SlideShare a Scribd company logo
1 of 73
Fall 2010 CEG 4188 1-1
CEG-4188
Lecture 1:
Computer Networks and Protocols
Prof. Gregor v. Bochmann
SITE, University of Ottawa
These course notes are based on slides prepared by Drs. Makrakis and
Shirmohammadi
Fall 2010 CEG 4188 1-2
Why Computer Networks?
Application Type
Fall 2010 CEG 4188 1-3
Communications Tasks
Transmission system
utilization
Addressing
Interfacing Routing
Signal generation Recovery
Synchronization Message formatting
Exchange management Security
Error detection and
correction
Network management
Flow control
Fall 2010 CEG 4188 1-4
Types of Communication Networks
Classification according to the way the
“information flows” are transported to the
users
• Switching Networks
• Broadcast Networks
Fall 2010 CEG 4188 1-5
Switching Networks
Data are transferred from source to
destination through a series of intermediate
nodes
Fall 2010 CEG 4188 1-6
Broadcast Networks
Satellite
--There are no intermediate switching
nodes
--All users are connected on the same
medium
Fall 2010 CEG 4188 1-7
Classification According to Coverage Area
 Local Area Networks (0-2 Km; campus)
• Ethernet (10/100/1000 Mbps), Token ring (4, 16 Mbps),
IEEE 802.11(b, g, a, n)
 Metropolitan Area Networks (2-50 km; corporate offices, city)
• DQDB (Distributed Queue Dual Bus), WiMAX
(IEEE 802.16.a/b/e)
 Wide Area Networks (country, continent)
• transmission lines, switching elements
 Personal Access Networks (PANs)
• Bluetooth, IEEE 802.15.3
Fall 2010 CEG 4188 1-8
Local Area Networks (LANs)
• It expands over small geographic areas
(within a building or close-by buildings)
• It is usually owned by the same organization
• The internal data rates are typically much
greater than those of WANs
• Typically, they make use of broadcast rather
than switching
Fall 2010 CEG 4188 1-9
Local Area Networks (LANs)
Single-building LAN
Backbone
Multi-building LAN
Examples: home network, wireless-wired campus network
Fall 2010 CEG 4188 1-10
Metropolitan Area Networks (MAN)
Examples: Ottawa-Carleton Research Institute (OCRI) MAN,
National Capital Institute on Telecommunications (NCIT) MAN
Fall 2010 CEG 4188 1-11
Wide Area Networks (WAN)
Example: Canadian Network for the Advancement of Research, Industry
and Education (CANARIE).
Fall 2010 CEG 4188 1-12
Wide Area Networks (WAN)
• Traditionally, WANs have been
implemented using one of two
technologies
• Circuit Switching
• Packet Switching
–Datagram
–Virtual Circuit
Fall 2010 CEG 4188 1-13
Circuit Switching
• Uses a dedicated path between two stations
• Process consists of three phases
– establish
– transfer
– disconnect
• Bandwidth inefficient
– channel capacity dedicated for duration of connection
– if no data, capacity wasted
• Set up (connection) takes time
• Once connected, transfer is transparent
• Can provide deterministic performance guarantees
Fall 2010 CEG 4188 1-14
Circuit Switching Network
Example: Public Service Telephone Network (PSTN)
Fall 2010 CEG 4188 1-15
Event Timing for Circuit Switching
Fall 2010 CEG 4188 1-16
Packet Switching
• circuit switching was designed for voice
• packet switching was designed for data
• transmitted in “small” packets
• packet contains user data and control info
– user data may be part of a larger message
– control info includes routing (addressing) info
• packets are received, stored briefly
(buffered) and passed on to the next node
Fall 2010 CEG 4188 1-17
Packet Switching
• Source breaks long message into “information
transporting segments” (packets).
• Packets are sent one at a time to the network.
• Packets contain user data and
control/signaling information.
– user data may be part of a larger message
– control information includes routing/addressing
information
• Packets are received, stored “briefly”
(buffered) and are passed onto the next node.
Fall 2010 CEG 4188 1-18
Characteristics
• Line efficiency
– single link shared by many packets over time
– packets queued and transmitted as fast as possible
• Data rate conversion
– stations connect to local nodes at their own speed
– nodes buffer data if required to equalize rates
• Packets are accepted even when the “line” is busy
• Priorities can be used to support users’ needs,
instead of dedicating resources regardless if they are
used or not (becoming wasted if they are not)
Fall 2010 CEG 4188 1-19
Datagram
Packet
Switching
19
Fall 2010 CEG 4188 1-20
Event Timing for Datagram
Fall 2010 CEG 4188 1-21
Virtual
Circuit
Packet
Switching
Fall 2010 CEG 4188 1-22
Event Timing for the 3 switching methods
Fall 2010 CEG 4188 1-23
Virtual Circuits versus Datagram
• Virtual circuits
– network can provide sequencing
– traffic engineering can be applied, enabling more practical
provision of quality of service (QoS) support
– less reliable in cases of switching node failures
• Datagram
– no call setup phase
– more flexible
– more reliable in cases of switching node failures
– difficult to control network’s state and provide quality of
service
Fall 2010 CEG 4188 1-24
Circuit versus Packet Switching:
Comparison
• Circuit Switching
– Dedicated
channels/resources
– Constant delay
– Blocking
– Continuous flow
– Point-to-Point
• Packet Switching
– Shared channels
– Variable delay
– Store-and-forward
point-to-point &
multipoint
Fall 2010 CEG 4188 1-25
Other forms of Packet Switching Services
• Frame Relay based Networks
– requires high level of network reliability.
– took away a lot of overhead, improved
efficiency.
• Asynchronous Transfer Mode (ATM)
– based on the use of fixed size packets (53 bytes,
called ATM cells).
– first Broadband Integrated Services (ISDN)
network .
– offered quality of service (QoS) choices.
• MPLS (label switching)
Fall 2010 CEG 4188 1-26
Internetworking
 Internetworking is a scheme for
interconnecting multiple networks of non
identical technologies
Uses both hardware and software
• Extra hardware positioned between networks
• Software on each attached computer
 System of interconnected networks is
