Networking Basics
Networking Evolution of Networking History
Standalone Device. Duplication of equipments and resources. Inability to communicate efficiently. Lack of networking management. Point to point communication not usually practical Devices are too far apart Large set of devices would need impractical number of connections Solution is a communications network
2
Communication
Transmission of information. Examples:
Speaking. Smoke signal. Body language. Telephone. Broadcast systems (radio, television). Internet
Analyzing network
What is flowing ? What is flowing ? Data Data What different forms flow ? What different forms flow ? Text, Graphic, Video ... Text, Graphic, Video ... What rules govern flow ? What rules govern flow ? Standard, Protocol ... Standard, Protocol ... Where does the flow occur ? Where does the flow occur ? Cable, Atmosphere ... Cable, Atmosphere ...
Addresses
Communication characteristics
Who are the source and the destination of a communication process?
Media
Where is the communication take place?
Protocols
How to make the communication process effectively?
Communication:
Human Address conversation
Hello Mr.A, I am B Media Atmosphere Protocol Language Speed Handshaking Source address, Destination address Media Cable, Fiber, Atmosphere Protocol Format Procedure
Data Address communication
Key Communications Tasks
Transmission System Utilization Interfacing Signal Generation Synchronization Exchange Management Error detection and correction Addressing and routing Recovery Message formatting Security Network Management
7
Approaches to Networking
Devices connected using dedicated link more devices impractical Multipoint connectionsdistance, no. of. device increase beyond capacity Solution switching series of interlinked nodes (switches) temporary connection between devices linked to switch
Circuit switching
Connection Oriented Dedicated communications path established for the duration of the conversation Fixed Cost
10
Space division paths spacially distributed crossbar switch
11
Size of crossbar huge, 25% of crosspoint in use Multistage switching combination of crossbar in stages
12
Multi path
13
Time division switching --uses time division multiplexing Time-slot interchange TDM bus
14
TDM bus
Involves high speed bus with micro-switches swicthing at th time slot 1 in input side and one in output side
15
16
Connectionless Multiple communications proceed concurrently Packets, typically containing a few hundred bytes of data, are sent across shared connections Packets passed from node to node between source and destination No guaranteed capacity Cheaper fewer connection required
Packet switching
17
Datagram approach
--each packet (datagram) independently
18
Virtual circuit approach
Relation between packets of message or session is preserved Single route at beginning Switched virtual circuit only when required
Connection establishment Data transfer Connection release
Permanent virtual circuit same between two users -dedicated
Others cant use
19
Switched virtual circuit
20
Message switching
Store and forward Node stores after receiving, until appropriate is route free, then sends
Used for unintelligent devices, now no longer used
21
(a)
Circuit switching (b) Message switching (c) Packet switching
22
Network hierarchy
23
Two Broad Categories
Local Area Network
Wide Area Network
24
Two Broad Categories
Local Area Network (LAN)
Span single building or small campus Typical speeds range from 10Mbps to 2Gbps Requires a Network Interface Card (NIC)
25
Two Broad Categories
Wide Area Network (WAN)
Span oceans and continents Typical speeds range from 1.5 to 155 Mbps Requires packets switches & long distance communication lines
26
27
Point-to-Point Line Configuration
28
Multipoint Line Configuration
29
30
Mesh Topology
31
Star Topology
32
Tree Topology
33
Bus Topology
34
Ring Topology
35
Hybrid Topology
36
OSI MODEL
37
Evolution of networking standards SNA
Standard
Interconnection Development Simplification
Proprietary
TCP/IP
DECNET
38
OSI model development
Researched and developed by the ISO International Organization for Standardizations.
1977: establish a subcommittee to develop a communications architecture. 1984: publish ISO-7498, the Open System Interconnection (OSI) reference model.
39
OSI Reference model
It is an open framework within which networking standards can be developed. In the OSI reference model, there are seven numbered layers, each of which illustrates a particular network function.
40
It breaks network communication into smaller parts to make it easier to understand. It standardizes network components . It allows different types of network hardware and software to communicate with each other.
