Chapter 1

advertisement
Chapter 1
Introduction
COMPUTER NETWORKS
•
•
•
•
History
Definitions
Computer networks
Distributed systems
COMPUTER NETWORKS
History
- Key technology = Information gathering, processing, distribution
- Computer systems - highly centralized
- Merging of Computers and Communications
- computer networks
Definition
A computer network consists of computers, printers and other
equipments that are connected together so they can communicate
with each other.
COMPUTER NETWORKS
Computer networks – a collection of autonomous
computers that can exchange information
The connection:
- copper wire
- fiber optics
- microwaves
- infrared
- communication satellites
Networks come in many sizes, shapes and forms.
DISTRIBUTED SYSTEMS
In a distributed system, a collection of independent
computers appears to its users as a single coherent
system
Has a single model or paradigm that it presents to its
users.
Expl: the World Wide Web
Conclusion: A distributed system is a software system
built on the top of a network.
Uses of Computer Networks
•
•
•
•
Business Applications
Home Applications
Mobile Users
Social Issues
Business Applications
• Initial applications
•
•
•
To monitor production
To keep track of inventories
To do payroll
• Resources sharing
• Sharing information
Business Applications of Networks
A network with two clients and one server.
Business Applications of Networks (2)
The client-server model involves requests and replies.
Home Network Applications
•
•
•
•
Access to remote information
Person-to-person communication
Interactive entertainment
Electronic commerce
Access to remote information
•
•
•
•
Surfing the WEB for remote information (arts, business, government,
history, hobbies, recreation, science, sports, travel,
–
or just for fun: comes in too many ways to mention, plus some ways
that are better to left unmentioned
Many newspapers (magazines and scientific journals) have gone on line
and can be personalized ( tell a newspaper that you want everything about
corrupt politicians)
The on-line digital library: many professional organizations (ACM, IEEE
Society) have journals and conference proceedings on-line, the book sized
notebook computer is a reality!!!!!!!!!!!
NOTE: All of these applications involve interactions between a person and
a remote data base full of information.
Person-to-person communication
•
•
•
•
•
•
Basically the21 century answer to the 19th centuries' telephone
E-mail is used by millions of people. It contains audio, video, as well as
text and pictures.
Instant messaging: allows two people to type messages at each other in real
time
Chat room: a multiperson version
Worldwide news groups: with discussions on conceivable topic
Peer-to- peer communication
–
in this form individuals who form a loose group can communicate
with others in the group.
–
Every person can communicate with one or more other people
–
There is no fixed division into clients and servers
Home Network Applications (2)
In peer-to-peer system there are no fixed clients and servers.
Person-to-person communication
•
•
•
The next generation peer-to- peer systems eliminates the central database
by having each user maintain his own database locally as well as providing
a list of other nearby people who are members of the systems. The lookup
process can be repeated indefinitely.
Other communication-oriented application include using the Internet to
carry telephone-calls, video phone and internet radio. Telelearning
Legal applications for peer-to-peer communications:
–
fans sharing public domain music, families sharing photos, e-mail is
also a peer-to peer application.
Interactive entertainment
•
•
A huge and growing industry
Important application:
–
video on demand, live television
–
Game playing; if the games are played with goggles and threedimensional real-time we have a kind of worldwide shared virtual
reality
–
………………….
•
Electronic commerce
•
•
•
Home shopping is already popular and enables users to inspect the on-line
catalogs of thousand of companies. It provides a lot of abilities:
–
Instant video of any product
–
On-line technical support
Access to financial institutions:
–
Manny people already pay their bills, manage their bank accounts and
handle their investments electronically
Electronic flea markets
–
On line auctions of second-hand goods have become a massive
industry. They are more of a peer-to-peer system, sort of consumer-toconsumer.
–
Some of these forms e-commerce have acquired cute little tags based
on the fact that “to” and “2” are pronounced the same.
Home Network Applications (3)
Some forms of e-commerce.
Mobile Network Users
Combinations of wireless networks and mobile computing.
Network Hardware
•
•
•
•
•
•
Local Area Networks
Metropolitan Area Networks
Wide Area Networks
Wireless Networks
Home Networks
Internetworks
Network hardware
Types of transmission technology
• Broadcast links –single comm channel
shared by all the machines
• Point-to-point links – many
connections between individual pairs
of machines- multiple routes
Scale
Broadcast Networks (2)
Classification of interconnected processors by scale.
Broadcast Networks (2)
Classification of interconnected processors by scale
OBS
Distance is important as a classification metric because
different techniques are used at different scales.
Local Area Networks
Privately owned networks within a single building or campus
of up to a few km in size.
