Andrew S. Tanenbaum - Computer Networks.

450 views 97 slides Dec 06, 2024
Slide 1
Slide 1 of 97
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77
Slide 78
78
Slide 79
79
Slide 80
80
Slide 81
81
Slide 82
82
Slide 83
83
Slide 84
84
Slide 85
85
Slide 86
86
Slide 87
87
Slide 88
88
Slide 89
89
Slide 90
90
Slide 91
91
Slide 92
92
Slide 93
93
Slide 94
94
Slide 95
95
Slide 96
96
Slide 97
97

About This Presentation

Andrew S. Tanenbaum - Computer Networks


Slide Content

Computer Networks and Information Security 24BIT4C30 UNIT-I SURESH KUMAR S Assistant Prof, IT Department, STC, Pollachi

Topic 1- Introduction to Network

Technology Revolution 18th Century - The great mechanical systems accompanying the Industrial Revolution 19th Century - The age of the steam engine 20th Century - The key technology was information gathering, processing, and distribution

Technology Revolution During the first two decades of their existence, computer systems were highly centralized, usually within a single large room. A medium-sized company or university might have had one or two computers While very large institutions had at most a few dozen.

Technology Revolution The old model of a single computer serving all of the organization’s computational needs has been replaced by one in which a large number of separate but interconnected computers do the job. These systems are called computer networks .

What is a Computer Network The term ‘‘ computer network ’’ to mean a collection of autonomous computers interconnected by a single technology . Two computers are said to be interconnected if they are able to exchange information .

A set of communication elements connected by communication links ➭ Communication elements Computers, printers, mobile phones, … Routers, switches, ... ➭ Communication links optic fiber coaxial cable twisted pair wireless (radio, microwave, satellite) ➭ Topologies Ring, Star, Bus, Tree, Mesh What is a Computer Network

A software/hardware infrastructure ➭ Share resources data, files, computing power, video,… ➭ Information highway communication between geographically dispersed users ➭ Electronic Society Cyberspace Virtual global nation What is a Computer Network

Introduction Computer Network an interconnected collection of autonomous computers  Internet: “ network of networks ” loosely hierarchical public Internet versus private intranet WWW a distributed systems run on the top of Internet Distributed System High degree of cohesiveness and transparency A software system built on top of a network

Uses of Computer Networks Business Applications Home Applications Mobile Users Social Issues

Business Applications of Networks A network with two clients and one server. Resource sharing (hardware, software, information, …) c. Doing business electronically (B2B, B2C, e-commerce) b. Providing communication medium (e-mail, videoconferenceing)

Goals of Networks for Companies Resource sharing: equipment, programs, data high reliability replicated data hardware Saving money mainframe: 10 times faster, but 1000 times more expensive than PC client-server model Scalability mainframe: replace a larger one client-server model: add more servers Communication medium for separated employees

Business Applications of Networks (2) The client-server model involves requests and replies. a. Two processes are involved b. A communication network is needed

Home Network Applications Access to remote information Person-to-person communication Interactive entertainment Electronic commerce

Networks for People Access to remote information e.g.: financial, shopping, customized newspapers, on-line digital library, WWW Person-to-person communication email, video conference, newsgroup Interactive entertainment interactive movies or TVs, game playing

Home Network Applications (2) In peer-to-peer system there are no fixed clients and servers.

Home Network Applications (3) Some forms of e-commerce.

Mobile Network Users Combinations of wireless networks and mobile computing. mobile-commerce

Social Issues Politics Religion Sex Privacy Crime junk mail Each country has different laws. Debate rages!