called an internetwork or an internet
Fall 2010 CEG 4188 1-27
Internetwork (Internet)
Fall 2010 CEG 4188 1-28
OSI Reference Model
and
the Link layer – as an example
protocol layer
Fall 2010 CEG 4188 1-29
Open System Interconnection (OSI) Reference Model
• Developed by the International Organization for
Standardization (ISO).
• Has become the standard model for classifying
communication functions.
• Has seven layers.
• It is a “theoretical” system delivered too late!
• It has NOT dominated. TCP/IP is the de facto
standard.
• Several reasons:
– TCP/IP appeared earlier
– Internet “won” the game
– OSI has a “complex” structure that could result in “heavy
processing”
Fall 2010 CEG 4188 1-30
Functions of the OSI Layers
• Physical
– The bits that are transmitted over the communication media.
– Deals with network hardware, bit encoding.
– Examples: copper, fiber, radio, satellite.
• Data Link
– Activates, maintains, and deactivates the physical link
between two adjacent nodes (node-to-node delivery).
– Deals with framing, windowing, flow control, error detection
and recovery.
• Network
– Determines how best to route packets of data from source to
destination via intermediate network nodes.
– Deals with addressing, routing, fragmentation, and
congestion.
Fall 2010 CEG 4188 1-31
Functions of OSI Layers (…)
• Transport
– Provides end-to-end message delivery and error recovery.
– Deals with end to end integrity and quality of service.
• Session
– To establish, manage, and terminate sessions.
– Controls the dialogue between two host applications.
– Reports exceptions to upper layers.
• Presentation
– Resolves data representation differences.
– To translate, encrypt, and compress data.
• Application
– Perform functions to implement network applications.
– E.g.; e-mail, teleconferencing.
Fall 2010 CEG 4188 1-32
Generic Communication Issues
• Error control: making a channel more reliable, and handling
lost or out of sequence messages.
• Flow control: avoid flooding a slower peer entity.
• Resource allocation: mediating contention for physical (e.g.
buffers) or logical (e.g. data structures) resources
• Fragmentation: dividing chunks of data into smaller pieces,
and subsequent reassembly
• Multiplexing: combining several higher layer sessions
• Connection setup: initiating logical communication with peer
entity
• Addressing / naming: managing identifiers
• Compression: reducing data rate
• Encryption: provide data security
• Timer management: bookkeeping and error recovery
Fall 2010 CEG 4188 1-33
Link layer protocols
- as an example
• Transmission mode - physical link property
• Line discipline - Who should send now?
• Flow control - How much data should be sent?
• Error control - How can errors be corrected?
Fall 2010 CEG 4188 1-34
Transmission Mode
Simplex
Half-duplex
Full-duplex
Fall 2010 CEG 4188 1-35
ENQ/ACK
Point-to-point
Line Discipline
Fall 2010 CEG 4188 1-36
Line Discipline (…)
• Multi-point
Fall 2010 CEG 4188 1-37
Select Line Discipline
Fall 2010 CEG 4188 1-38
Poll Line Discipline
Fall 2010 CEG 4188 1-39
listen
idle?
transmit
jamming
signal
wait
random
time
collision?
no
no
yes
yes
CSMA/CD
(network access protocol = line discipline)
• Carrier Sense Multiple Access
with Collision Detection
• Used in Ethernet: the most
widely-used type of LAN
Fall 2010 CEG 4188 1-40
Stop and Wait
Flow Control
What is the
problem
with this
scheme?
Fall 2010 CEG 4188 1-41
Sender Sliding Window
Flow Control (…)
Sliding Window
Fall 2010 CEG 4188 1-42
Damaged Frame
Error Control: Stop-and-Wait
• What causes
an error?
Fall 2010 CEG 4188 1-43
Lost Frame
Error Control: Stop-and-Wait (…)
Fall 2010 CEG 4188 1-44
Lost ACK
Error Control: Stop-and-Wait (…)
Fall 2010 CEG 4188 1-45
Damaged Frame
Error Control: Go-Back-N
Fall 2010 CEG 4188 1-46
Lost Frame
Error Control: Go-Back-N (…)
What seems to be a drawback of Go-Back-N?
Fall 2010 CEG 4188 1-47
Lost ACK
Error Control: Go-Back-N (…)
Fall 2010 CEG 4188 1-48
Error Control: Selective Reject
Damaged Frame
Seems to save bandwidth compared to Go-Back-N.
What’s the cost?
Fall 2010 CEG 4188 1-49
What is a protocol ?
Architectural structure of a
protocol layer
protocol entity protocol entity
communication service used by the protocol
(offered by the lower layer)
service offered
by the
protocol
user of protocol user of protocol
service interfaceservice interface
Protocol
service interfaces of lower layer
message encoding message encoding
Link Layer protocol
protocol entity protocol entity
communication service of physical layer
send/receive a block of data
user of protocol user of protocol
send/receive user data block (reliably)
Link layer
service interface
Protocol
data blocks containing SEL, Poll, datablock, ack, nack
message encoding message encoding
Physical layer
service interface
Fall 2010 CEG 4188 1-52
Protocols
• A protocol is a set of rules that govern all aspects of
communication between two or more partners, called peers
– These rules are human-made; not like chemistry or physics!
• The purpose of a protocol is to provide a specific
communication service.
• What aspects must be defined for assuring compatibility
between the communicating partners? (see next slides)
• Who makes protocols?
– Standardization committees
– Designers of a new distributed application
Fall 2010 CEG 4188 1-53
Service specification
• The specification of a communication service has two parts:
– specification of an abstract service interface through which the service can be
locally obtained (sometimes called service access point)
• e.g. in the case of TCP: local interactions for establishing a connection and for
closing it; sending a flow of data over an established connection (with flow control,
no notion of "end of service unit")
• It is an abstract interface, the interaction primitives may be considered a kind of
abstract message (initiated by one side, received by the other side of the interface;