A layered model Advantages
41
Layer 7: Application Layer 6: Presentation Layer 5: Session Layer 4: Transport Layer 3: Network Layer 2: Data Link Layer 1: Physical
7 layers of the OSI reference model
All People Seem To Need Data Processing
42
THE APPLICATION LAYER - Layer
Function
#7
Is the OSI layer that is closest to the user Provides a user interface. Provides network services to the users applications. Example :
Browser, Email, FTP, Telnet ...
43
Applications used in network Client-Server processing application
The client side is located on the local The client side is located on the local computer and is the requestor of the computer and is the requestor of the services. services. The server side is located on a remote The server side is located on a remote computer and provides services in computer and provides services in response to the clients requests.
44
Redirector
Redirector works with computer OS instead of specific application programs. Redirector allows to assign remote resources to logical names on the local computer. Examples of redirectors are:
NetBEUI. Novell IPX/SPX. NFS in TCP/IP.
45
DNS: Problems with using IP address
46
DNS
The DNS server is a device on a network that manages domain names and responds to requests from clients to translate a domain name into the associated IP address.
47
DNS: System
..
com com
Companies
edu edu
gov gov
net net
Network providers
org org
Non Govt. organizations
int int
Internationa l org.
Educational Govt. Institutions organizations
48
Email
E-mail client applications, such as Eudora, Outlook Express, and Netscape Mail, work with the POP3 protocol. For security, when message recipients check their e-mail they are often prompted for a password. An e-mail address consists of the recipients username and post-office address: [email protected].
49
Telnet
Telnet software provides the ability to remotely access another computer. The Telnet application works mainly at the application, presentation and session layers of the OSI model.
50
FTP
FTP is designed to download files or upload files on the Internet. An FTP session is established the same way in which a Telnet session is established. Just like Telnet, the FTP session is maintained until the client terminates it, or there is some sort of communication error.
51
HTTP
Hypertext Transfer Protocol (HTTP) works with the World Wide Web, which is the fastest growing and most used part of the Internet.
52
The Presentation Layer - Layer # 6
Function Ensures that the information that the application layer of one system sends out is readable by the application layer of another system.
53
Three main functions
54
Data formatting
55
Data encryption
56
Data compression
57
SESSION LAYER - Layer # 5 Functions
58
Process
Dialog control:
In the conversation, each host plays dual roles: requesting service and replying with service. Dialogue control determining which role they are playing at any given moment. Agree a set of guidelines to use during the communicating with each other.
Dialog separation:
Order to Initiate, terminate and manage of communication. Using a checkpoint to synchronize.
59
Dialog control
60
Dialog separation
61
TRANSPORT LAYER - Layer #4 Purpose of the transport layer
Transport and regulate the flow of information from source to destination, reliably and accurately. The end-to-end control:
Sliding windows. Sequencing numbers. Acknowledgments. Segmentation. Multiplexing.
62
TCP and UDP
63
Port
Both TCP and UDP use port (or socket) numbers to pass information to the upper layers.
64
Range of ports
2 bytes: 0 65535.
Numbers below 255 : for public applications. Numbers from 255 - 1023 : assigned to companies for marketable applications. Numbers above 1023 : are unregulated.
End systems use port numbers to select proper applications. Originating source port numbers are dynamically assigned by the source host; usually, it is a number larger than 1023.
65
Telnet port number
66
Provides connectivity and path selection between two host systems that may be located on geographically separated networks.
Logical address or IP address
The network layer Layer #3
67
Provides for the reliable transfer of data cross a physical link.
Physical address or MAC Address
The data-link layer Layer #2
68
Transmission of bit stream over a physical link between end systems.
Electrical, mechanical, procedural and functional specifications Physical data rate Distances Physical connector
The physical layer Layer #1
69
Data Encapsulation
70
Encapsulation example: Airmail
71
Encapsulation example: Email
72
Encapsulation example: Email
73
Encapsulation
74
TCP/IP MODEL
75
TCP/IP model development
The late-60s The Defense Advance Research Projects Agency (DARPA) originally developed Transmission Control Protocol/Internet Protocol (TCP/IP) to interconnect various defense department computer networks. The Internet, an International Wide Area Network, uses TCP/IP to connect networks across the world.