Network Hardware Local Area Networks Metropolitan Area Networks Wide Area Networks Wireless Networks Home Networks Internetworks

Types of transmission technology Broadcast links Point-to-point links Network Hardware

Network Hardware Broadcast networks single communication channel shared by all machines broadcasting or multicasting (via packets) broadcasting: a special code in address field multicasting: reserve one bit to indicate multicasting, the remaining n-1address bits can hold a group number. Each machine can subscribe to any groups used by localized networks (or satellites) point-to-point networks many hops routing algorithms: multiple routes are possible used by large networks

Classification of interconnected processors by scale

Local Area Networks (LANs) Two broadcast networks (a) Bus (b) Ring · Characterics of LANs: (a) privated-owned, (b) small size, (c) transmission technology, (d) topology · Ethernets are most popular (up to 10 Gb/s)

Local Area Networks Characteristics small size transmission technology single cable 10Mbps ~ 10Gb/s 10Gb/s : 10,000,000.000 bps topology: bus Ethernet (IEEE 802.3): 10 or 100 Mbps (10Gb/s) ring IBM token ring (IEEE 802.5): 4 or 16 Mbps Channel allocation of broadcast networks static: each machine has an allocated time slot dynamic

Metropolitan Area Networks A metropolitan area network based on cable TV.

Wide Area Networks (WANs) Relation between hosts on LANs and the subnet. · WANs are point-to-point networks ·WANs consist of two distinct components: transmission lines (copper, fiber, microwave) and switches (electronics, optics)  Store-and-forward or packet-switched subnet

Network Topology

Subnet (WANs) Subnet (WANs) is consists of two components: transmission lines (circuits, channels, trunks) move bits between machines switching elements connect transmission lines Router: also called packet switching nodes, intermediate systems, and data switching exchanges Operate in store-and-forward, or packet-switched mode.

Wide Area Networks (2) A stream of packets from sender to receiver. (virtual- circuit) Routing decisions are made locally· How A makes that decision is called the routing algorithm.  Will be studied in detail in Chapter 5. 9/17 End

Wireless Networks Categories of wireless networks: System interconnection (short-range radio, e.g. Bluetooth) Wireless LANs (802.11a, 802.11b, 802.11g) Wireless WANs (802.16, Cellular telephones, Satellites) Wireless sensor networks

Wireless Networks (2) (a) Bluetooth configuration (b) Wireless LAN

Wireless Networks (3) (a) Individual mobile computers (b) A flying LAN

Home Network Categories Computers (desktop PC, PDA, shared peripherals) Entertainment (TV, DVD, VCR, camera, stereo, MP3) Telecomm (telephone, cell phone, intercom, fax) Appliances (microwave, fridge, clock, furnace, airco., light) Telemetry (utility meter, smoke/burglar alarm, babycam).

Fundamentally different properties 1. Devices have to be easy to install 2. The network and devices have to be foolproof in operation 3. Low price is essential 4. The network needs sufficient capacity ( for multimedia application) 5. The network interface and wiring have to be stable for many years 6. Security and reliability will be very important (minimize false alarm or misalarm) Home networks may be wired or wireless

Internetworks Internetworks connect networks with different hardware and software A collection of interconnected networks is called an internetwork or internet Internet is one specific internet Gateways are used to make the connection and to provide the necessary translation (protocol convertion)

Network Software

Network Software Protocol Hierarchies (Layer structure) Design Issues for the Layers Connection-Oriented and Connectionless Services Service Primitives The Relationship of Services to Protocols

Network Software Protocol Hierarchies a series of layers (levels) lower layer provides service to higher layers protocol : an agreement between the communication parties on how communication is to proceed Peers : the corresponding layers on different machines. Network architecture : a set of layers and protocols Protocol stack : a list of protocols used by a certain system, one protocol per layer

Network Software Protocol Hierarchies Layers, protocols, and interfaces.  Peer Network Architecture: A set of layers and protocols Protocol Stack: A list of protocols used by a certain system, one protocol per layer. Virtual Communication Physical Communication

Layering ➭ To make things simple: modularization ➭ Different layer has different functions ➭ Create layer boundary such that description of services can be small number of interactions across boundary are minimized potential for interface standardized ➭ Different level of abstraction in the handling of data (e.g., syntax, semantics) ➭ Provide appropriate services to upper layer ➭ Use service primitives of lower layer Network Software

Protocol Hierarchies (2) The philosopher-translator-secretary architecture.