some interactions are initiated by the user, others are initiated by the service). The
specification of an abstract service interface is like the specification of the dynamic
behavior of an object class. It includes
– Static aspects
» list of interaction primitives, also called service primitives (like messages exchange;
not like method calls that have the initiating party blocked until the method returns)
» for each primitive, which sides initiates the message, and its parameters and their
type
– Dynamic aspects
» sequencing rules which define in which order the primitives may be executed
» rules concerning the allowed parameter values for particular execution sequences
– specification of the end-to-end behavior of the (distributed) system component
that provides the service
• e.g. in the case of TCP: the establishment of a connection involves local exchanges
at both end-points of the connection concerning the connection establishment; data
received at one end-point must have been sent at the other end-point (with FIFO
property without loss nor errors)
Fall 2010 CEG 4188 1-54
Protocol specification
• Protocol specification = definition of the behavior of a protocol entity as visible at the upper
and lower (abstract) service interfaces
• This includes
– reference to the specification of the upper (abstract) service interface (normally defined by the
corresponding service specification)
– reference to the specification of the lower (abstract) service interface (normally defined by the
service specification of the underlying service used by the protocol)
– dynamic behavior of the protocol entity, that is,
• sequencing rules concerning interactions at the upper and lower interfaces.
– Note (a): Certain protocols developed by certain groups, e.g. IETF, do not refer to any service specification. In this case
only the ordering of interactions at the lower interface are defined.
– Note (b): In the simplest case (if the protocol does not use any connections, or if it can be assumed that appropriate
connections are already established) the interactions at the lower interface only include the sending and receiving of
protocol messages (so-called PDU's).
• Rules concerning the allowed interaction parameters
– e.g sequence numbering in TCP, sending acknowledgements, etc.
• Encoding rules
– (a) concerning how interaction parameters received at the upper interface are coded and sent as so-called "user data" in
one of the data fields of the primitives at the lower interface (and inversely the decoding of user data to obtain the corresponding value for
the upper interaction parameter).
» e.g. in the case of the IP protocol: how is the address "local host" coded in the destination address field of an IP
packet ?
– (b) concerning the coding of protocol control information managed by the protocol entity
» e.g. in the case of the TCP protocol: where in the "user data" of the lower layer primitive (which in the case of
TCP is the data field of an IP packet) is the TCP sequence number placed and how are the integer values coded ?
Fall 2010 CEG 4188 1-55
Relevant Standards Bodies
• ISO (www.iso.org)
– An agency of the United Nations.
– Collaborates standards development for information technology.
• ITU (www.itu.int)
– UN treaty agency that sets telecommunications standards.
– ITU-T (Telecommunications section)
• ANSI (www.ansi.org)
– American National Standards Institute: the US national standards body.
– Coordinates and accredits standards development across the US.
• IEEE (www.ieee.org)
– US based international professional organization.
– Among other things, develops standards.
• IETF / IRTF
– Internet Engineering Task Force (www.ietf.org)
– Internet Research Task Force (www.irtf.org)
• EIA (www.eia.org)
– Electronic Industries Alliance
– E.g.; standards for wiring and interconnection
Fall 2010 CEG 4188 1-56
OSI Model
• Open System
Interconnection.
• An ISO standard
• Why open?
Fall 2010 CEG 4188 1-57
OSI Reference Model
Physical
Link
Network
Transport
Session
Presentation
Application
Fall 2010 CEG 4188 1-58
Protocol Data Unit (PDU)
Fall 2010 CEG 4188 1-59
TCP/IP Protocol Architecture
• No official model but a working one.
• Has 5 layers (OSI has 7 layers)
• Was the result of research conducted on
ARPANET, funded by DARPA (USA).
• Initially developed as a US military research
effort funded by the Department of Defense
• It has dominated.
• It is the “heart” of Internet.
Fall 2010 CEG 4188 1-60
TCP/IP Protocol Architecture
Application
Layer
Host-to-Host
or Transport
Layer
Internet Layer
Network Access
Layer
Physical Layer
Contains the logic needed to support user applications
(ftp, telnet, http etc.) Each application requires different
module.
Covers the physical interface between device (computer
and transmission medium or network - medium, signals,
data rates..)
Concerned with the exchange of data between end
system and network (destination address, priority etc.)
Depends on net. type
Provides routing functions across multiple networks. It is
implemented in end-systems and routers
Concerned with the reliability of transmission/reception
(error control, sequencing, flow control)
Fall 2010 CEG 4188 1-61
TCP/IP Protocol Architecture
Application
Layer
Host-to-Host
or Transport Layer
Internet Layer
Network Access
Layer
Physical Layer
Application
Layer
Host-to-Host
or Transport
Layer
Internet Layer
Network Access
Layer
Physical Layer
Network
Fall 2010 CEG 4188 1-62
Some TCP/IP Protocols
Fall 2010 CEG 4188 1-63
IEEE Project 802 - LAN
Network access service interface
Fall 2010 CEG 4188 1-64
Connection Devices
Fall 2010 CEG 4188 1-65
Connecting Devices and the OSI Model
Fall 2010 CEG 4188 1-66
Repeater
A Repeater
Fall 2010 CEG 4188 1-67
Function of Repeater
Fall 2010 CEG 4188 1-68
Bridge
A Bridge
Fall 2010 CEG 4188 1-69
Function of Bridge
Fall 2010 CEG 4188 1-70
Multiport Bridge
Fall 2010 CEG 4188 1-71
Router
Fall 2010 CEG 4188 1-72
Routers in an Internet
Fall 2010 CEG 4188 1-73
Gateway

