Chapter 1
Chapter 1
Πελοποννήσου
Τμήμα Πληροφορικής & Τηλεπικοινωνιών
∆ΙΚΤΥΑ ΕΠΙΚΟΙΝΩΝΙΩΝ ΙΙ
ΟΚΤΩΒΡΙΟΣ 2014
Recommended Reading
Greek literature
A. Tanenbaum, D. Wetherall, ∆ίκτυα Υπολογιστών, 5η έκδοση, εκδόσεις
Κλειδάριθμος, 2011.
English literature
W. Stallings, Data and Computer Communications, 10th edition, Pearson
Education, 2013.
J. F. Kurose and K.W. Ross, Computer Networking – A top down approach, 5th
edition, Pearson Education, 2009.
H. G. Perros, Connection-oriented Networks SONET/SDH, ATM, MPLS and
OPTICAL NETWORKS, John Wiley & Sons, 2005.
Introduction
Chapter 1 (Tanenbaum’s book)
request
response
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Network Hardware (1)
There is no generally accepted taxonomy into which all computer networks fit,
but two dimensions stand out as important: transmission technology and scale.
Two types of transmission technology are in widespread use: broadcast links
and point-to-point links.
Point-to-point links connect individual pairs of machines. To go from the source
to the destination on a network made up of point-to-point links, short messages,
called packets, visit one or more intermediate machines. Point-to-point
transmission with exactly one sender and exactly one receiver is sometimes
called unicasting.
On a broadcast network, the communication channel is shared by all the
machines on the network; packets sent by any machine are received by all the
others. An address field within each packet specifies the recipient.
Network Hardware (2)
Scale Type
Vicinity PAN (Personal Area Network) »
Building LAN (Local Area Network) »
City MAN (Metropolitan Area Network) »
Country WAN (Wide Area Network) »
Planet The Internet (network of all networks)
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Network Hardware (3)
Personal Area Network
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Local Area Networks (1)
Connect devices in a home or office building
Called enterprise network in a company
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Local Area Networks (2)
The Access Point, wireless router, or base station, relays packets between the
wireless computers and also between them and the Internet. Being the AP is like being
the popular kid as school because everyone wants to talk to you. However, if other
computers are close enough, they can communicate directly with one another in a peer-
to-peer configuration.
There is a standard for wireless LANs called IEEE 802.11, popularly known as WiFi,
which has become very widespread. It runs at speeds anywhere from 11 to hundreds of
Mbps.
Local Area Networks (3)
Wired LANs use a range of different transmission technologies. Most of them use
copper wires, but some use optical fiber.
LANs are restricted in size, which means that the worst-case transmission time is
bounded and known in advance. Knowing these bounds helps with the task of
designing network protocols. Typically, wired LANs run at speeds of 100 Mbps to 1
Gbps, have low delay (microseconds or nanoseconds), and make very few errors.
Newer LANs can operate at up to 10 Gbps. Compared to wireless networks, wired
LANs exceed them in all dimensions of performance.
It is just easier to send signals over a wire or through a fiber than through the air. The
topology of many wired LANs is built from point-to-point links. IEEE 802.3, popularly
called Ethernet, is, by far, the most common type of wired LAN. Fig. shows a sample
topology of switched Ethernet. Each computer speaks the Ethernet protocol and
connects to a box called a switch with a point-to-point link. Hence the name. A switch
has multiple ports, each of which can connect to one computer. The job of the switch is
to relay packets between computers that are attached to it, using the address in each
packet to determine which computer to send it to.
Metropolitan Area Networks
Connect devices over a metropolitan area
Example MAN based on cable TV:
Cable television is not the only MAN. Recent developments in highspeed wireless
Internet access have resulted in another MAN, which has been standardized as IEEE
802.16 and is popularly known as WiMAX.
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Wide Area Networks (1)
Connect devices over a country
Example WAN connecting three branch offices:
The company probably leases the transmission lines (since most companies do not
have their own lines).
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Wide Area Networks (2)
An ISP (Internet Service Provider) network is also a WAN.
Customers buy connectivity from the ISP to use it.
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Wide Area Networks (3)
A VPN (Virtual Private Network) is a WAN built from virtual
links that run on top of the Internet.
Now the company/customer uses the Internet (might be multiple ISPs) for connectivity.
