionless Consider reliability … Reliable Unreliable Connection-oriented Connectionless Note that: Connection Reliability 14 Connection-Oriented Service A connection is established first, then used, and then released when done. Works like a pipe: Sender pushes data in at one end Receiver takes them out, often in the same order, at the other end Analogy Telephone system 15 Connectionless Service No need to set up a connection first Each message carrying full destination address is routed independently of others No guarantees on the order Analogy Postal system 16 Service Primitives Service is formally specified by a set of primitives (e.g., OS’s system calls) available to users or entities Five service primitives for implementing a simple connection-oriented service. 17 Service Primitives Packets sent in a simple client-server interaction on a connection-oriented network. 18 Relationship of Services to Protocols Service Set of primitives a layer provides to the layer above it Define WHAT operations not HOW implemented Protocol Set of rules governing format and meaning of message exchanged by peer entities within a layer Used by entities to implement service definitions 19 Services to Protocols Relationship The relationship between a service and a protocol. 20 Relationship of Services to Protocols Analogy: object-oriented languages Service :: ADT or Object Users do not know the implementation of a service Protocol :: Implementation The protocol of the service is invisible to users Do you have to understand http (hypertext transport protocol) before you can surf the Internet? 21 Reference Models Two reference models will be discussed OSI reference model TCP/IP model 22 OSI Reference Model ISO/OSI (Open Systems Interconnection) Reference Model NOT a network architecture itself Exact services and protocols are not specified Just "what should be done" in each layer However, standards are produced for all layers 23 OSI Reference Model Seven layers Layer Layer Layer Layer Layer Layer Layer 7: 6: 5: 4: 3: 2: 1: application layer presentation layer session layer transport layer network layer data link layer physical layer (lowest) Diagram of OSI reference model Note: this is one of the most important figures in the whole book!! 24 Physical medium 25 26 Physical medium End-to-End Point-to-Point Point-to-Point Host A Subnet Point-to-Point Host B 27 Physical Layer Transmitting raw bits (0s and 1s) over communication channel Design issues Representation of bits How is 0/1 represented? Data rate: number of bits sent per second How long does a bit last? Transmission mode (bi-directional?) Mechanical, electrical, timing interfaces Underlying physical transmission medium 28 Data Link Layer Takes a raw transmission facility and transforms it into a line (link) that appears free of undetected transmission errors to network layer Basic function Breaks up input data to data frames Transmits data frames sequentially Processes acknowledgement frames sent back from receiver for reliable transmission 29 Data Link Layer Responsibilities Physical addressing (e.g. MAC address) Framing Creating and recognizing frame boundaries Error control (adjacent nodes, node-to-node) Errors: damaged, lost, duplicate Flow control (adjacent nodes, node-to-node) Traffic regulation between fast sender and slow receiver Medium access control Shared channel access control in broadcast networks 30 Network Layer Subnet operation control Responsibilities Logical addressing (e.g., IP address) Routing Static tables Determined at the start of conversation Dynamic Congestion control Quality of service Accounting Heterogeneous network interconnection 31 Transport Layer End-to-end layer Talk to destination machine directly (virtually) Layers 4 through 7 are end-to-end Layers 1 through 3 are node-to-node (chained) Basic function Split data from session layer into smaller units Pass units to network layer Ensure units arrive correctly at the other end 32 Transport Layer Determine services provided to session layer (and ultimately to users) Error-free point-to-point channel that delivers messages in the order in which they were sent Transport of isolated messages w/o guarantee about order Broadcasting 33 Transport Layer Responsibilities include Service-point addressing (e.g., port number) Which message belong to which connection (application): (End-to-end) Flow control (End-to-end) Error control Compare to the Data Link layer 34 Session layer Session establishment between users on different machines Responsibilities Dialogue control Deciding who sends, and when Token management Control of same critical operation not to be performed at the same time Synchronization Inserting checkpoints (checkpointing) 35 Presentation Layer Syntax/semantics of information transmitted Responsibilities Make communication between computers with different internal data representations possible Approach: standard encoding Convert from data representation used in one host to the standard abstract data structure and back 36 Application Layer Provides interface and support for services to users (human, software, robots) Examples File transfer Email Network news Hypertext transfer 37 TCP/IP Reference Model Goals Internetworking Fault tolerance Flexible architecture Four layers of TCP/IP Reference Model Host-to-network layer Internet layer Transport layer Application layer 38 Internet Layer Packet-switching, connectionless Packets injected to network Independent travel Out-of-order arrival Analogy Mail system IP (Internet Protocol) Packet routing Congestion control 39 Transport Layer Two end-to-end protocols UDP (User Datagram Protocol) TCP (Transmission Control Protocol) UDP (User Datagram Protocol) Unreliable, connectionless Widely used for client-server type request-reply queries speech, video 40 Transport Layer TCP Reliable connection-oriented Incoming byte stream (form application layer) is fragmented into discrete messages and passed onto internet layer Message is reassembled at destination Flow control Analogy A B Pipe 41 Applications and Host-to-Network Layers Application layer No session and presentation layers TELNET, FTP, SMTP, DNS, NNTP, HTTP Link layer Defines what links must do to meet the need of connectionless internet layer 42 TCP/IP Protocols 43 OSI and TCP/IP Models Correspondence 44 OSI and TCP/IP Models Similarities Stack of independent protocols Layer functionality Transport layer Application layer 45 OSI Differences between OSI and TCP/IP Models Distinction between services, interfaces, and protocols (perhaps the biggest contribution) Better Protocol-Hidden Model first, then protocols Pro: No bias, more general Con: Designers did not have much experience with the subject a good idea of which functionality to put in which layer No thought given to internetworking 7 layers Communication Connection-Oriented and connectionless in network layer Only connection-oriented in transport layer 46 Differences between OSI and TCP/IP Models TCP/IP: No clear distinction between services, interfaces, and protocols Worse protocol-hidden Protocol first, then model Pro: Protocols fit model perfectly Con: Model does not fit any other protocol stacks (not general) 4 layers Communication Connectionless in network layer Both in transport layer (good for request-response protocols) 47 Summary of Reference Models OSI OSI model exceptionally useful for discussing computer networks OSI protocols not popular TCP/IP TCP/IP model practically nonexistent TCP/IP protocols widely used Modified framework is used in the text 48 Summary of Reference Models Modified framework is used in the text 49 Example Networks The Internet Overview of the Internet architecture 50 Example Networks 3G mobile networks Wireless LANs: 802.11 RFID and sensor networks 51 Standards and Standards Organizations Why standards? Categories de facto de jure Organizations ITU-T (formerly CCITT) ISO ANSI IEEE IETF ATM Forum 52