More Related Content

What's hot

Reliable Metrics for Wireless Mesh Network
Reliable Metrics for Wireless Mesh NetworkReliable Metrics for Wireless Mesh Network
Reliable Metrics for Wireless Mesh NetworkIRJET Journal
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...IOSR Journals
 
DWDM-RAM: An Architecture for Data Intensive Service Enabled by Next Generati...
DWDM-RAM: An Architecture for Data Intensive Service Enabled by Next Generati...DWDM-RAM: An Architecture for Data Intensive Service Enabled by Next Generati...
DWDM-RAM: An Architecture for Data Intensive Service Enabled by Next Generati...Tal Lavian Ph.D.
 
Overview of an OSI reference Model
Overview of an OSI reference ModelOverview of an OSI reference Model
Overview of an OSI reference ModelDarshan Bhatt
 
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...IJERA Editor
 
Network Topologies
Network TopologiesNetwork Topologies
Network TopologiesNetwax Lab
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
 
Method of controlling access to intellectual switching nodes of telecommunica...
Method of controlling access to intellectual switching nodes of telecommunica...Method of controlling access to intellectual switching nodes of telecommunica...
Method of controlling access to intellectual switching nodes of telecommunica...ijceronline
 
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF ijwmn
 
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET Journal
 

What's hot (20)

J018216275
J018216275J018216275
J018216275
 
Iso osi
Iso osiIso osi
Iso osi
 
Reliable Metrics for Wireless Mesh Network
Reliable Metrics for Wireless Mesh NetworkReliable Metrics for Wireless Mesh Network
Reliable Metrics for Wireless Mesh Network
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
 
DWDM-RAM: An Architecture for Data Intensive Service Enabled by Next Generati...
DWDM-RAM: An Architecture for Data Intensive Service Enabled by Next Generati...DWDM-RAM: An Architecture for Data Intensive Service Enabled by Next Generati...
DWDM-RAM: An Architecture for Data Intensive Service Enabled by Next Generati...
 
Bhanuprakash123
Bhanuprakash123Bhanuprakash123
Bhanuprakash123
 
Overview of an OSI reference Model
Overview of an OSI reference ModelOverview of an OSI reference Model
Overview of an OSI reference Model
 
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
 
02 network models
02  network models02  network models
02 network models
 
Method of controlling access to intellectual switching nodes of telecommunica...
Method of controlling access to intellectual switching nodes of telecommunica...Method of controlling access to intellectual switching nodes of telecommunica...
Method of controlling access to intellectual switching nodes of telecommunica...
 
OSI Layering
OSI Layering OSI Layering
OSI Layering
 
OSI layers
OSI layersOSI layers
OSI layers
 
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
 
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETS
 
Computer networks chapter1.
Computer networks chapter1.Computer networks chapter1.
Computer networks chapter1.
 
Chap1
Chap1Chap1
Chap1
 
Topologies
TopologiesTopologies
Topologies
 
Wp simoneau osi_model
Wp simoneau osi_modelWp simoneau osi_model
Wp simoneau osi_model
 

Similar to Computer Networks and Protocols Lecture Overview

A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...Tal Lavian Ph.D.
 
Logical design of io t
Logical design of io tLogical design of io t
Logical design of io tKunal Bangar
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPTAIRTEL
 
Unit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxUnit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxABYTHOMAS46
 
performanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfperformanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfABYTHOMAS46
 
Tutorial: Maximizing Performance and Network Utility with a Science DMZ
Tutorial: Maximizing Performance and Network Utility with a Science DMZTutorial: Maximizing Performance and Network Utility with a Science DMZ
Tutorial: Maximizing Performance and Network Utility with a Science DMZGlobus
 
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...Tal Lavian Ph.D.
 
