Network Hardware

advertisement
Computer Networks
 Fundamental terminology
 Network standards organizations
 Standard network hardware examples
– ethernet
– token ring
– ATM
 Future issues
 Protocols
 OSI layers and internetworking
– bridging and routing
 Web-based commerce
(9.1)
Computer Networks
(9.2)
 Networks are simply a set of computers
connected by a communication medium,
communicating by established conventions
– typically bursty transmission characteristics
 Network goals
– resource sharing
» expensive equipment
» large, reliable data storage
– high reliability
» replication of services
» although network may be single point of failure
– lower overall system costs with better
performance
» a few shared high-end machines, many
individual low-end machines
Computer Networks (continued)
 Network categories
– local area networks (LAN)
» typically single transmission
– wide area networks (WAN)
» typically store and forward
– interconnected networks (internets)
(9.3)
Fundamental Terminology
(9.4)
 Circuit switched / packet switched
– circuit switched = telephone
» connection route established at start of
communication, maintained as long as
communication continues
» route is dedicated to one communication
– packet switched
» whole communication is broken down into
smaller chunks called packets
» each packet may take a different route to the
destination
» routes may be shared by other
communications
Fundamental Terminology (continued)
(9.5)
 Another categorization of packet switched
networks is
– virtual circuit
» packets all take same route, set up in advance
– datagram
» each packet routed independently, no
connection established
» typically more robust
Fundamental Terminology (continued)
 Packets typically consist of
– header
» source and destination addresses
» sequence number
– data portion
– trailer
» error detecting and correcting information
 Packets may be fixed or variable length
head
data
tail
(9.6)
Network Standards Organizations
(9.7)
 International Standards Organization (ISO)
– makes standards for many different activities
 American National Standards Institute (ANSI)
– US representative to ISO
 CCITT
– one part of the UN agency International
Telecommunications Union
– concerned with telephone and data
communication services
– US representative is the State Department
Network Standards Organizations (cont.)
(9.8)
 National Instituted of Standards and
Technology (NIST)
– standards body for US government purchases
 Institute of Electrical and Electronics
Engineers (IEEE)
– key standards for LANs
 Internet Engineering Task Force (IETF)
Local Area Network Standards
(9.9)
 Ethernet (IEEE 802.3)
– Carrier Sense Multiple Access / Collision
Detect (CSMA/CD)
» listen to cable, no one transmitting go ahead
» if collide, delay random time and retransmit
– multiple topologies
– multiple media
» coaxial cable (thick or thin)
» twisted pair wire (10BaseT)
– minimum packet size 64 bytes
» heavy overhead for one byte of data
– fast ethernet technologies allow 100 Mbps on
twisted pair
» 1000 Mbps now available on optical fiber
(9.10)
Local Area Network Standards (continued)
 Token ring (IEEE 802.5)
– token determines which host gets to transmit
» special bit pattern used for token
» when station wants to transmit
•watch network for token
•take token off ring and transmit packet
•drain packet as it comes around again
•put token back on ring when done
– single topology
– one node monitors ring to regenerate token if
necessary
(9.11)
Local Area Network Standards (continued)
 Ethernet
– faster access if light load
– degrades rapidly as load increases
» > 60% utilization is a problem
– no guaranteed access
» host can “starve”
– most popular LAN technology
(9.12)
Local Area Network Standards (continued)
 Token ring
– minimum delay to transmit, since have to wait
for token
– delivers much better performance under
heavy load
» can reach close to 100% utilization
– fair
» host can hold token for 10 msec, then must put
back on network
» each host gets token at least every 10 *
number of hosts msec
– “sick” monitor station can cause problems
Frame Relay and ATM
(9.13)
 Frame Relay
– virtual circuit organization
– uses leased or private lines
» vc set up at time subscribers are connected to
the network
– “light” protocol
» no error checking by network, just delivery
mechanism
– 64 Kbps to 45 Mbps
ATM
(9.14)
 Asynchronous Transfer Mode (ATM)
– being standardized by CCITT