76
4 layers of the TCP/IP model
Layer 4: Layer 3: Layer 2: Layer 1: access Application Transport Internet Network
It is important to note that some of the layers in the TCP/IP model have the same name as layers in the OSI model. Do not confuse the layers of the two models.
77
TCP/IP ----------- OSI
78
The network access layer
Concerned with all of the issues that an IP packet requires to actually make the physical link. All the details in the OSI physical and data link layers.
Electrical, mechanical, procedural and functional specifications. Data rate, Distances, Physical connector. Frames, physical addressing. Synchronization, flow control, error control.
79
The internet layer
Send source packets from any network on the internetwork and have them arrive at the destination independent of the path and networks they took to get there.
Packets, Logical addressing. Internet Protocol (IP). Route , routing table, routing protocol.
80
The transport layer
The transport layer deals with the quality-of-service issues of reliability, flow control, and error correction.
Segments, data stream, datagram. Connection oriented and connectionless. Transmission control protocol (TCP). User datagram protocol (UDP). End-to-end flow control. Error detection and recovery.
81
The application layer
Handles high-level protocols, issues of representation, encoding, and dialog control. The TCP/IP combines all applicationrelated issues into one layer, and assures this data is properly packaged for the next layer.
FTP, HTTP, SMNP, DNS ... Format of data, data structure, encode Dialog control, session management
82
TCP/IP protocol stack
83
Similarities:
Comparing TCP/IP with OSI (cont.)
Both have layers. Both have application layers, though they include very different services. Both have comparable transport and network layers Packet-switched technology is assumed. Networking professionals need to know both.
84
Differences:
Comparing TCP/IP with OSI (cont.)
TCP/IP combines the presentation and session layer issues into its application layer. TCP/IP combines the OSI data link and physical layers into one layer. TCP/IP appears simpler because it has fewer layers. Typically networks aren't built on the OSI protocol, even though the OSI model is used as a guide.
85
Summary
86
DATA LINK CONTROL PROTOCOL
87
Data link control
Sender should know status of receiver then send Line discipline which and when Flow control amount of data before acknowledgement Error control detection and retransmission of missing or corrupt frames
88
ENQ/ACK
dedicated link between 2 terminal which as data to send (start communication) enquiry (enq) receiver is ready for the same Receiver send ack if free, else send nak (-ve ack) sender receives ack, send data after last data EOT(end of transmission) If no ack or nak, sender knows loss retransmits 3 attempts NAK for 3 attempts, disconnect link, retry later
89
ENQ/ACK
90
POLL/SELECT
with primary and secondary stations (addressed) *primary to send data alerts secondary select (sel), with address of secondary the addressee responds with ack when ready, else nak * primary wants to receive asks each secondary (poll) secondary responds with ack when ready with data, else nak, ack-receive data, nak- next secondary
91
Select
92
Poll
93
Stop and wait
simple send one at a time send next after receiving acknowledgement ->long time taken incoming data checked and processed so requires buffer
Sliding window
size of window based on network fixed several frames (numbered) sent before acknowledgement, update window after acknowledgement
94
Stop and wait
95
Sliding window
96
Example
97
Error control
Automatic repeat request (ARQ) Error frames are detected and retransmission of the same is requested from the source Acts adjacent to flow control
98
Stop wait ARQ
Damaged Frame
99
Go back n ARQ
Damaged Frame
100
Go back n ARQ
Lost Frame
101
Go back n ARQ
Lost ACK
102
Selective Reject
103
Protocol
Protocol is a set of rules, or an agreement, that determines the format and transmission of data that make communication on a network more efficient.