Protocol Hierarchies (3) Example information flow supporting virtual communication in layer 5. Message segmentation Encapsulation

Design Issues for the Layers Addressing (telephone number, e-mail address, IP address,…) Error Control (error correction codes, ARQ, HARQ,…) Flow Control (feedback-based, rate-based) Multiplexing (gathering several small messages with the same destination into a single large message or vice versa  Dem ultiplexing) Routing (directing traffic to the destination)

Design Issues for Layers Identify senders and receivers multiple computers and processes: addressing Data transfer simplex, half-duplex, full-duplex communication # of logical channels per connections, priorities Error control error detection error correction Sequencing of pieces

Design Issues for Layers Flow control feedback from the receiver agreed upon transmission rate Length of messages long messages: disassemble, transmit, and reassmeble messages short messages: gather several small messages Multiplexing and Demultiplexing when expensive to set up a separate connection needed in physical layer Routing: split over two or more layers High level: London -> France or Germany -> Rome Low level: many available circuits

Connection-Oriented and Connectionless Services Six different types of service.

Service Primitives (Operations) Five service primitives for implementing a simple connection-oriented service. A service is formally defined by a set of primitives (operations) available to a user process to access the services.

Service Primitives (2) Packets sent in a simple client-server interaction on a connection-oriented network. If the protocol stack is located in the operating system, the primitives are normally system calls.

Services to Protocols Relationship The relationship between a service and a protocol. ·The service defines what operations the layer is prepared to perform on behalf of its users · A service is a set of primitives that a layer provides to the layer above it. · A protocol is a set of rules governing the format and meaning of the packets which are exchanged by the peer entities in the same layer. Service Providers Service Users Services related to the interfaces between layers; Protocols related to the packets sent between peer entities on different machine.

Reference Models The OSI Reference Model The TCP/IP Reference Model A Comparison of OSI and TCP/IP A Critique of the OSI Model and Protocols A Critique of the TCP/IP Reference Model

OSI Reference Model Reference Model gives a conceptual framework that standardizes communication between heterogeneous networks. OSI Reference model is based on a proposal developed by the International Standards Organization (ISO) as a first step toward international standardization of the protocols used in the various layers (Day and Zimmermann, 1983). It was revised in 1995 (Day, 1995). The model is called the ISO-OSI (Open Systems Interconnection) Reference Model because it deals with connecting open systems, i.e. systems that are open for communication with other systems.

Principles that were applied to arrive at the seven layers A layer should be created where a different abstraction is needed. Each layer should perform a well-defined function . The function of each layer should be chosen with an eye toward defining internationally standardized protocols . The layer boundaries should be chosen to minimize the information flow across the interfaces. The number of layers should be large enough that distinct functions need not be thrown together in the same layer out of necessity and small enough that the architecture does not become unwieldy.

The OSI layers Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer

The Physical Layer Tansmits raw bits over a communication channel . Design issue : To make sure that when one side sends a 1 bit, it is received by the other side as a 1 bit, not as a 0 bit.

The Data Link Layer The sender break up the input data into data frames and transmits the frames sequentially. If the service is reliable, the receiver confirms correct receipt of each frame by sending back an acknowledgement frame. Design Issues: Error Handling - To transform a raw transmission facility into a line that appears free of undetected transmission errors to the network layer. Flow Control - To keep a fast transmitter from drowning a slow receiver in data - Some traffic regulation mechanism is needed to let the transmitter know how much buffer space the receiver has at the moment. These two issues are frequently integrated.

The Network Layer The network layer controls the operation of the subnet. Design issues : How packets are routed from source to destination. Routes can also be determined at the start of each conversation, Routes can be highly dynamic, based on the current network load. To control congestion in the network layer Quality of service provided

When a packet has to travel from one network to another to get to its destination, many problems can arise. The addressing used may be different The packet size may vary The protocols may differ, and so on. ..