– switched, virtual circuit approach
– allows reserving network capacity
– uses fixed size packets
» easier for hardware to handle
– twisted pair or fiber medium
» 100 m to few km
– 155 Mbps to 2400 Mbps
– also used for LAN interconnect as backbone
Future Issues
(9.15)
 Mobility
– mobility within an office complex is possible
now
» wireless LANs at 10 Mbps
» low power radio connecting to wired
communication
– problem with computing outside the office
– several factors force mobile computing
outside office
» cellular phone popularity
» centrality of computing
» reliance on networking and communication
– problems are
» creating enough bandwidth
•possibly need multiple channels
» not enough spectrum
•current transmission / broadcast activities
may swap
Network Protocols
 A protocol is a set of conventions for
communicating
 Concerned with issues such as
– addressing and routing
– error detection and correction
– flow control and congestion control
– higher level coordination depending on the
purpose of the communication
 International Standards Organization Open
Systems Interconnection model (ISO OSI)
– 7 layers of protocols
– defined interfaces between each layer
– lower layers typically implemented in
hardware, upper in software
(9.16)
Network Protocols (continued)
(9.17)
Network Protocols (continued)
(9.18)
 ISO layers
– application - detailed information about data
being exchanged
– presentation - conventions for representing
data
– session - management of connections
between programs
– transport - delivery (reliable or otherwise) of
sequences of packets
– network - format of individual data packets
– link - access to and control of transmission
medium
– physical - medium of transmission
 Internet protocols (IP) are a competing set for
lower layers
– network and transport
– defacto standard
Bridging
 Bridging happens at Link layer
– between LANs
– provides
» filtering - only forward packets destined offnet
» repacketization
» speed matching
(9.19)
Routing
(9.20)
 Internetworking (in WANs)
– happens at network layer
– routers connect WANs with very dissimilar
characteristics
» also called gateways
 Routing
– routers know whole network topology
» determines which network to send packet on
next from destination address
– protocol conversion
– fragmentation
» when packet too large for next network it must
pass through
Routing (continued)
(9.21)
Routing (continued)
(9.22)
(9.23)
Internet Futures
 Current IP protocol is
running out of addresses
– 32 bits = 4 billion
addresses
– Class A - 127 large
groups with 16M
machines
A
 Revised IP protocols (IPng)
currently being devised
– 128 bit addresses
– also called IPv6
24
0
B
14
1
» countries
– Class B - 16K networks
with 64K or fewer
machines
– Class C - 2M networks
with 256 machines
– each machine can only
have one network
address
7
16
0
C
21
1
1
0
Multicast
1
1
8
28
1
0
(9.24)
Web-based Commerce
 Conducting business (exchanging money)
over the Internet requires several features that
aren’t yet available
– confidentiality
» no one else listens to the transaction
encryption
– authentication
» you really are who I think you are
– data integrity
» no one increases my order enroute
– nonrepudiation
» I can’t back out after I buy
– selective application of services
digital
signatures and
certificates
» seller never sees my credit card number
» I seal it and only give name of the bank, who
authorizes payment
Web-based Commerce (continued)
(9.25)
 Public-key systems provide confidentiality
– I choose 2 keys, one public and one private
» publish public key widely
– I encode with private key
– you decode with public key
or
– you encode with public key
– I decode with private key
Web-based Commerce (continued)
(9.26)
 Digital signatures use public key algorithms,
usually on digest of message to speed up
– encode message digest (hash function)
– cleartext message also digested at receiving
end
– if my decoded digest matches calculated
one, I sent it and it hasn’t been changed
Web-based Commerce (continued)
(9.27)
 Authentication provided by authentication
entities
– I don’t send order directly to Nordstroms
– send to authenticator instead, who verifies I’m
me and sends the order to a prestored
Nordstroms address
– other variations exist
 Several proposals to modify IP protocols at
various levels to help this
– IP protocol
– Secure Sockets Layer session protocol
– secure HTTP and MIME messaging
Download