INTNETWORKING
INTNETWORKING
Chapter 1: Internetworking
• Internetworking Basics
• Network segmentation
• How bridges, switches, and routers are
used to physically segment a network
• How routers are used to create
internetwork
• OSI model
IST 228\Ch1\Internetworking 2
Internetworking Models
• Most networks are designed as a stack of
layers, each one built upon the one below
it. Why?
Host 1 Host 2
Layer 3 protocol
Layer 3 Layer 3
Layer 2/3 interface
Layer 2 protocol
Layer 2 Layer 2
Layer 1/2 interface
Layer 1 protocol
Layer 1 Layer 1
Physical Medium
IST 228\Ch1\Internetworking 3
An Analogy
Professor A Professor B
J’aime
I like Message bien les
rabbits
lapins
Urdu & English Information Chinese & French
for the
Translator remote Translator
L: Dutch L: Ducth
translator
Ik vind Ik vind
konijnen use Dutch konijnen
leuk leuk
Application
• Initiates services
• Transfer data into standard format
Presentation before transmission
• Keeps data different applications’ data
Session separate
• Control the data exchange
• End-to-end data error free data
Transport
transmission
The lower levels
• Connection-oriented protocols:
sender receiver
Synchronize
Negotiate connection
Synchronize
Acknowledge
Data Transfer
IST 228\Ch1\Internetworking 12
• Flow Control
• The segments delivered back to the sender upon their
reception
• Any segment not acknowledged are retransmitted.
• Segments are sequence back into their proper order upon
arrival at their destination
• Manageable data flow is maintained in order to avoid
congestion
sender receiver
Buffer full
GO
IST 228\Ch1\Internetworking 13
Window Window
size of 1 size of 3
• Acknowledgments:
sender receiver
Positive Acknowledgment
with retransmission
1 2 3 4 5 6 1 2 3 4 5 6
send 1
send 2
send 3
ack. 4
send 4
send 5 Connection lost!
send 6
ack. 5
send 5
ack. 7
IST 228\Ch1\Internetworking 15
Example:
568B twisted pair wiring scheme
IST 228\Ch1\Internetworking 19
Network Segmentation
• Segmentation
– Process of breaking a network into smaller broadcast or
collision domains
• Ethernet network, which are characterized by IEEE
802.3 standard, define the use of a Carrier Sense
Multiple Access with Collision Detection
(CSMA/CD) access method
– Backoff algorithm : Mathematical calculation
performed by computers after a collision occurs on a
CSMA/CD network
– Backoff period : Random time interval used after a
collision has been detected on an Ethernet network
IST 228\Ch1\Internetworking 23