104
asynchronous
each character independent receiver does not need time of data from sender each frame with start bit and stop bit Used for MODEM Slow in this layer so synchronous used
105
XMODEM
106
Synchronous whole bit stream -- Chop into equal size faster
Bit oriented Character oriented succession of character (8 bits) individual bit control placement in frame control-coding (ASCII) -BSC (BISYNC) -SDLC -HDLC
107
Binary Synchronous Transmission Protocol CRC-16 protocol is a 16 bit checksum Developed by IBM in 1960
BISYNC (BSC)
Used for batch communication between a System 360 computer and the IBM 2780 and 3780 Remote Job Entry terminals It requires every acknowledged(ACK) acknowledged(NACK) message or to be negatively
It has been used for file integrity check
108
Simple Frame
A Frame with header
Multiblock Frame
109
Multiframe Transmission
110
Control Frame
111
Control Frames
112
Figure 11-12
Byte Stuffing
WCB/McGraw-Hill
113 The McGraw-Hill Companies, Inc., 1998
HDLC High-Level Data Link Control SDLC Synchronous Data Link Control
HDLC is the protocol which is now considered an umbrella under which many Wide Area protocols sit. ITU-T developed HDLC in 1979, and within HDLC there are three types of stations defined SDLC is the oldest layer 2 protocol designed by IBM in 1975 to carry Systems Network Architecture (SNA) traffic .SDLC is the 114 precursor to HDLC.
High-Level Data Link Control
Primary Station - this completely controls all data link operations issuing commands from secondary stations and has the ability to hold separate sessions with different stations. Secondary Station - this can only send responses to one primary station. Secondary stations only talk to each other via a Primary station. Combined Station - this can transmit and receive commands and responses from one other station
115
High-Level Data Link Control
Configuring a channel for use by a station can be done in one of three ways: Unbalanced - this configuration allows one primary station to talk to a number of secondary stations over halfduplex, full-duplex, switched, unswitched, point-to-point or multipoint paths. Symmetrical - where commands and responses are multiplexed over one physical channel when two stations with primary and secondary parts have a point-to-point link joining them. Balanced - where two combined stations communicate over a point-to-point link which can be full/half-duplex or switch/unswitched.
116
HDLC Configuration
117
High-Level Data Link Control
When transferring data, stations are in one of three modes Normal Response Mode (NRM) where the secondary station needs permission from the primary station before it can transmit data. Mainly used on multi-point lines. Asynchronous Response Mode (ARM) where the secondary station can send data without receiving permission from the primary station. This is hardly ever used. Asynchronous Balanced Mode (ABM) where either station can initiate transmission without permission from the other. This is the most common mode used on point-to-point links.
118
HDLC Frame Format
The following diagram details the HDLC frame format:
119
HDLC Flag Field
Bit stuffing
data field more than 5 consecutive 1s, sixth replaced by zero
120
HDLC Address Field
121
HDLC Control Field
There are three types of HDLC frame types defined by the control field: Information Frames are used for the data transfer between stations. The send sequence, or next send N(S), and the receive sequence, or next receive N(R), hold the frame sequence numbers. The Poll/Final bit is called Poll when used by the primary station to obtain a response from a secondary station, and Final when used by the secondary station to indicate a response or the end of transmission. Supervisory Frames are used to acknowledge frames, request for retransmissions or to ask for suspension of transmission. The Supervisory code denotes the type of supervisory frame being sent. Unnumbered Frames are used for link initialisation or link disconnection. The Unnumbered bits indicate the type of 122 Unnumbered frame being used.
HDLC Information Field
HDLC FCS Field
123
SDLC FRAME
Data - can contain Path Information Unit (PIU) or Exchange Identification (XID). Frame Check Sequence (FCS) - this check is carried out on the sending AND receiving of the frame.
124
Difference between HDLC and SDLC
SDLC uses 16 bit checksum HDLC uses 32 bit checksum SDLC supports loop go ahead configuration HDLC does not support SDLC supports only one transfer mode HDLC supports 3 modes-namely1.normal response, 2.Asynchronous response, 3. Asynchronous balanced 125
Media access protocol
Token passing CSMA/CD
126
Token Passing
127
Token Passing
128
Token Passing
129
Token Passing
130
Token Ring Frame
131
Data Frame Fields
132
Token Ring
133
Carrier Sense Multiple Access with Collision Detection
134
Common medium for transmission which and when to use medium access Ready for transmission check medium status carrier sensing Far away can sense free medium and start transmission collide with each other collision detection, reported to source
135
MAC Frame
136
CSMA with Collision Detection
CSMA/CD can be in one of three states: contention, transmission, or idle.
137