Classification criterion
(1) their size
(2) the transmission technology
(3) their topology
(1) The worst case transmission time is bounded
(2) A cable to witch all machines are attached
(3) Bus
Ring
Local Area Networks
Two broadcast networks
(a) Bus
(b) Ring
Local Area Networks
(a) Bus
Expl: IEEE 802.3, called Ethernet is a bus based broadcast
network with decentralized control operating at
10Mbps to 10Gbps
(b) Ring
Expl: IEEE 802.5 (the IBM taken-ring) is a ring based
LAN operating at 4 and 16 Mbps.
Broadcast Networks
•
Static allocation:
- time division into discrete intervals (slots)
- use a round robin algorithm
- wastes channel capacity
•
Dynamic allocation:
– Centralized:
- a single entity (bus administration unit)
– Decentralized:
- each machine decides for itself to transmit
- many algorithms exists to bring order
Metropolitan Area Networks
A metropolitan area network based on cable TV.
Wide Area Networks
Relation between hosts on LANs and the subnet.
Wide Area Networks
Relation between hosts on LANs and the subnet
Separation of the pure communication aspects of the network
from the applications aspects ( the hosts) greatly simplifies the
network design
The subnet elements:
- transmission lines ( copper wire, optical fiber,
radiotrans. lines)
- switching elements – specialized computers
Wide Area Networks
Packet – switched network
- all packets from a given message must follow the same route
- each packet is routed separately – routing decisions are made
locally
A subnet organized according to this principle is called a store-and
– forward or packet switched network
A satellite system
- each router has an antenna
- satellite networks are inherently broadcast
Wide Area Networks (2)
The principle of PS WANs
A stream of packets from sender to receiver.
Wireless Networks
Categories of wireless networks:
• System interconnection networks
• Wireless LANs
• Wireless WANs
Wireless Networks (2)
(a) System interconnection-Bluetooth configuration
(b) Wireless LAN
Wireless Networks (3)
1) System interconnection networks
- Ex: Bluetooth, a short range wireless network
- Uses the master-slave model
- the master impose: what address to use
- when they can broadcast
- how long they transmit
- what frequencies they can use
Wireless Networks (4)
2) Wireless LANs
- Every computer has a radio modem and antenna
- Uses:
- in small offices
- in older buildings
- conference rooms
Standard for wireless LANs: IEEE 802.11
Wireless Networks (5)
3)Wireless WANs:
•
Low-bandwidth wireless system
Ex: The radio network used for cellular tel.
- Operate at rate up to 50Mbps
- Over distances of tens of meters
• Cellular systems operate below 1Mbps
• The distance between the BS and the computer or telephone
is measured in km
•
High bandwidth wide area wireless networks:
- high-speed Internet
- local multipoint distribution service
- Standard: IEEE 802.16
Wireless Networks (6)
(a) Individual mobile computers
(b) A flying LAN
Home Network Categories
•
•
•
•
•
Computers (desktop PC, PDA, shared peripherals
Entertainment (TV, DVD, VCR, camera, stereo, MP3)
Telecomm (telephone, cell phone, intercom, fax)
Appliances (microwave, fridge, clock, furnace, airco)
Telemetry (utility meter, burglar alarm, babycam).
Internetworks
•
Def: A collection of interconnected networks is called an
internetwork or internet
– Expl: a collection of LANs connected by a WAN
Subnet
WAN
Internetworks (2)
•
Subnet – networks – internetworks : differences
–
–
–
Subnet make sense in the context of wide area network =
collection of routers and communication lines
Subnet + hosts = network
Internetwork = Connecting a LAN and a WAN
»
= Connecting 2 LANs
Network Software
•
•
•
•
•
Protocol Hierarchies
Design Issues for the Layers
Connection-Oriented and Connectionless Services
Service Primitives
The Relationship of Services to Protocols
Protocol Hierarchies
•
•
•
•
•
Stack of layers or levels
The name, the no., the content, the function – differ
from network to network
Each layer – services – higher layers
Each layer = virtual machine
Layer n (M1) ↔ Layer n (M2) = the rules and
conventions = PROTOCOL
• A protocol is an agreement between the
communicating parties on how communications
is to proceed
Protocol Hierarchies (2)
A five layers network
Layers, protocols, and interfaces.