The links are virtual in the sense that they refer to some path via the Internet rather than
a particular transmission line.
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Network Software
• Protocol layers »
• Design issues for the layers »
• Connection-oriented vs. connectionless service »
• Service primitives »
• Relationship of services to protocols »
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Protocol Layers (1)
Protocol layering is the main structuring method used to
divide up network functionality.
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Protocol Layers (2)
Example: the philosopher-translator-secretary architecture
Each protocol at different layers serves a different purpose
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Protocol Layers (3)
Each lower layer adds its own header (with control inform-
ation) to the message to transmit and removes it on receive
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Design Issues for the Layers
Each layer solves a particular problem but must include
mechanisms to address a set of recurring design issues
Issue Example mechanisms at different layers
Reliability despite Codes for error detection/correction (§3.2, 3.3)
failures Routing around failures (§5.2)
Network growth Addressing (§5.6) and naming (§7.1)
and evolution Protocol layering (§1.3)
Allocation of resources Multiple access (§4.2)
like bandwidth Congestion control (§5.3, 6.3)
Security against Confidentiality of messages (§8.2, 8.6)
various threats Authentication of communicating parties (§8.7)
The point is that there are some issues that are not wholly the responsibility of any one
layer, and they crop up again and again in the text. E.g., reliability is often considered a
key function of the transport layer (i.e., making transport reliable) yet reliability
mechanisms also appear in other layers (error codes in the link layer, routing around
failures in the network layer, and replication at the application layer).
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Connection-Oriented vs. Connectionless
Service provided by a layer may be kinds of either:
• Connection-oriented, must be set up for ongoing use
(and torn down after use), e.g., phone call
• Connectionless, messages are handled separately,
e.g., postal delivery
TCP provides a reliable bytestream service at the Transport layer, IP provides unreliable
datagram service at the Network layer.
More examples: RTP (used to carry VoIP data) provides unreliable connection service;
802.11 (WiFi) provides acknowledged datagram service; Ethernet provides unreliable
datagram service. CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Service Primitives (1)
A service is provided to the layer above as primitives
Hypothetical example of service primitives that may provide
a reliable byte stream (connection-oriented) service:
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Service Primitives (2)
Hypothetical example of how these primitives may be used
for a client-server interaction
Client Server
LISTEN (0)
CONNECT (1) Connect request
ACCEPT (2)
Accept response RECEIVE
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Relationship of Services to Protocols
Recap:
• A layer provides a service to the one above [vertical]
• A layer talks to its peer using a protocol
[horizontal]
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Reference Models
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
OSI Reference Model
A principled, international standard, seven layer model to
connect different systems
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
The Physical Layer
The physical layer is concerned with transmitting raw bits over
a communication channel. The design issues have to do with
making sure that when one side sends a 1 bit it is received by
the other side as a 1 bit, not as a 0 bit.
If the service is reliable, the receiver confirms correct receipt of each frame by
sending back an ACK frame. Another issue is how to keep a fast transmitter
from drowning a slow receiver in data. Some traffic regulation mechanism may
be needed to let the transmitter know when the receiver can accept more data.
Routes can be based on static tables that are ‘‘wired into’’ the network and
rarely changed, or more often they can be updated automatically to avoid
failed components. They
IP is the
“narrow waist”
of the Internet
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Critique of OSI & TCP/IP
OSI:
+ Very influential model with clear concepts
− Models, protocols and adoption all bogged down by politics
and complexity
TCP/IP:
+ Very successful protocols that worked well and thrived
− Weak model derived after the fact from protocols
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Example Networks
• The Internet »
• 3G mobile phone networks »
• Wireless LANs »
• RFID and sensor networks »
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Internet (1)
56 kbps links
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Internet (2)
T1 links
(1.5 Mbps)
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Internet (3)
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Internet (4)
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
3G Mobile Phone Networks (1)
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
3G Mobile Phone Networks (2)
Base stations connect to the core network to find other
mobiles and send data to the phone network and Internet
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
3G Mobile Phone Networks (3)
Handover
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Wireless LANs (1)
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Wireless LANs (2)
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Wireless LANs (3)
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
RFID and Sensor Networks (1)
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
RFID and Sensor Networks (2)
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Network Standardization
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Metric Units
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
End
Chapter 1
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011