Other Issues in the Network Layer When a packet has to travel from one network to another to get to its destination, many problems can arise. The addressing used may be different The packet size may vary The protocols may differ, and so on. .. The network layer have to overcome all these problems to allow heterogeneous networks to be interconnected. In broadcast networks , the routing problem is simple, so the network layer is thin or nonexistent.

The Transport Layer The basic function is to accept data from above, split it up into smaller units if needed and pass these to the network layer. Design Issues : To ensure that the pieces arrive correctly at the other end. To determine what type of service to provide to the session layer, and, also to the users of the network. The most popular type - an error-free point-to-point channel. Transporting of isolated messages. Broadcasting of messages to multiple destinations. (The type of service is determined when the connection is established.) The transport layer is a true end-to-end layer , all the way from the source to the destination.

A program on the source machine carries on a conversation with a similar program on the destination machine, using the message headers and control messages. In the lower layers, the protocols are between each machine and its immediate neighbours, and not between the ultimate source and destination machines, which may be separated by many routers.

The Session Layer To establish sessions between users on different machines. Sessions offer various services: Dialog Control - keeping track of whose turn it is to transmit Token Management - preventing two parties from attempting the same critical operation at the same time Synchronization - check pointing long transmissions to allow them to continue from where they were after a crash

The Presentation Layer It is concerned with the syntax and semantics of the information transmitted. For computers with different data representations to communicate, abstract data structures can be defined along with a standard encoding to be used. This layer manages these abstract data structures and allows higher-level data structures to be defined and exchanged.

The Application Layer The application layer contains a variety of protocols that are commonly needed by users. One widely-used application protocol is HTTP (Hypertext Transfer Protocol) , which is the basis for the World Wide Web. When a browser wants a Web page, it sends the name of the page it wants to the server using HTTP. The server then sends the page back. Other application protocols are used for file transfer, electronic mail, and network news.

Questions The OSI model has _______ layers. a) 4 b) 5 c) 6 d) 7 Which layer is responsible for process to process delivery? a) network layer b) transport layer c) session layer d) data link layer

Which layer links the network support layers and user support layers a) session layer b) data link layer c) transport layer d) network layer

Which layer provides the services to user? a ) application layer b) session layer c) presentation layer d) none of the mentioned

OSI stands for a) open system interconnection b) operating system interface c) optical service implementation d) none of the mentioned

The TCP/IP Protocol Suite The TCP/IP protocol suite was developed prior to the OSI model. Therefore, the layers in the TCP/IP protocol suite do not match exactly with those in the OSI model. The original TCP/IP protocol suite was defined as four software layers built upon the hardware. Today, however, TCP/IP is thought of as a five-layer model with the layers named similarly to the ones in the OSI model.

Layers in the TCP/IP Protocol Suite TCP/IP reference model has only 4 layers, 1. Host-to-Network Layer 2. Internet Layer 3. Transport Layer 4. Application Layer

The TCP/IP internet layer is similar in functionality to the OSI network layer

Host-to-Network Layer The host has to connect to the network using some protocol so it can send IP packets to it. This protocol is not defined and varies from host to host and network to network.

Internet Layer This layer holds the whole architecture together. It allows hosts to inject packets into any network and let them travel independently to the destination (potentially on a different network). They may even arrive in a different order than they were sent, in which case it is the job of higher layers to rearrange them, if in-order delivery is desired. The internet layer defines an official packet format and protocol called IP (Internet Protocol) - It delivers IP packets to their respective destinations. Major issues: Packet Routing Congestion Control

The Transport Layer It is designed to allow peer entities on the source and destination hosts to carry on a conversation, just as in the OSI transport layer. Two end-to-end transport protocols are defined here: TCP (Transmission Control Protocol) - Reliable Connection-oriented Protocol UDP (User Datagram Protocol) – Unreliable Connectionless Protocol

TCP (Transmission Control Protocol) It is a reliable connection-oriented protocol that allows a byte stream originating on one machine to be delivered without error on any other machine in the internet. It fragments the incoming byte stream into discrete messages and passes each one on to the internet layer. At the destination, the receiving TCP process reassembles the received messages into the output stream . TCP also handles flow control to make sure a fast sender cannot swamp a slow receiver with more messages than it can handle.