Protocol Hierarchies (3)
•
Peers: » Processes
–
–
–
–
» Hardware devices
» Human beings
Communicate using the protocol
No data are transferred from layer n (M1) to layer n (M2)
Data and information control are passed to the layer below
Interfaces – between adjacent layers
• defines which primitive operations and services the lower
layer makes available to the upper one
Protocol Hierarchies (4)
• Defining clean interfaces between layer
• Each layer perform a specific collection of well
understood functions
• Well designed interfaces make simple to replace the
implementation of one layer
Def: A set of layers and protocols is called a network
architecture
Specifications of an architecture:
- to write the program
- to build the hardware for each layer
A list of protocols used by a certain system, one protocol
per layer is called a protocol stack
Protocol Hierarchies (5)
Example information flow supporting virtual communication in layer 5.
Design Issues for the Layers
•
•
•
•
•
•
Addressing
Data transfer
Error Control
Flow Control
Multiplexing
Routing
Connection-Oriented and Connectionless
Services
•
Connection oriented (co)
–
•
Connectionless service (cs)
–
•
•
Modeled after the telephone system
Modeled after postal system
Quality of service: (co), (cs)
Reliable services
Connection-Oriented and Connectionless
Services
Six different types of service.
Service Primitives (2)
•
A service is specified by a set of primitives
(operations) available to a user to accesses the service
–
•
•
Modeled after the telephone system
Protocol stack in the operating system – systems calls
Primitives depends on the service being provided
Service Primitives
Five service primitives for implementing a simple connectionoriented service.
Service Primitives (3)
Packets sent in a simple client-server interaction on a
connection-oriented network.
Services to Protocols Relationship
The relationship between a service and a protocol.
Reference Models
•
•
•
•
•
The OSI Reference Model
The TCP/IP Reference Model
A Comparison of OSI and TCP/IP
A Critique of the OSI Model and Protocols
A Critique of the TCP/IP Reference Model
Reference Models (2)
The OSI
reference
model.
Reference Models (3)
Network layer – Controls the operation of the subnet
- Packets routes:
- based on static tables
- determined at the start of each conversation
- highly dynamic – determined for each packet reflect the network load
- Controls congestion
- Provides Qos (delay, transit time, jitter,…)
- Allows heterogeneous networks to be interconnected
Note In broadcast networks routing problem is simple → network
layer is thin or nonexistent
Reference Models (4)
Transport layer – Functions
- Accepts data from above (session layer)
- Split it into smaller units
- Pass these to the network layer and
- Ensure that the pieces arrive correctly at the other end
- Determines what type of service to provide to the session
layer and to the users
- error-free channel that delivers messages or bytes
in order in which they are sent
- transports isolated messages
- broadcasts messages to multiple destinations
Note End-to-end layer
Reference Models (5)
•
•
Arpanet – DoD (USA), Internet
TCP/IP Reference Model
–
–
–
•
1974 – Cerf and Kahn
1985 Leiner & al.
1988 Clark
Connections to remain intact as long as source and destination
machines are functioning
•
A flexible architecture
–
–
Transferring files
Real-time speech transmission
Reference Models (6)
•
•
•
•
•
Solution: Packet-switching network based on a connectionless
internetwork layer called INTERNET LAYER
Internet (generic sense) layer (TCP/IP) – function:
– Permits hosts to inject packets into any network and have
them travel independently to the destination (potentially)
on a different network
Analogy with the mail system
Defines an official packet format and protocol, called IP
(Internet Protocol) – Packet routing is the major issue here
Similar in functionality to the network layer in OSI model
Reference Models (7)
The TCP/IP reference model.
Reference Models (8)
•
•
Transport layer (TCP/IP) – function: allow peers entities on
the source and destination hosts to carry on a conversation
End-to end protocols:
– TCP (Transmission Control Protocol)
•
•
–
Reliable connection oriented
Handles flow control
UDP ( User Datagram Protocol)
•
•
•
Unreliable connectionless protocol
For applications without TCP/IP sequencing and TCP/IP flow
control
Applications in which prompt delivery is much important than
accurate delivery
Reference Models (9)
Protocols and networks in the TCP/IP model initially.