Lecture3 - Computer Networks by the Professor.ppt
Lecture3 - Computer Networks by the Professor.pptLecture3 - Computer Networks by the Professor.ppt
Lecture3 - Computer Networks by the Professor.pptHamzaIqbal900476
 
Datacom module 2: Data Communication Architecture, Protocols, and Standards
Datacom module 2:  Data Communication Architecture, Protocols, and StandardsDatacom module 2:  Data Communication Architecture, Protocols, and Standards
Datacom module 2: Data Communication Architecture, Protocols, and StandardsJeffrey Des Binwag
 
TLEN_AWL_LECTURE.pptx
TLEN_AWL_LECTURE.pptxTLEN_AWL_LECTURE.pptx
TLEN_AWL_LECTURE.pptxWisman Beb
 
L1 by-mr
L1 by-mrL1 by-mr
L1 by-mrwael-b1
 
78 ieee analysis of power consumption in future high capicity network nodes
78 ieee analysis of power consumption in future high capicity network nodes78 ieee analysis of power consumption in future high capicity network nodes
78 ieee analysis of power consumption in future high capicity network nodesengrarif
 
DCN-321-Chiwaya_Lesson7_DataElements_Switching.pdf
DCN-321-Chiwaya_Lesson7_DataElements_Switching.pdfDCN-321-Chiwaya_Lesson7_DataElements_Switching.pdf
DCN-321-Chiwaya_Lesson7_DataElements_Switching.pdfOscarKelvinNsitu
 
Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerDeepak John
 

Similar to Computer Networks and Protocols Lecture Overview (20)

1.CN-PPT.ppt
1.CN-PPT.ppt1.CN-PPT.ppt
1.CN-PPT.ppt
 
CN Unit-1 PPT.pptx
CN Unit-1 PPT.pptxCN Unit-1 PPT.pptx
CN Unit-1 PPT.pptx
 
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
 
Logical design of io t
Logical design of io tLogical design of io t
Logical design of io t
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day 1
Ccna day 1Ccna day 1
Ccna day 1
 
Ccna day1-130802165909-phpapp01
Ccna day1-130802165909-phpapp01Ccna day1-130802165909-phpapp01
Ccna day1-130802165909-phpapp01
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
Unit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxUnit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptx
 
performanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfperformanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdf
 
Performance and traffic management for WSNs
Performance and traffic management for WSNsPerformance and traffic management for WSNs
Performance and traffic management for WSNs
 
Tutorial: Maximizing Performance and Network Utility with a Science DMZ
Tutorial: Maximizing Performance and Network Utility with a Science DMZTutorial: Maximizing Performance and Network Utility with a Science DMZ
Tutorial: Maximizing Performance and Network Utility with a Science DMZ
 
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
 
Lecture3 - Computer Networks by the Professor.ppt
Lecture3 - Computer Networks by the Professor.pptLecture3 - Computer Networks by the Professor.ppt
Lecture3 - Computer Networks by the Professor.ppt
 
Datacom module 2: Data Communication Architecture, Protocols, and Standards
Datacom module 2:  Data Communication Architecture, Protocols, and StandardsDatacom module 2:  Data Communication Architecture, Protocols, and Standards
Datacom module 2: Data Communication Architecture, Protocols, and Standards
 
TLEN_AWL_LECTURE.pptx
TLEN_AWL_LECTURE.pptxTLEN_AWL_LECTURE.pptx
TLEN_AWL_LECTURE.pptx
 
L1 by-mr
L1 by-mrL1 by-mr
L1 by-mr
 
78 ieee analysis of power consumption in future high capicity network nodes
78 ieee analysis of power consumption in future high capicity network nodes78 ieee analysis of power consumption in future high capicity network nodes
78 ieee analysis of power consumption in future high capicity network nodes
 
DCN-321-Chiwaya_Lesson7_DataElements_Switching.pdf
DCN-321-Chiwaya_Lesson7_DataElements_Switching.pdfDCN-321-Chiwaya_Lesson7_DataElements_Switching.pdf
DCN-321-Chiwaya_Lesson7_DataElements_Switching.pdf
 
Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link Layer
 

Recently uploaded

VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 

Recently uploaded (20)

VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 

Computer Networks and Protocols Lecture Overview

  • 1. Fall 2010 CEG 4188 1-1 CEG-4188 Lecture 1: Computer Networks and Protocols Prof. Gregor v. Bochmann SITE, University of Ottawa These course notes are based on slides prepared by Drs. Makrakis and Shirmohammadi
  • 2. Fall 2010 CEG 4188 1-2 Why Computer Networks? Application Type
  • 3. Fall 2010 CEG 4188 1-3 Communications Tasks Transmission system utilization Addressing Interfacing Routing Signal generation Recovery Synchronization Message formatting Exchange management Security Error detection and correction Network management Flow control
  • 4. Fall 2010 CEG 4188 1-4 Types of Communication Networks Classification according to the way the “information flows” are transported to the users • Switching Networks • Broadcast Networks
  • 5. Fall 2010 CEG 4188 1-5 Switching Networks Data are transferred from source to destination through a series of intermediate nodes
  • 6. Fall 2010 CEG 4188 1-6 Broadcast Networks Satellite --There are no intermediate switching nodes --All users are connected on the same medium
  • 7. Fall 2010 CEG 4188 1-7 Classification According to Coverage Area  Local Area Networks (0-2 Km; campus) • Ethernet (10/100/1000 Mbps), Token ring (4, 16 Mbps), IEEE 802.11(b, g, a, n)  Metropolitan Area Networks (2-50 km; corporate offices, city) • DQDB (Distributed Queue Dual Bus), WiMAX (IEEE 802.16.a/b/e)  Wide Area Networks (country, continent) • transmission lines, switching elements  Personal Access Networks (PANs) • Bluetooth, IEEE 802.15.3
  • 8. Fall 2010 CEG 4188 1-8 Local Area Networks (LANs) • It expands over small geographic areas (within a building or close-by buildings) • It is usually owned by the same organization • The internal data rates are typically much greater than those of WANs • Typically, they make use of broadcast rather than switching
  • 9. Fall 2010 CEG 4188 1-9 Local Area Networks (LANs) Single-building LAN Backbone Multi-building LAN Examples: home network, wireless-wired campus network
  • 10. Fall 2010 CEG 4188 1-10 Metropolitan Area Networks (MAN) Examples: Ottawa-Carleton Research Institute (OCRI) MAN, National Capital Institute on Telecommunications (NCIT) MAN
  • 11. Fall 2010 CEG 4188 1-11 Wide Area Networks (WAN) Example: Canadian Network for the Advancement of Research, Industry and Education (CANARIE).
  • 12. Fall 2010 CEG 4188 1-12 Wide Area Networks (WAN) • Traditionally, WANs have been implemented using one of two technologies • Circuit Switching • Packet Switching –Datagram –Virtual Circuit
  • 13. Fall 2010 CEG 4188 1-13 Circuit Switching • Uses a dedicated path between two stations • Process consists of three phases – establish – transfer – disconnect • Bandwidth inefficient – channel capacity dedicated for duration of connection – if no data, capacity wasted • Set up (connection) takes time • Once connected, transfer is transparent • Can provide deterministic performance guarantees
  • 14. Fall 2010 CEG 4188 1-14 Circuit Switching Network Example: Public Service Telephone Network (PSTN)
  • 15. Fall 2010 CEG 4188 1-15 Event Timing for Circuit Switching
  • 16. Fall 2010 CEG 4188 1-16 Packet Switching • circuit switching was designed for voice • packet switching was designed for data • transmitted in “small” packets • packet contains user data and control info – user data may be part of a larger message – control info includes routing (addressing) info • packets are received, stored briefly (buffered) and passed on to the next node
  • 17. Fall 2010 CEG 4188 1-17 Packet Switching • Source breaks long message into “information transporting segments” (packets). • Packets are sent one at a time to the network. • Packets contain user data and control/signaling information. – user data may be part of a larger message – control information includes routing/addressing information • Packets are received, stored “briefly” (buffered) and are passed onto the next node.
  • 18. Fall 2010 CEG 4188 1-18 Characteristics • Line efficiency – single link shared by many packets over time – packets queued and transmitted as fast as possible • Data rate conversion – stations connect to local nodes at their own speed – nodes buffer data if required to equalize rates • Packets are accepted even when the “line” is busy • Priorities can be used to support users’ needs, instead of dedicating resources regardless if they are used or not (becoming wasted if they are not)
  • 19. Fall 2010 CEG 4188 1-19 Datagram Packet Switching 19
  • 20. Fall 2010 CEG 4188 1-20 Event Timing for Datagram
  • 21. Fall 2010 CEG 4188 1-21 Virtual Circuit Packet Switching
  • 22. Fall 2010 CEG 4188 1-22 Event Timing for the 3 switching methods
  • 23. Fall 2010 CEG 4188 1-23 Virtual Circuits versus Datagram • Virtual circuits – network can provide sequencing – traffic engineering can be applied, enabling more practical provision of quality of service (QoS) support – less reliable in cases of switching node failures • Datagram – no call setup phase – more flexible – more reliable in cases of switching node failures – difficult to control network’s state and provide quality of service
  • 24. Fall 2010 CEG 4188 1-24 Circuit versus Packet Switching: Comparison • Circuit Switching – Dedicated channels/resources – Constant delay – Blocking – Continuous flow – Point-to-Point • Packet Switching – Shared channels – Variable delay – Store-and-forward point-to-point & multipoint
  • 25. Fall 2010 CEG 4188 1-25 Other forms of Packet Switching Services • Frame Relay based Networks – requires high level of network reliability. – took away a lot of overhead, improved efficiency. • Asynchronous Transfer Mode (ATM) – based on the use of fixed size packets (53 bytes, called ATM cells). – first Broadband Integrated Services (ISDN) network . – offered quality of service (QoS) choices. • MPLS (label switching)
  • 26. Fall 2010 CEG 4188 1-26 Internetworking  Internetworking is a scheme for interconnecting multiple networks of non identical technologies Uses both hardware and software • Extra hardware positioned between networks • Software on each attached computer  System of interconnected networks is called an internetwork or an internet