UDP (User Datagram Protocol) It is an unreliable, connectionless protocol for applications that do not want TCP's sequencing or flow control and wish to provide their own. It is also widely used for client-server-type request reply queries and applications in which prompt delivery is more important than accurate delivery , such as transmitting speech or video.

Relationship of IP, TCP &UDP

The Application Layer The TCP/IP model does not have session or presentation layers. On top of the transport layer is the application layer. It contains all the higher-level protocols like TELNET, FTP, SMTP,... TELNET - The virtual terminal Protocol allows a user on one machine to log onto a distant machine and work there. FTP - The File Transfer Protocol provides a way to move data efficiently from one machine to another. SMTP – The Simple Mail Transfer Protocol - specialized protocol developed for Electronic mail transfer.

Many other protocols have been added to these over the years: The Domain Name System (DNS) for mapping host names onto their network addresses, Hyper Text Transfer Protocol (HTTP) for fetching pages on the World Wide Web, .....

Questions TCP/IP reference model contains how many layers 3 4 6 7

Which layer is responsible for process to process delivery? a) network layer b) transport layer c) session layer d) data link layer

TCP/IP model was developed _____ the OSI model. a) prior to b) after c) simultaneous to d) none of the mentioned

TCP/IP model does not have ______ layer but OSI model have this layer. a) session layer b) presentation layer c) application layer d) both (a) and (b )

Telnet A)allows user to connect client machine B)transferring files C)sharing files D)none of above

The design principle of the OSI reference model A layer should be created where a different abstraction is needed Each layer should perform a well defined function The function of each layer can be chosen as an international standard The layer boundaries should be chosen to minimize the information flow across the interfaces The number of layers should be not too large or not too small

Reference Models The OSI reference model.

The functions of the seven layers The physical layer is concerned with transmitting raw bits over a communication channel The data link layer performs flow control and also transforms a raw transmission facility into a line that appears error free (ARQ) The network layer controls the operation of the subnet, e.g. routing , flow control, internetworking,… The transport layer performs assembling and disassembling, isolates the upper layers from the changes in the network hardware, and determines the type of services The session layer establishes sessions (dialog control, …) The presentation layer is concerned with the syntax and semantics The application layer contains a variety of commonly used protocols (e.g. Hyper Text Transfer Protocol for WWW, file transfer, e-mail, network news,…)

Reference Models (2) The TCP/IP reference model.

Reference Models (3) Protocols and networks in the TCP/IP model initially.

Comparing OSI and TCP/IP Models Concepts central to the OSI model Services: defines layer’s semantics Interfaces: tells the processes above it how to access it. Protocols Probably the biggest contribution of the OSI model is to make the distinction between these three concepts explicit.

A Critique of the OSI Model and Protocols Why OSI did not take over the world Bad timing Bad technology Bad implementations Bad politics

Bad Timing The apocalypse of the two elephants. new discovery investment opportunity right time to make

Bad Technology The choice of seven layers was political - session and presentation layers are nearly empty - Data and network layers are overfull The OSI model is extraordinarily complex Some functions e.g. addressing, flow control, error control reappear again and again

Bad Implementations Huge, Unwieldy, and Slow Bad Politics bureaucrats involved too much (European telecommunication ministries, community, us government)

A Critique of the TCP/IP Reference Model Problems: Service, interface, and protocol not distinguished Not a general model Host-to-network “layer” not really a layer (is an interface) No mention of physical and data link layers Minor protocols deeply entrenched, hard to replace (The virtual terminal protocol, TELNET, was designed for mechanical teletype terminal)

Hybrid Model The hybrid reference model to be used in this book.
Tags