Reference Models (10)
•
Application layer (TCP/IP) – contains all higher level
protocols
– Early included protocols:
•
•
•
–
Added later protocols:
•
•
•
•
TELNET – virtual terminal
FTP - file transfer
SMTP – electronic mail
DNS – Domain name system
NNTP
HTTP
Host – to – Network layer
–
–
Host has to connect to the network using some protocol
Protocol used is not defined, varies from host to host and network to
network
Comparing OSI and TCP/IP Models
In common:
•
Stack of independent protocols
•
Functionality of layers roughly similar
–
–
Transport layer (transport providers) provide an end-to-end
network independent transport service
The layers above transport are application-oriented users of
the transport services
Many differences between the two models and not between
the protocols
Comparing OSI and TCP/IP Models(2)
Concepts central to the OSI model
•
Services
•
Interfaces
•
Protocols
OSI model contribution:
Makes distinction between these three concepts explicit
Comparing OSI and TCP/IP Models (3)
TCP/IP did not originally distinguish between
•
Services
•
Interfaces
•
Protocols – came first and the model was just a
description of the existing protocols
The model did not fit any other protocol stacks
More specific and obvious differences
•
The number of layers
–
OSI - 7 layers
–
–
TCP/IP - 4 layers
Network, transport, application layers included in both models
•
The area of connectionless versus conn. - oriented
–
–
OSI
• supports both c-l and c-o communication in the network
layer
• Only c – o communication in the transports layer
TCP/IP
• Only c-l communication in the network layer
• C-l and c-o communication in the transport layer- giving
the users a chance – important for simple request-response
protocols
A Critique of the OSI Model and Protocols
Why OSI did not take over the world
• Bad timing
• Bad technology
• Bad implementations
• Bad politics
A Critique of the OSI Model and Protocols(2)
The time at which a standard is established is critical to its
success.
•
The amount of activity surrounding a new subject (
burst of research activity)
•
Standards elaboration
•
Corporations discover the subject and make investments
Note
– The OSI standards protocols got crushed
– The TCP/IP protocols were already in widespread
use by research universities by the time the OSI
protocols appeared
A Critique of the OSI Model and Protocols(3)
D. Clark’s theory of standards: the apocalypse of the two elephants.
A Critique of the OSI Model and Protocols (4)
Bad technology
•
•
•
The choice of 7 layers was more political then technical
Extraordinarily complex
Some functions reappear in each layer
Recommandation
– Error control must be done in highest layer
A Critique of the OSI Model and Protocols (5)
Bad implementations
•
The initial implementations were huge, unwieldy and
slow
•
People associate OSI with poor quality .
•
TCP/IP was part of Berkeley UNIX and was quite good
( not to mention free). People began using it quickly.
Bad politics
•
Many people, especially in academia thought TCP/IP as
part of UNIX.
•
OSI was widely thought to be creature of the European
telecommunication ministries, European Community
and later U.S. Government
A Critique of the TCP/IP Reference Model
Problems:
• Service, interface, and protocol not distinguished
• Not a general model
• Host-to-network “layer” not really a layer
• No mention of physical and data link layers
• Many protocols were ad hoc produced – now they
are hard to replace
Conclusions
•
•
•
•
•
The OSI model (minus the session and presentation layers)
has proven to be exceptionally useful for for discussing
computer networks
OSI protocols have not become popular
The TCP/IP model is practically nonexistent
Protocols are widely used
In this course
– We will use a modified OSI model
– Concentrate on TCP/IP and related protocols
Hybrid Model
The hybrid reference model to be used in this course.
Example Networks
•
The Internet
•
Connection-Oriented Networks:
X.25, Frame Relay, and ATM
•
Ethernet
•
Wireless LANs: 802:11
The ARPANET
(a) Structure of the telephone system.
(b) Baran’s proposed distributed switching system.
The ARPANET (2)
The original ARPANET design.
The ARPANET (2)
•
Subnet
–
IMPs (Interface Message Processors) – minicomputers
•
•
•
•
Connected by 56kbps transm. lines
Reliability – at least 2 connections/IMP
Datagram subnet
Network nodes
–
IMP + host in the same room
•
•
Messages (host → IMP) at up to 8063 bits
Software
–
Subnet software
•
•
•
–
The IMP-end of the HOST-IMP connection
The IMP-IMP protocol
A source IMP to destination IMP ( for reliability)
Outside the subnet software
•
•
•
The Host -end of the HOST-IMP connection
The HOST-HOST protocol
The application software
ARPANET, NSFNET
•
•
•
•
•
•
TCP/IP was created to handle communications over
internetworks
A convenient program interface to the network – sockets
DNS (Domain Name System) was created to organize
machines into domains and map hosts names into addresses. It
became a generalized distributed database system for storing
information related to naming
NSFNET:
– Consists of a backbone network and the regional networks.
– Was connected to the ARPANET
ANS (Advance Network and Services)
ANSNET-1990 – NAP ( Network Access Point)
NSFNET
The NSFNET backbone in 1988.
Internet Usage
•
•
•
•
•
The number of networks, machines and users connected to the
ARPANET grew rapidly after TCP/IP became the only
official protocol on 1983. When NSFNET and ARPANET
were interconnected the growth became exponential.
the glue that holds the Internet together is the TCP/IP
reference model and the TCP/IP protocol stack.
Traditional applications (1970 – 1990)
E-mail
News
Remote login
File transfer
New one: www
Architecture of the Internet
Overview of the Internet.
Download