  • 27. Fall 2010 CEG 4188 1-27 Internetwork (Internet)
  • 28. Fall 2010 CEG 4188 1-28 OSI Reference Model and the Link layer – as an example protocol layer
  • 29. Fall 2010 CEG 4188 1-29 Open System Interconnection (OSI) Reference Model • Developed by the International Organization for Standardization (ISO). • Has become the standard model for classifying communication functions. • Has seven layers. • It is a “theoretical” system delivered too late! • It has NOT dominated. TCP/IP is the de facto standard. • Several reasons: – TCP/IP appeared earlier – Internet “won” the game – OSI has a “complex” structure that could result in “heavy processing”
  • 30. Fall 2010 CEG 4188 1-30 Functions of the OSI Layers • Physical – The bits that are transmitted over the communication media. – Deals with network hardware, bit encoding. – Examples: copper, fiber, radio, satellite. • Data Link – Activates, maintains, and deactivates the physical link between two adjacent nodes (node-to-node delivery). – Deals with framing, windowing, flow control, error detection and recovery. • Network – Determines how best to route packets of data from source to destination via intermediate network nodes. – Deals with addressing, routing, fragmentation, and congestion.
  • 31. Fall 2010 CEG 4188 1-31 Functions of OSI Layers (…) • Transport – Provides end-to-end message delivery and error recovery. – Deals with end to end integrity and quality of service. • Session – To establish, manage, and terminate sessions. – Controls the dialogue between two host applications. – Reports exceptions to upper layers. • Presentation – Resolves data representation differences. – To translate, encrypt, and compress data. • Application – Perform functions to implement network applications. – E.g.; e-mail, teleconferencing.
  • 32. Fall 2010 CEG 4188 1-32 Generic Communication Issues • Error control: making a channel more reliable, and handling lost or out of sequence messages. • Flow control: avoid flooding a slower peer entity. • Resource allocation: mediating contention for physical (e.g. buffers) or logical (e.g. data structures) resources • Fragmentation: dividing chunks of data into smaller pieces, and subsequent reassembly • Multiplexing: combining several higher layer sessions • Connection setup: initiating logical communication with peer entity • Addressing / naming: managing identifiers • Compression: reducing data rate • Encryption: provide data security • Timer management: bookkeeping and error recovery
  • 33. Fall 2010 CEG 4188 1-33 Link layer protocols - as an example • Transmission mode - physical link property • Line discipline - Who should send now? • Flow control - How much data should be sent? • Error control - How can errors be corrected?
  • 34. Fall 2010 CEG 4188 1-34 Transmission Mode Simplex Half-duplex Full-duplex
  • 35. Fall 2010 CEG 4188 1-35 ENQ/ACK Point-to-point Line Discipline
  • 36. Fall 2010 CEG 4188 1-36 Line Discipline (…) • Multi-point
  • 37. Fall 2010 CEG 4188 1-37 Select Line Discipline
  • 38. Fall 2010 CEG 4188 1-38 Poll Line Discipline
  • 39. Fall 2010 CEG 4188 1-39 listen idle? transmit jamming signal wait random time collision? no no yes yes CSMA/CD (network access protocol = line discipline) • Carrier Sense Multiple Access with Collision Detection • Used in Ethernet: the most widely-used type of LAN
  • 40. Fall 2010 CEG 4188 1-40 Stop and Wait Flow Control What is the problem with this scheme?
  • 41. Fall 2010 CEG 4188 1-41 Sender Sliding Window Flow Control (…) Sliding Window
  • 42. Fall 2010 CEG 4188 1-42 Damaged Frame Error Control: Stop-and-Wait • What causes an error?
  • 43. Fall 2010 CEG 4188 1-43 Lost Frame Error Control: Stop-and-Wait (…)
  • 44. Fall 2010 CEG 4188 1-44 Lost ACK Error Control: Stop-and-Wait (…)
  • 45. Fall 2010 CEG 4188 1-45 Damaged Frame Error Control: Go-Back-N
  • 46. Fall 2010 CEG 4188 1-46 Lost Frame Error Control: Go-Back-N (…) What seems to be a drawback of Go-Back-N?
  • 47. Fall 2010 CEG 4188 1-47 Lost ACK Error Control: Go-Back-N (…)
  • 48. Fall 2010 CEG 4188 1-48 Error Control: Selective Reject Damaged Frame Seems to save bandwidth compared to Go-Back-N. What’s the cost?
  • 49. Fall 2010 CEG 4188 1-49 What is a protocol ?
  • 50. Architectural structure of a protocol layer protocol entity protocol entity communication service used by the protocol (offered by the lower layer) service offered by the protocol user of protocol user of protocol service interfaceservice interface Protocol service interfaces of lower layer message encoding message encoding
  • 51. Link Layer protocol protocol entity protocol entity communication service of physical layer send/receive a block of data user of protocol user of protocol send/receive user data block (reliably) Link layer service interface Protocol data blocks containing SEL, Poll, datablock, ack, nack message encoding message encoding Physical layer service interface
  • 52. Fall 2010 CEG 4188 1-52 Protocols • A protocol is a set of rules that govern all aspects of communication between two or more partners, called peers – These rules are human-made; not like chemistry or physics! • The purpose of a protocol is to provide a specific communication service. • What aspects must be defined for assuring compatibility between the communicating partners? (see next slides) • Who makes protocols? – Standardization committees – Designers of a new distributed application
  • 53. Fall 2010 CEG 4188 1-53 Service specification • The specification of a communication service has two parts: – specification of an abstract service interface through which the service can be locally obtained (sometimes called service access point) • e.g. in the case of TCP: local interactions for establishing a connection and for closing it; sending a flow of data over an established connection (with flow control, no notion of "end of service unit") • It is an abstract interface, the interaction primitives may be considered a kind of abstract message (initiated by one side, received by the other side of the interface; some interactions are initiated by the user, others are initiated by the service). The specification of an abstract service interface is like the specification of the dynamic behavior of an object class. It includes – Static aspects » list of interaction primitives, also called service primitives (like messages exchange; not like method calls that have the initiating party blocked until the method returns) » for each primitive, which sides initiates the message, and its parameters and their type – Dynamic aspects » sequencing rules which define in which order the primitives may be executed » rules concerning the allowed parameter values for particular execution sequences – specification of the end-to-end behavior of the (distributed) system component that provides the service • e.g. in the case of TCP: the establishment of a connection involves local exchanges at both end-points of the connection concerning the connection establishment; data received at one end-point must have been sent at the other end-point (with FIFO property without loss nor errors)
  • 54. Fall 2010 CEG 4188 1-54 Protocol specification • Protocol specification = definition of the behavior of a protocol entity as visible at the upper and lower (abstract) service interfaces • This includes – reference to the specification of the upper (abstract) service interface (normally defined by the corresponding service specification) – reference to the specification of the lower (abstract) service interface (normally defined by the service specification of the underlying service used by the protocol) – dynamic behavior of the protocol entity, that is, • sequencing rules concerning interactions at the upper and lower interfaces. – Note (a): Certain protocols developed by certain groups, e.g. IETF, do not refer to any service specification. In this case only the ordering of interactions at the lower interface are defined. – Note (b): In the simplest case (if the protocol does not use any connections, or if it can be assumed that appropriate connections are already established) the interactions at the lower interface only include the sending and receiving of protocol messages (so-called PDU's). • Rules concerning the allowed interaction parameters – e.g sequence numbering in TCP, sending acknowledgements, etc. • Encoding rules – (a) concerning how interaction parameters received at the upper interface are coded and sent as so-called "user data" in one of the data fields of the primitives at the lower interface (and inversely the decoding of user data to obtain the corresponding value for the upper interaction parameter). » e.g. in the case of the IP protocol: how is the address "local host" coded in the destination address field of an IP packet ? – (b) concerning the coding of protocol control information managed by the protocol entity » e.g. in the case of the TCP protocol: where in the "user data" of the lower layer primitive (which in the case of TCP is the data field of an IP packet) is the TCP sequence number placed and how are the integer values coded ?
  • 55. Fall 2010 CEG 4188 1-55 Relevant Standards Bodies • ISO (www.iso.org) – An agency of the United Nations. – Collaborates standards development for information technology. • ITU (www.itu.int) – UN treaty agency that sets telecommunications standards. – ITU-T (Telecommunications section) • ANSI (www.ansi.org) – American National Standards Institute: the US national standards body. – Coordinates and accredits standards development across the US. • IEEE (www.ieee.org) – US based international professional organization. – Among other things, develops standards. • IETF / IRTF – Internet Engineering Task Force (www.ietf.org) – Internet Research Task Force (www.irtf.org) • EIA (www.eia.org) – Electronic Industries Alliance – E.g.; standards for wiring and interconnection
  • 56. Fall 2010 CEG 4188 1-56 OSI Model • Open System Interconnection. • An ISO standard • Why open?
  • 57. Fall 2010 CEG 4188 1-57 OSI Reference Model Physical Link Network Transport Session Presentation Application
  • 58. Fall 2010 CEG 4188 1-58 Protocol Data Unit (PDU)
  • 59. Fall 2010 CEG 4188 1-59 TCP/IP Protocol Architecture • No official model but a working one. • Has 5 layers (OSI has 7 layers) • Was the result of research conducted on ARPANET, funded by DARPA (USA). • Initially developed as a US military research effort funded by the Department of Defense • It has dominated. • It is the “heart” of Internet.
  • 60. Fall 2010 CEG 4188 1-60 TCP/IP Protocol Architecture Application Layer Host-to-Host or Transport Layer Internet Layer Network Access Layer Physical Layer Contains the logic needed to support user applications (ftp, telnet, http etc.) Each application requires different module. Covers the physical interface between device (computer and transmission medium or network - medium, signals, data rates..) Concerned with the exchange of data between end system and network (destination address, priority etc.) Depends on net. type Provides routing functions across multiple networks. It is implemented in end-systems and routers Concerned with the reliability of transmission/reception (error control, sequencing, flow control)
  • 61. Fall 2010 CEG 4188 1-61 TCP/IP Protocol Architecture Application Layer Host-to-Host or Transport Layer Internet Layer Network Access Layer Physical Layer Application Layer Host-to-Host or Transport Layer Internet Layer Network Access Layer Physical Layer Network
  • 62. Fall 2010 CEG 4188 1-62 Some TCP/IP Protocols
  • 63. Fall 2010 CEG 4188 1-63 IEEE Project 802 - LAN Network access service interface
  • 64. Fall 2010 CEG 4188 1-64 Connection Devices
  • 65. Fall 2010 CEG 4188 1-65 Connecting Devices and the OSI Model
  • 66. Fall 2010 CEG 4188 1-66 Repeater A Repeater
  • 67. Fall 2010 CEG 4188 1-67 Function of Repeater
  • 68. Fall 2010 CEG 4188 1-68 Bridge A Bridge
  • 69. Fall 2010 CEG 4188 1-69 Function of Bridge
  • 70. Fall 2010 CEG 4188 1-70 Multiport Bridge
  • 71. Fall 2010 CEG 4188 1-71 Router
  • 72. Fall 2010 CEG 4188 1-72 Routers in an Internet
  • 73. Fall 2010 CEG 4188 1-73 Gateway